[security] Fix auth bypass, mutable pointer returns in trust layer #7
Labels
No labels
needs-review
needs-review
athena
athena-gemini
audit
clotho
clotho-gemini
codex
darbs-claude
security
wiki
No milestone
No project
No assignees
1 participant
Notifications
Due date
-
Dependencies
No dependencies set.
Reference: core/go-crypt#7
Loading…
Add table
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
AX sweep findings:
Fix all, add tests.
Codex Fix Attempt
Codex identified and wrote fixes but could not commit (QA gate — go.work sandbox issue):
Fixes Written (in diff, not committed)
Needs Docker sandbox to commit
The fixes are correct but QA gate fails because the workspace lacks the full go.work environment. Re-dispatch with AGENT_DOCKER=1 once core-dev image is built.
Security Scan: Attack Vector Map
Key findings from crypto surface:
Highest risk: VerifyPassword accepting attacker-controlled Argon2 params. Should cap time/memory/parallelism.
Full table in agent log.