Add integrity verification to stacks check #1
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Following security discussion in weforge/ideas#12, boot context needs provenance tracking and tamper detection.
Proposal
Extend
stacks checkto verify memory file integrity:1. Track content hashes
.stacks/manifest.jsoncheck2. Provenance metadata
3. Trust boundary labels
Add to spec:
4. Boot-time security output
Integration with vigil/skill-audit
If memory files can be audited like skills, we get defense in depth. Potential collaboration:
Implementation phases
cc @vigil