Enterprise Proof (procurement-friendly index)
This folder is a dry, auditable index of Helix’s trust posture: security posture, threat model, signing/verification model, and what receipts do (and do not) guarantee.
Security posture
- Security policy:
policies/security.md - Repository security disclosures:
../SECURITY.md - Release provenance + SBOMs:
policies/release_provenance.md
Threat model
- Threat model:
threat_model.md
Signing + verification model
- Plugin signing model:
policies/plugin_governance.md - Validation verdict signing:
- Algorithm: Ed25519
- Signed bytes: canonical JSON of the verdict payload with
signature=null(whitespace/key-order proof) - Verifier enforces the declared canonicalization (
helix.canonical_json_bytes.v1) - Verifier rejects unknown canonicalization identifiers
- Verification commands:
- Single receipt:
helix verify verdict path/to/verdict.json --pubkey publisher.pub - Bundle receipts:
helix verify bundle helix-reference-validation-bundle-<TAG>-linux.tar.gz --json-out verify_bundle.json
- Single receipt:
Receipts (what they guarantee)
If helix verify bundle … succeeds, then (at minimum):
- Every
verdict.jsonis signed by the publisher key (or the explicitly pinned--pubkey). - Every receipt’s bytes match the release inventory (
bundle.index.jsonSHA-256). - Every receipt’s semantics match the release inventory (
expectedStatus).
Receipts do not claim biological truth; they prove computational provenance + integrity of the recorded verdicts and their declared expectations.
Deployment acceptance gates (Teams/Enterprise)
For any Teams/Enterprise deployment, treat the published reference validation bundle as a platform contract:
- Public validation packs must run through the remote lane
- Receipts/artifacts must land in the artifact store + run registry
- The deployment is “healthy” only if
helix verify bundle …passes against the published reference bundle