Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
29 commits
Select commit Hold shift + click to select a range
82b6d98
docs: add claims boundary and strengthen public messaging alignment
chrismaz11 Mar 12, 2026
b95af78
feat: add evaluator artifacts and public API contract for adoption
chrismaz11 Mar 12, 2026
a201995
feat: add evaluator quickstart and Postman trial path
chrismaz11 Mar 12, 2026
d3c865c
docs: connect technical docs to stakes and streamline evaluator onboa…
chrismaz11 Mar 12, 2026
cac6773
Add evaluator demo and lifecycle docs
chrismaz11 Mar 12, 2026
fe0d510
Add canonical lifecycle diagram
chrismaz11 Mar 12, 2026
d3d9087
feat: add evaluator start-here and API trial path
chrismaz11 Mar 12, 2026
b2687e4
feat: add benchmark harness and fresh evaluator metrics
chrismaz11 Mar 12, 2026
e068cad
docs: add evaluator benchmark summary and benchmark metadata
chrismaz11 Mar 12, 2026
0c4f82b
docs: apply branded documentation templates and standardize structure
chrismaz11 Mar 13, 2026
6166e61
ci: add security workflows for scanning and workflow hardening
chrismaz11 Mar 13, 2026
6e5154f
ci: add GitHub security workflows, Dependabot, and settings checklist
chrismaz11 Mar 13, 2026
14f7fdb
compliance: add SOC2 readiness mock audit framework
chrismaz11 Mar 13, 2026
f2f6033
docs: restrict public SOC2 evidence to placeholders
chrismaz11 Mar 13, 2026
3f5d8dd
security: enforce private evidence boundary for SOC2 readiness docs
chrismaz11 Mar 13, 2026
3176355
feat: finish github action setup for generic artifact verification
chrismaz11 Mar 13, 2026
011cd93
chore: track built action entrypoint
chrismaz11 Mar 13, 2026
36c9aa9
feat: finalize github action repo and polish for marketplace readiness
chrismaz11 Mar 13, 2026
a2431af
feat: add secure supabase-backed artifact verification api for github…
chrismaz11 Mar 13, 2026
94c9b59
feat: add public receipt verification surface and partner summary end…
chrismaz11 Mar 13, 2026
559ae2b
security: audit public repo exposure and harden public verification s…
chrismaz11 Mar 13, 2026
330318d
docs: polish marketplace readme and remove stale release language
chrismaz11 Mar 13, 2026
3be26cb
Fix API route aliases in Vercel config
chrismaz11 Mar 16, 2026
e9cc7e7
Remove stale duplicate Vercel config file
chrismaz11 Mar 16, 2026
5bd44d8
Make secret scan workflow not require GITLEAKS_LICENSE
chrismaz11 Mar 16, 2026
3d5e33e
Merge origin/master
chrismaz11 Mar 16, 2026
0d07e3f
fix(auth): accept canonical trustsignal api key in production
chrismaz11 Mar 24, 2026
8339f3d
fix(api): restore runtime verification modules and canonical key auth
chrismaz11 Mar 24, 2026
d31c8ec
fix(api): resolve verification build type regressions
chrismaz11 Mar 24, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .env.example
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,14 @@ ISSUER_PUBLIC_JWK_JSON='{"kty":"EC","crv":"P-256","x":"<x>","y":"<y>"}'
DB_PATH=attestations.sqlite
DATABASE_URL="file:./prisma/dev.db"
# Supabase aliases for apps/api Postgres (optional)
SUPABASE_URL=https://<project-ref>.supabase.co
SUPABASE_SERVICE_ROLE_KEY=replace-with-server-only-service-role-key
SUPABASE_DB_URL=postgresql://postgres.<project-ref>:[password]@aws-0-<region>.pooler.supabase.com:6543/postgres?sslmode=require
SUPABASE_POOLER_URL=postgresql://postgres.<project-ref>:[password]@aws-0-<region>.pooler.supabase.com:6543/postgres?sslmode=require
SUPABASE_DIRECT_URL=postgresql://postgres:[password]@db.<project-ref>.supabase.co:5432/postgres?sslmode=require
# Optional helper if using Supabase CLI pooler URL discovery from `supabase/.temp/pooler-url`.
SUPABASE_DB_PASSWORD=replace-with-supabase-db-password
SUPABASE_SECRET_KEY=replace-with-server-only-secret-key
PORT=3000

# apps/api security controls
Expand Down
34 changes: 34 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -1,19 +1,53 @@
version: 2

updates:
- package-ecosystem: "npm"
directory: "/"
schedule:
interval: "weekly"
day: "monday"
time: "05:00"
timezone: "America/Chicago"
open-pull-requests-limit: 5
groups:
npm-production:
dependency-type: "production"
npm-development:
dependency-type: "development"
labels:
- "dependencies"
- "security"
commit-message:
prefix: "deps"

- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "weekly"
day: "monday"
time: "05:30"
timezone: "America/Chicago"
open-pull-requests-limit: 5
groups:
github-actions:
patterns:
- "*"
labels:
- "dependencies"
- "security"
commit-message:
prefix: "deps"

- package-ecosystem: "cargo"
directory: "/circuits/non_mem_gadget"
schedule:
interval: "weekly"
day: "monday"
time: "06:00"
timezone: "America/Chicago"
open-pull-requests-limit: 3
labels:
- "dependencies"
- "security"
commit-message:
prefix: "deps"
33 changes: 26 additions & 7 deletions .github/pull_request_template.md
Original file line number Diff line number Diff line change
@@ -1,14 +1,33 @@
## Summary

- Describe the change
- Describe the change and why it is needed.

## AI Disclosure
## Change Type

- [ ] AI-assisted changes are included in this PR
- [ ] Runtime or API behavior
- [ ] Security or repo governance
- [ ] Workflow or CI configuration
- [ ] Documentation or claims boundary only
- [ ] Dependency update

## Review Checklist
## Security Review

- [ ] Human review requested
- [ ] Tests added or updated where appropriate
- [ ] Security impact is described
- [ ] No secrets, tokens, cookies, or raw PII were added to code, logs, fixtures, or docs
- [ ] Security impact and remaining risks are described
- [ ] New permissions, auth assumptions, or trust-boundary changes are called out
- [ ] Dependency changes were reviewed for risk

## Claims Boundary And Docs

- [ ] Public-facing claims or evaluator docs were updated if needed
- [ ] No unsupported claims were introduced

## Validation

- [ ] Human review requested
- [ ] Tests or validation commands were run where appropriate
- [ ] Workflow changes were reviewed for least privilege and pinned actions

## AI Disclosure

- [ ] AI-assisted changes are included in this PR
17 changes: 17 additions & 0 deletions .github/workflows/dependency-review.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
name: Security / Dependency Review

on:
pull_request:

permissions:
contents: read

jobs:
dependency-review:
name: Dependency diff review
runs-on: ubuntu-latest
steps:
- name: Dependency review
uses: actions/dependency-review-action@v4 # GitHub-maintained action pinned to supported major; Dependabot tracks updates.
with:
fail-on-severity: high
54 changes: 54 additions & 0 deletions .github/workflows/trivy.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,54 @@
name: Security / Trivy Filesystem Scan

on:
pull_request:
push:
branches:
- main

permissions:
contents: read
security-events: write

jobs:
trivy-fs:
name: Trivy repository scan
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v4.1.7
with:
persist-credentials: false

- name: Run Trivy filesystem scan
uses: aquasecurity/trivy-action@0.34.0
with:
scan-type: fs
scan-ref: .
scanners: vuln
vuln-type: os,library
severity: HIGH,CRITICAL
ignore-unfixed: true
hide-progress: true
format: sarif
output: trivy-results.sarif
limit-severities-for-sarif: true
exit-code: "0"
skip-dirs: node_modules,.next,dist,coverage,.git

- name: Upload Trivy SARIF
if: always() && (github.event_name != 'pull_request' || github.event.pull_request.head.repo.fork == false)
uses: github/codeql-action/upload-sarif@v4 # GitHub-maintained action pinned to supported major; Dependabot tracks updates.
with:
sarif_file: trivy-results.sarif

- name: Summarize Trivy mode
if: always()
run: |
{
echo "## Trivy filesystem scan"
echo ""
echo "- Mode: advisory"
echo "- Scope: filesystem vulnerability scan with HIGH/CRITICAL severity only"
echo "- Notes: ignores unfixed issues and uploads SARIF for review in Security/code scanning when token permissions allow it"
} >> "$GITHUB_STEP_SUMMARY"
42 changes: 42 additions & 0 deletions .github/workflows/zizmor.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
name: Security / zizmor Workflow Audit

on:
pull_request:
paths:
- ".github/workflows/**"
push:
paths:
- ".github/workflows/**"

permissions: {}

jobs:
zizmor:
name: zizmor advisory audit
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
steps:
- name: Checkout
uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v4.1.7
with:
persist-credentials: false

- name: Run zizmor
continue-on-error: true
uses: zizmorcore/zizmor-action@e639db99335bc9038abc0e066dfcd72e23d26fb4 # v0.3.0
with:
advanced-security: false
annotations: true

- name: Summarize zizmor mode
if: always()
run: |
{
echo "## zizmor workflow audit"
echo ""
echo "- Mode: advisory"
echo "- Scope: GitHub Actions workflow security linting"
echo "- Notes: findings are annotated in the run and should be reviewed before merging workflow changes"
} >> "$GITHUB_STEP_SUMMARY"
Loading
Loading