Skip to main content

Threat Model#

This page is under active drafting. The placeholder below reflects the boundary the threat model will be written against, not the final content.

In scope#

ANNIE is designed to protect against:

  • Unsafe model output reaching real-world actuators. Even if the underlying model produces a harmful intent, the safety kernel must reject it before any external system observes it.
  • Silent hardware faults producing plausible-looking output. Memory access faults, arithmetic exceptions, and other compute-unit failures must trigger a halt before the corrupted result can propagate.
  • Tampering with the audit log. Any modification to historical ledger entries must be detectable by an independent verifier.
  • License bypass. The daemon must refuse to run without a valid, binding-matching license.
  • Long-tail latency excursions. The control loop must complete inside its documented budget, every iteration, or the deployment must refuse to start.

Out of scope#

ANNIE does not protect against:

  • Bugs in the integrating application. If your application takes a kernel-approved decision and misuses it, ANNIE has done its job and your application has not.
  • Side-channel attacks against the host (timing, power, electromagnetic). These belong to the hardware-level threat model.
  • Compromise of the operator’s offline license-issuance machine. That is a runbook concern, not a runtime concern.
  • Adversaries with physical access to the deployment hardware. Physical security is a deployment-environment concern.

Independent verification#

The annie verify tool, shipped with every install, walks the ceremony audit log and reports tampering at row-level granularity. It does not phone home and does not require our cooperation.

Full threat-model writeup landing soon.