Documentation
Security Model
Threat model
The threat model covers actor impersonation, key compromise, replay, scope widening, validator collusion, gateway compromise, side-channel disclosure, and revocation evasion. Mitigations are tracked in governance/threat_matrix.md in the public repository.
Cryptographic primitives
ML-DSA-65 (CRYSTALS-Dilithium) for signatures, with hybrid signature support. Hashing primitives and AEAD selections track current best practice and are documented in the security crate.
Determinism
No floating-point arithmetic anywhere in the protocol. Validation and consensus paths are deterministic so that disputes can be re-played bit-for-bit.
Disclosure
See the public security page for coordinated-disclosure contact and PGP key.