Skip to content

[compiler-threat-spec] spec: add CTR-019 Cache-Memory Integrity Enforcement#33908

Merged
pelikhan merged 1 commit into
mainfrom
daily-compiler-threat-spec-update-2026-05-22-e6a8b31361746546
May 22, 2026
Merged

[compiler-threat-spec] spec: add CTR-019 Cache-Memory Integrity Enforcement#33908
pelikhan merged 1 commit into
mainfrom
daily-compiler-threat-spec-update-2026-05-22-e6a8b31361746546

Conversation

@github-actions
Copy link
Copy Markdown
Contributor

@github-actions github-actions Bot commented May 22, 2026

Summary

Adds CTR-019 Cache-Memory Integrity Enforcement rule to the compiler threat detection specification. This rule documents the requirement that cache-memory updates must only occur when threat detection succeeds, preventing cache pollution from skipped or failed threat scans.

Type of Change

  • Documentation
  • Bug Fix
  • Feature
  • Breaking Change

Changes

Documentation

specs/compiler-threat-detection-spec.md (Modified)

  • Bumped spec version from 1.0.9 to 1.0.10
  • Added CTR-019 to Section 5.1 (Baseline Compiler Threat Rules)
  • Documented implementation mapping: cache.go, expression_builder.go
  • Documented test coverage: cache_memory_threat_detection_test.go, threat_detection_job_combinations_integration_test.go
  • Added T-CTR-019 test ID entry
  • Updated mapping audit timestamp to 2026-05-22
  • Added changelog entry in Section 10

Rationale

CTR-019 ensures cache integrity by preventing the update_cache_memory job from executing when threat detection is skipped (e.g., due to if: always()) or fails. This prevents potentially compromised artifacts from polluting the workflow cache, closing a security gap in the threat detection pipeline.

The rule formalizes behavior introduced in PR #33885, which switched from buildDetectionPassedCondition to buildDetectionSuccessCondition to enforce stricter cache update conditions.

References

Impact Assessment

  • Breaking: No
  • Impact Level: High (security-critical control)
  • Scope: Documentation-only change (formalizes existing implementation)

Generated by PR Description Updater for issue #33908 · ● 808.2K ·

Document the threat detection rule implemented in PR #33885 that requires
detection success before running update_cache_memory jobs.

Changes:
- Bumped spec version to 1.0.10
- Added CTR-019 to Section 5.1 core rule catalog
- Added implementation mapping in Section 7.1
- Added T-CTR-019 test ID in Section 8.1
- Updated mapping audit timestamp in Section 7.2
- Added change log entry for version 1.0.10

The rule enforces cache-memory integrity by preventing cache updates when
threat detection has been skipped or failed, ensuring only validated agent
outputs are persisted to cache-memory.

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@pelikhan pelikhan merged commit 15b4112 into main May 22, 2026
@pelikhan pelikhan deleted the daily-compiler-threat-spec-update-2026-05-22-e6a8b31361746546 branch May 22, 2026 03:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant