You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Auditor mode: mitigation verification only (no net-new threat hunting)
ASVS Level: 1 (inferred; no <config> block found in phase plans)
block_on: open (inferred default; no <config> block found)
threats_total: 6
threats_open: 0
Accepted Risks Log
Threat ID
Category
Acceptance Basis
Recorded At
T-26-00-1
Tampering
Plan 26-00 marks testing boundary tampering as accept (Internal boundary).
2026-05-16
Threat Verification Register
Threat ID
Category
Disposition
Status
Evidence
T-26-00-1
Tampering (Tests)
accept
CLOSED
Accepted risk logged in this file (SECURITY.md, section: Accepted Risks Log). Source: .planning/phases/26-admin-dashboard/26-00-PLAN.md:76.
T-26-01-1
Elevation of Privilege (Admin API)
mitigate
CLOSED
verify_admin exists and is enforced on admin routes via dependency injection: api/routes/admin.py:20-37, api/routes/admin.py:55, api/routes/admin.py:75, api/routes/admin.py:89, api/routes/admin.py:94, api/routes/admin.py:110.
T-26-01-2
Information Disclosure (ReportsHub)
mitigate
CLOSED
Path sanitization present in ReportsHub: filename basename check + resolved path parent constraint: api/reports/hub.py:13-20; route-level filename guard also present: api/routes/admin.py:95-103.
T-26-02-1
Information Disclosure (Frontend)
mitigate
CLOSED
Frontend fetches admin endpoints only (web/src/app/repo/[id]/admin/page.tsx:71, web/src/app/repo/[id]/admin/page.tsx:95), and both backend endpoints are protected by Depends(verify_admin): api/routes/admin.py:106-111, api/routes/admin.py:93-94.
T-26-03-01
Elevation of Privilege (verify_admin)
mitigate
CLOSED
DB-backed role check present (SELECT is_admin ...): api/routes/admin.py:31; non-admin denied: api/routes/admin.py:35-36; success returns concrete user_id: api/routes/admin.py:37. No return "internal" match in api/routes/admin.py (verified via grep).
T-26-03-02
Information Disclosure (/admin/repo/{repo_id}/reports)
mitigate
CLOSED
Strict dependency chain on endpoint: api/routes/admin.py:106-111; regression test verifies internal-token-only request denied: tests/test_admin_auth.py:78-86.
Threat Flags Review (## Threat Flags in phase summaries)