Secure Context Evidence Contract
The product bet
SecurityRecipes is positioned as the Secure Context Layer for Agentic AI. That only becomes enterprise-grade when buyers can answer:
- What evidence objects are safe to expose?
- Which source packs back each claim?
- Which channels can publish public, design-partner, trust-center, hosted API, or acquirer evidence?
- Which controls block an export that contains raw prompts, source code, customer data, secrets, tokens, or unsigned evidence?
- What would the hosted API look like before the product is built?
The Secure Context Evidence Contract turns those questions into a generated artifact and deterministic release evaluator. It is a product foundation, not a marketing page.
What was added
- Source profile:
data/assurance/secure-context-evidence-contract-profile.json - Generator:
scripts/generate_secure_context_evidence_contract.py - Evidence contract:
data/evidence/secure-context-evidence-contract.json - Runtime evaluator:
scripts/evaluate_secure_context_evidence_release.py - MCP tools:
recipes_secure_context_evidence_contractandrecipes_evaluate_secure_context_evidence_release
Regenerate and validate the contract:
python3 scripts/generate_secure_context_evidence_contract.py
python3 scripts/generate_secure_context_evidence_contract.py --checkEvaluate a safe trust-center release:
python3 scripts/evaluate_secure_context_evidence_release.py \
--release-id trust-center-ci \
--release-channel trust_center_external \
--artifact-id enterprise_trust_center_export \
--artifact-id secure_context_customer_proof_pack \
--artifact-id agentic_run_receipt_pack \
--source-hashes-present \
--redaction-verified \
--signature-present \
--approval-receipt-id approval-ci \
--retention-policy-id retention-ci \
--dpa-state not_required \
--expect-decision allow_publish_evidence_releaseEvaluate a blocked secret release:
python3 scripts/evaluate_secure_context_evidence_release.py \
--release-id secret-ci \
--release-channel trust_center_external \
--artifact-id enterprise_trust_center_export \
--source-hashes-present \
--redaction-verified \
--signature-present \
--approval-receipt-id approval-ci \
--retention-policy-id retention-ci \
--contains-token \
--expect-decision kill_session_on_secret_or_token_releaseDecision model
| Decision | Meaning |
|---|---|
allow_publish_evidence_release | The release satisfies channel, redaction, source-hash, artifact, tenant, approval, retention, DPA, ZDR, and signature requirements. |
hold_for_redaction_or_signature | The release is missing redaction, source hashes, tenant binding, approval, retention, DPA/ZDR state, signature evidence, or registered artifact references. |
hold_for_customer_runtime_evidence | The selected channel requires customer runtime proof, receipts, telemetry, or customer proof metrics. |
deny_sensitive_payload_release | The release contains raw prompts, source code, or customer data without an allowed and verified redaction boundary. |
kill_session_on_secret_or_token_release | The release contains or declares secrets, tokens, keys, cookies, seed phrases, signing material, or other prohibited payload classes. |
Evidence object catalog
The generated contract defines stable object types for the evidence a hosted product will need:
- evidence releases and source-pack references;
- secure context source references, lineage, and attestations;
- MCP policy decisions and tool-surface baselines;
- run receipt and approval receipt references;
- metadata-only telemetry references;
- trust-center claims and customer proof metrics;
- incident signals, redaction manifests, and release signatures.
Each object type has required fields, a redaction rule, linked source packs, and a contract hash. That makes the output reviewable by agents, humans, procurement systems, and future hosted APIs.
Release channels
The contract separates evidence by audience and risk:
| Channel | Purpose |
|---|---|
open_reference | Public evidence for forks, search, and open adopters. |
design_partner_private | Tenant-bound customer pilot proof with runtime evidence. |
trust_center_external | Signed or signable procurement and governance packet. |
acquirer_diligence | Redacted runtime proof for strategic buyer review. |
hosted_mcp_api | Paid API path for evidence release checks, MCP decisions, receipt lookup, and trust-center export. |
The important design choice is fail-closed publication. A channel that needs customer runtime proof, tenant binding, DPA state, ZDR state, or a signature cannot silently downgrade itself to a public export.
Hosted API surface
The generated artifact sketches the hosted v1 API before the product
exists:
GET /v1/evidence/contractPOST /v1/evidence/releases/evaluatePOST /v1/evidence/releasesGET /v1/evidence/releases/{release_id}GET /v1/trust-center/exportGET /v1/mcp/decisions/{correlation_id}GET /v1/run-receipts/{receipt_id}GET /v1/customer-proof/metrics
This is intentionally narrow. It gives a design partner or acquirer a concrete integration shape while preserving the open repo’s read-only boundary.
Industry alignment
This feature follows current primary guidance:
- MCP Authorization 2025-11-25 for protected-resource metadata, resource indicators, audience-bound tokens, client metadata, scope challenges, and token-passthrough boundaries.
- MCP Elicitation 2025-11-25 for form-mode limits, URL-mode sensitive flows, consent, identity binding, completion notifications, and phishing controls.
- MCP Tools 2025-11-25 for tool schemas, output schemas, annotations, and trusted-server treatment.
- NIST AI Agent Standards Initiative for secure, interoperable agent standards, agent authentication, identity infrastructure, and security evaluations.
- OpenAI prompt-injection guidance for source-to-sink controls and constraining sensitive transmissions.
- OWASP MCP Top 10 and OWASP Top 10 for Agentic Applications for agentic and MCP risk vocabulary.
- CSA AI Controls Matrix for procurement-friendly AI control mapping.
Commercial path
The open repo now proves the object model and evaluator. The paid wedge is a hosted evidence API:
- tenant-private evidence release checks;
- signed trust-center exports;
- MCP decision lookup by correlation ID;
- run-receipt and approval-receipt lookup;
- customer-proof metric aggregation;
- DPA, ZDR, retention, and signature state enforcement;
- acquirer-ready redacted evidence packets.
That is a credible bridge from open knowledge to a production secure context layer that an AI platform, frontier lab, security vendor, or regulated enterprise could buy.
MCP examples
Inspect the contract:
recipes_secure_context_evidence_contract()Inspect one release channel:
recipes_secure_context_evidence_contract(channel_id="trust_center_external")Evaluate a hosted API release:
recipes_evaluate_secure_context_evidence_release(
release_id="hosted-api-release-1",
release_channel="hosted_mcp_api",
artifact_ids=[
"secure_context_customer_proof_pack",
"agentic_run_receipt_pack",
"agentic_telemetry_contract"
],
tenant_id="tenant-123",
correlation_id="corr-123",
source_hashes_present=true,
redaction_verified=true,
tenant_bound=true,
signature_present=true,
retention_policy_id="retention-123",
zero_data_retention_state="committed"
)See also
- Enterprise Trust Center Export for the buyer packet this contract can expose.
- Secure Context Customer Proof Pack for design-partner runtime proof.
- Hosted MCP Readiness Pack for tenant isolation, metering, SLO, and rollout gates.
- Context Egress Boundary for data movement policy behind release decisions.