domains
same gap, different manifestations
every domain that signs or authorizes has the same gap: what you intend vs what gets signed. the attacks look different. the invariants look different. the error costs are different. the gap is the same.
attack taxonomy
these five categories show up across domains (see the deep dive on /problem).
- payload substitution
- look-alike attacks
- policy drift
- context injection
- parameter tampering
container signing
strongest evidence (sigstore CVEs), natural beachhead
the gap
digest substitution, base image swap, registry manipulation
attack patterns
- ci artifact swapped between build and sign
- base image replaced with malicious version
- registry returns different digest than requested
- tag moved to different image
invariant examples
digest == ci_output_digestbase_image in approved_listregistry in allowlistsbom_present and sbom_matches
integration points
- cosign pre-sign hook
- slsa provenance consumer
- registry admission controller
- ci/cd pipeline gate
error cost profile
| c_fp (dev) | low (rebuild) |
| c_fp (prod) | medium (delayed release) |
| c_fn | extreme (supply chain compromise) |
| bias | permissive in dev, conservative in prod |
rationale: production releases are high-leverage attack surface
protocol implications: Invariant Lifecycle critical for keeping base image lists current; Appeal and Resolution for urgent releases
financial transactions
high regulatory demand, shows enterprise readiness
the gap
field manipulation, counterparty swap, amount tampering
attack patterns
- counterparty account modified between approval and submission
- amount changed after review
- quote/order ID substituted
- currency or decimal manipulation
invariant examples
counterparty in verified_listamount <= approved_limitquote_id == expected_quote_idcurrency == expected_currency
integration points
- swift gpi pre-submission
- core banking pre-authorization
- payment processor webhook
- treasury management pre-sign
error cost profile
| c_fp | high (blocked business, regulatory scrutiny) |
| c_fn | extreme (irreversible loss, fraud liability) |
| bias | conservative with fast appeal path |
rationale: both costs high; need blocking but also rapid resolution
protocol implications: Appeal and Resolution critical with strict targets; audit logging mandatory for compliance
firmware updates
shows understanding of extreme c_fn domains
the gap
rollback attacks, device class mismatch, version manipulation
attack patterns
- firmware downgrade to vulnerable version
- update for wrong device class/model
- version number spoofed to appear current
- update package repackaged with malicious payload
invariant examples
version >= current_versiondevice_class == expected_classmanifest_signature_validrollback_index > previous_rollback_index
integration points
- suit manifest verification
- uefi pre-update hook
- ota server pre-sign
- secure boot chain
error cost profile
| c_fp | medium (delayed update, support burden) |
| c_fn | extreme (bricked device, physical safety) |
| bias | very conservative |
rationale: irreversible damage from c_fn vastly outweighs c_fp inconvenience
protocol implications: Degraded Mode Policy must be fail-closed; override requires strong authentication
ai/ml model deployment
current market attention, growing attack surface
the gap
model substitution, weight poisoning, provenance manipulation
attack patterns
- model replaced with backdoored version
- weights modified during transfer
- provenance metadata spoofed
- model card doesn't match actual model
invariant examples
model_digest in approved_listprovenance_chain_validtraining_data_attestation_presentmodel_card_hash == expected
integration points
- mlflow pre-registration
- model registry admission
- inference endpoint pre-load
- huggingface download verification
error cost profile
| c_fp (dev) | low (retrain, experiment) |
| c_fp (prod) | medium (delayed deployment) |
| c_fn | high (model poisoning, inference manipulation) |
| bias | permissive in dev, conservative in prod |
rationale: production model compromise can affect all downstream predictions
protocol implications: Invariant Lifecycle critical as models evolve; experimental phase for new model approvals
crypto transactions
original beachhead, but now one of many domains
the gap
address poisoning, memory injection, parameter tampering
attack patterns
- look-alike address substitution
- agent memory injection (elizaos, autogpt)
- amount manipulation
- contract address substitution
invariant examples
recipient in allowlistsimilarity_to_known < thresholdamount <= limitcontract_address == expected
integration points
- wallet pre-sign hook
- agent action validator
- mpc ceremony pre-sign
- hardware wallet confirmation
error cost profile
| c_fp (low value) | medium (user friction) |
| c_fp (high value) | high (blocked business) |
| c_fn | extreme (irreversible loss) |
| bias | configurable by value tier |
rationale: user risk tolerance varies; high-value needs conservative
protocol implications: Error Cost Framework drives tiered thresholds; Appeal and Resolution for time-sensitive trades
document signing
shows breadth, lower priority
the gap
content substitution, metadata tampering, version swap
attack patterns
- document content modified after review
- metadata (date, author) manipulated
- different version signed than approved
- template injection in generated documents
invariant examples
content_hash == approved_hashtemplate_id == expected_templatemetadata_fields in expected_rangeversion == approved_version
integration points
- esignature pre-sign
- document management pre-approve
- pdf generation post-render
- contract management workflow
error cost profile
| c_fp | medium (delayed signing, workflow disruption) |
| c_fn | medium (fraud, but often legally recoverable) |
| bias | balanced |
rationale: consequences often reversible through legal channels
protocol implications: standard protocol application; Appeal and Resolution for urgent documents
domain comparison
| domain | primary attack | c_fp | c_fn | bias | key protocol |
|---|---|---|---|---|---|
| container | digest substitution | low/medium | extreme | context-dependent | Invariant Lifecycle |
| fintech | counterparty swap | high | extreme | conservative + fast appeal | Appeal and Resolution |
| firmware | rollback attack | medium | extreme | very conservative | Degraded Mode Policy |
| ai/ml | model substitution | low/medium | high | context-dependent | Invariant Lifecycle |
| crypto | address poisoning | medium/high | extreme | tiered by value | Error Cost Framework |
| document | content swap | medium | medium | balanced | Appeal and Resolution |
the protocols define how 1seal behaves under uncertainty across all these domains