"IPPOC stands on its own, and integrates by choice."
This document provides security and trust information for the IPPOC platform (v0.9.0-sovereign). It defines the technical and cognitive boundaries that ensure IPPOC functions as a sovereign agentic operating system.
All Soma binaries are verified using SHA-256 checksums. The checksum verification process ensures that the binaries have not been tampered with during distribution.
Verification Tool: scripts/verify_checksums.py
Usage:
# Generate checksums
python3 scripts/verify_checksums.py generate
# Verify checksums
python3 scripts/verify_checksums.py verify checksums.sha256Checksum File: checksums.sha256 - Contains SHA-256 checksums for all Soma binaries
All PyPI dependencies are version-locked in pyproject.toml to ensure reproducibility and prevent supply chain attacks.
[project]
name = "ippoc-platform"
version = "0.1.0"
description = "Universal Sovereign AI Platform"
dependencies = [
"fastapi==0.104.1",
"uvicorn==0.24.0",
"sqlalchemy[asyncio]==2.0.23",
"aiosqlite==0.19.0",
"pydantic==2.5.2",
"nest-asyncio==1.5.8",
"requests==2.31.0"
]IPPOC-OS is governed by the Capability Law (CAP-01), which enforces hard boundaries on what the system can do autonomously.
- Structural Independence: Enforced by CI contract tests preventing re-coupling with external UI or control planes.
- Role-Based Validation: Mandatory cognitive role checks for every tool invocation (SENSOR, ACTOR, PLANNER, AUDITOR).
- Capability Gating: SENSOR tools are structurally incapable of side effects (e.g., writes or network egress).
- Audit Immutability: All cognitive actions and law violations are recorded in the immutable Ledger.
| Threat Category | Mitigation |
|---|---|
| Hostile Plugins | Isolated in plugins/, lazy-loaded, and capability-limited. |
| Cognitive Runaway | Protected by reflection cycles, memory decay, and the Operator CLI override. |
| Parameter Injection | Native adapters (e.g., NativeShell) sanitize parameters to prevent shell injection. |
| Vendor Reliance | Two-Tower architecture prevents hard-locking to any single model provider. |
The IPPOC system enforces strict capability boundaries to prevent unauthorized access and abuse. The capability enforcement system includes:
- Role-Based Validation: Restricts operations based on cognitive role (SENSOR, ACTOR, PLANNER, AUDITOR)
- Domain Allowlist/Denylist: Controls access to specific domains
- Risk-Based Validation: Requires explicit user validation for high-risk ACTOR operations
- Audit Trail: Comprehensive logging of all operations and violations
The system includes a supervisor process that monitors and manages system health:
- Crash Detection: Automatically detects and restarts crashed processes
- Zombie Prevention: Ensures no zombie processes are left behind
- Orphan Management: Prevents orphaned capabilities
Supervisor Implementation: src/runtime/supervisor/watchdog.py
A comprehensive audit of capability boundary enforcement mechanisms is available in:
security/capability_abuse_report.md
Details about the supervisor's ability to detect and recover from fault conditions:
security/supervision_fault_matrix.md
If you discover a security vulnerability in the IPPOC platform, please:
- Do not disclose publicly until the issue has been resolved
- Contact the security team at security@ippoc.org
- Provide detailed information about the vulnerability
- Include steps to reproduce the issue
- Vulnerability Report Received: Security team acknowledges receipt within 24 hours
- Investigation: Vulnerability is validated and analyzed
- Fix Development: Patch is developed and tested
- Patch Release: Security fix is released as part of the next version
- Public Disclosure: Vulnerability details are published 30 days after release
- Email: security@ippoc.org
- PGP Key: [Available upon request]
- Sovereign Independence: Achieved full structural and runtime decoupling from OpenClaw.
- Contract Verification: Implemented non-negotiable independence contract test.
- Hardened Native Body: Optimized parameters and path verification for NativeShell.
- Enhanced Disclosure: Refined SECURITY.md with v1 threat model.