Skip to content

Add Pipelock to Security & Compliance#4807

Merged
caniszczyk merged 1 commit intocncf:masterfrom
luckyPipewrench:add-pipelock
Apr 20, 2026
Merged

Add Pipelock to Security & Compliance#4807
caniszczyk merged 1 commit intocncf:masterfrom
luckyPipewrench:add-pipelock

Conversation

@luckyPipewrench
Copy link
Copy Markdown
Contributor

Adds Pipelock to Provisioning > Security & Compliance.

Pipelock is an open-source agent firewall: a network proxy that scans HTTP, WebSocket, and MCP traffic for prompt injection, DLP leaks, SSRF, tool poisoning, and credential leaks.

Repo: https://github.com/luckyPipewrench/pipelock
Homepage: https://pipelab.org
License: Apache-2.0

@github-actions
Copy link
Copy Markdown

You can preview your changes by visiting this link.

Note

This feature is still experimental and may not work as expected in some cases. Please report any issues you find!

Signed-off-by: luckyPipewrench <gitlucky@pipelab.org>
@caniszczyk caniszczyk enabled auto-merge April 20, 2026 21:41
@caniszczyk caniszczyk added this pull request to the merge queue Apr 20, 2026
Merged via the queue into cncf:master with commit 9a3a49a Apr 20, 2026
3 checks passed
@luckyPipewrench luckyPipewrench deleted the add-pipelock branch April 20, 2026 21:59
luckyPipewrench added a commit to luckyPipewrench/pipelock that referenced this pull request Apr 21, 2026
#418)

* docs: add detection-integration guide for downstream receipt consumers

New guide explaining how SIEM rules, analyst review, and long-window
LLM-based detectors all consume the same signed action-receipt stream.
Includes a 40-line runnable Python example that verifies a chain via
pipelock-verify and routes each verified receipt to a pluggable handler.

Explicit "What this does not solve" section covers compromised mediators,
real-time coverage gaps, receipts-as-input-not-substitute, agent-side
compromise, and the same-user deployment ceiling.

The existing tool-response-injection harness gains a short pointer to
the new guide.

* docs: address review findings on detection-integration

Three corrections from a close review of the first draft:

1. Gate the "every proxy decision produces a signed receipt" claim
   on flight_recorder.signing_key_path being set. Without a signing
   key, pipelock still enforces but the evidence stream is not
   emitted. Docs now say so and point at the config.

2. Rewrite the SIEM section. Receipts live in the flight-recorder
   JSONL file; the emit pipeline (webhook, syslog, OTLP) carries a
   separate security-event envelope. They are complementary streams,
   not the same stream in different wrappers. Guide now recommends a
   file shipper (Filebeat, Fluent Bit, Vector) tailing
   flight_recorder.dir and points readers at siem-integration.md for
   the emit format.

3. Fix the Python example to filter entries to
   type == "action_receipt" (evidence files contain non-receipt
   entries) and carry the outer envelope's session_id into the
   yielded record. The handler prints session_id now.

Verified the updated script against the conformance corpus:
valid-chain passes, broken-chain rejects with CHAIN BROKEN.

* docs: align receipt-signing language across config, flight-recorder, and detection-integration

Three corrections after a review pass:

1. configuration.md: signing_key_path description no longer implies full
   hot-reload rotation. Reload re-reads key bytes when the same path stays
   configured; changing the configured path requires restart.

2. flight-recorder.md: remove stale reference to the pipelock-assess
   keystore. The receipt-signing key is loaded from
   flight_recorder.signing_key_path and is separate from the assess key.
   Add a note clarifying that replacing key file contents at a fixed
   path is an advanced operation; the operator-safe path is still a
   restart so the old chain closes cleanly.

3. detection-integration.md: gate the intro claim on signing being
   enabled, fix the key-rotation guidance to match configuration.md,
   and describe the worked-example evidence file as mixed
   (action_receipt plus other recorder entries) rather than
   receipt-only.

* docs: add CNCF Landscape badge to README

Pipelock was listed in the CNCF Landscape under Provisioning > Security &
Compliance on 2026-04-20 (cncf/landscape#4807). Badge placed alongside
OpenSSF Scorecard + OpenSSF Best Practices so the ecosystem-trust signals
group together, ahead of the CI/quality row.

* docs: capitalize Pipelock in prose per style guide
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants