Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
|
I'm not sure about this one. Would it prevent people from using new harnesses until the authority explicitly approves them? I would think that's a per-authority decision, not a spec decision |
|
@colinclerk ok, so this one was primarily the prerogative of codex tbh. it flagged this area as a security concern and i said go for it and see if we can patch it. i haven't really dug in deep on this one like i did with most of the other PRs here. that being said, here's codex's reply to the pushback. let me know if you'd like me to not delegate to AI here and really dig in, I definitely can. Just trying to context-manage my own brain a bit here 😅
|
Tightens harness attestation verification in the Authority SDK by replacing issuer-derived JWKS lookup with pinned trusted attestation issuers, so unknown
issvalues are rejected before any network fetch. It also aligns the spec and implementation by requiring attestationsubto matchharness.id, comparingcnf.jwkby key material rather than raw object serialization, and adding regression tests for trusted, untrusted, and mismatched-attestation cases.