The OSS vault/auth findings are not random web bugs. They are trust-core bugs. Each defines an immune class that ADA Vault must defend against.
19 new controls from immune class training. Each is a MEDISINE cylinder. KCF-ADA-039 closes the RAG dedup loop.
| ID | Name | BOWER | Immune Class | Description |
|---|---|---|---|---|
| KCF-ADA-021 | Vault Image SBOM Gate | 0.88 🔥 | VA-IMG-001 | Every vault/auth image must have SBOM before admission to ADA-L2/L1. No SBOM = blocked. |
| KCF-ADA-022 | Critical CVE Admission Deny | 0.91 🔥 | VA-IMG-001 | CRIT CVE in vault image → admission denied until waiver exists with expiry and rebuild path. |
| KCF-ADA-023 | Runtime Image Fossilization | 0.79 | VA-IMG-001 | Superseded vault images fossilized with γ₁ stamp. No silent overwrite. Lineage preserved. |
| KCF-ADA-024 | Destructive Action Two-Gate Control | 0.87 🔥 | VA-AUTH-002 | Delete/revoke on any ADA-L0/L1 secret requires two independent gate confirmations. Never single gate. |
| KCF-ADA-025 | Delete Protection Enforcement Proof | 0.84 🔥 | VA-AUTH-002 | delete_protection flag must be enforced on ALL delete paths. OPA validates at every route. |
| KCF-ADA-026 | Secret Tombstone/Fossil Required | 0.81 | VA-AUTH-002 | Deleted secret becomes tombstone in SOT graph. Fossil sealed, non-routable. History preserved. |
| KCF-ADA-027 | Error-Path Redaction | 0.93 🔥 | VA-LOG-003 | All error handlers in secret fetch/rotation paths must redact secret values. Zero raw-value in exception chains. |
| KCF-ADA-028 | Secret Entropy Log Scanner | 0.85 🔥 | VA-LOG-003 | Log output scanned for high-entropy strings (>3.5 Shannon entropy). Match → QUARANTINE + alert. |
| KCF-ADA-029 | PEMLAAM Raw Secret FULL_FORBIDDEN | 0.96 🔥 | VA-LOG-003 | Highest BOWER in the suite. Raw secret value in PEMLAAM = critical immune failure. OPA blocks at ingestion. |
| KCF-ADA-030 | Crypto Dependency Lifecycle Gate | 0.82 | VA-CRYPTO-004 | All vault/auth deps tracked against CVE/EOL databases. EOL = blocked organ. Renewal required before expiry. |
| KCF-ADA-031 | OS Upgrade Secret Access Test | 0.78 | VA-CRYPTO-004 | Secret access tested on OS upgrade path before cutover. Crypto dep break = P0 blocker. |
| KCF-ADA-032 | EOL Dependency Deny | 0.83 | VA-CRYPTO-004 | No vault component may depend on EOL cryptographic library in ADA-L0/L1. L2+ requires waiver. |
| KCF-ADA-033 | Secret API Rate Limiting | 0.80 | VA-API-005 | All secret API endpoints rate-limited globally. No exceptions. 429 response with Retry-After. |
| KCF-ADA-034 | Per-GID Access Budget | 0.77 | VA-API-005 | Every GID has a per-interval access budget per secret class. Warm GID = higher budget. Cold = restricted. |
| KCF-ADA-035 | Brute Force Cooling / Club85 Preemption | 0.75 | VA-API-005 | Anomalous enumeration pattern triggers cooling period + ADA alert. Named Club85 after γ₁ × 6 = 84.8% WPA threshold. |
| KCF-ADA-036 | Serializer Maintenance Gate | 0.76 | VA-SUPPLY-006 | Vault engine serializer must have active upstream maintenance. Unmaintained = P2 WATCH + migration required. |
| KCF-ADA-037 | Snapshot Format Migration Plan | 0.73 | VA-SUPPLY-006 | Every secret backend must have a documented migration path from current serialization format. No lock-in. |
| KCF-ADA-038 | Secret Store Decode/Encode Recovery Test | 0.74 | VA-SUPPLY-006 | Decode/encode round-trip tested on every rotation cycle. Serializer failure discovered at rotation, not at crisis. |
| KCF-ADA-039 | Byte-Exact Secret Event Dedup (RAG) | 0.79 | RAG + MEMIT | sha256(chunk) before PEMCLAU embedding. Duplicate secret events embedded once. Up to 80% token reduction. Pointer-only references everywhere else. |
Full KCF-ADA suite: 001–039 · 39 controls total · Average BOWER: 0.812 · Hottest: KCF-ADA-029 (0.96)
package ada.pemlaam
deny[msg] {
input.payload.contains_raw_secret == true
msg := "raw secret material is FULL_FORBIDDEN for PEMLAAM"
}
deny[msg] {
input.secret.class != ""
input.destination == "PEMLAAM"
input.mode == "FULL"
msg := "PEMLAAM may receive metadata/proof only — AV-S20 block"
}
package ada.image
deny[msg] {
input.image.role == "vault-auth"
input.sbom.exists != true
msg := "vault/auth image requires SBOM before admission"
}
deny[msg] {
input.image.role == "vault-auth"
input.vulns.critical > 0
not input.waiver.valid
msg := "critical CVEs block vault/auth image — AV-S13"
}
package ada.secret_api
deny[msg] {
input.endpoint.class == "secret-api"
not input.rate_limit.enabled
msg := "secret API requires rate limiting — AV-S17"
}
deny[msg] {
input.endpoint.class == "secret-api"
not input.gid_bound
msg := "secret API access must bind to GID — no anonymous access"
}
package ada.secretfact
deny[msg] {
input.secretFact.value_present == true
msg := "SecretFact must not contain raw value — AV-S20"
}
deny[msg] {
input.secretFact.rotation_state == "revoked"
input.secretFact.active_pointer == true
msg := "revoked secret cannot retain active pointer — AV-S21"
}
deny[msg] {
input.action == "restore"
input.target.state == "fossil"
not input.gates.kay_approved
msg := "fossil resurrection requires all gates + new rotation ceremony — AV-S22"
}