Skip to content

tighten credential-path proof boundaries#86

Merged
TacoRocket merged 2 commits intomainfrom
credential-path-proof-boundaries
Apr 10, 2026
Merged

tighten credential-path proof boundaries#86
TacoRocket merged 2 commits intomainfrom
credential-path-proof-boundaries

Conversation

@TacoRocket
Copy link
Copy Markdown
Owner

What changed

Tightens chains credential-path proof-boundary wording for candidate rows so default table output says more clearly what AzureFox has and has not actually proved.

Why

The family already had a conservative join model, but non-Key Vault rows still relied on softer note text that made the operator infer too much from candidate narrowing. This change makes the proof boundary explicit in table mode and keeps the named-but-not-visible Key Vault case honest.

User impact

Operators now see stronger default wording for narrowed, tenant-wide, service-hint, and visibility-blocked credential-path rows without changing ranking or row admission.

Root cause

credential-path had the underlying evidence, but default rendering did not consistently expose the confidence boundary outside JSON.

Validation

  • python3 -m pytest tests/test_terminal_ux.py -k "chains_table_mode_surfaces_priority_and_next_review or chains_keyvault_note_prefers_current_identity_access_sentence or chains_named_keyvault_not_visible_prefers_inventory_boundary"
  • python3 -m pytest tests/test_credential_path_registry.py tests/test_chain_semantics.py tests/test_cli_smoke.py -k "credential_path"
  • pre-push guardrail suite: 308 passed, 2 deselected

@TacoRocket TacoRocket changed the title [codex] tighten credential-path proof boundaries tighten credential-path proof boundaries Apr 10, 2026
@TacoRocket TacoRocket merged commit 49f532a into main Apr 10, 2026
7 checks passed
@TacoRocket TacoRocket deleted the credential-path-proof-boundaries branch April 10, 2026 02:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant