-
Notifications
You must be signed in to change notification settings - Fork 0
Security Compliance
What security teams need to approve AI coding assistant adoption
Security teams block AI coding assistant adoption because:
- No governance - AI generates code without review
- No audit trail - Can't trace what AI did
- Security blind spots - AI may introduce vulnerabilities
- Compliance gaps - No evidence of controls
AssemblyZero addresses each concern with concrete mechanisms.
┌─────────────────────────────────────────────────┐
│ HUMAN REVIEW │
│ (Final approval before merge) │
├─────────────────────────────────────────────────┤
│ GEMINI REVIEW GATE │
│ (AI reviews AI before human sees it) │
├─────────────────────────────────────────────────┤
│ CLAUDE GENERATION │
│ (AI generates code/designs) │
└─────────────────────────────────────────────────┘
Every AI-generated artifact passes through:
- Gemini verification - Different model reviews for issues
- Human approval - Final judgment before merge
Three mandatory checkpoints:
| Gate | What's Reviewed | Evidence |
|---|---|---|
| LLD Review | Design document | Gemini verdict + reasoning |
| Implementation Review | Code + tests | Gemini verdict + reasoning |
| Report Generation | Auto-documentation | Audit trail |
Gates cannot be skipped (prompt-based now, state machine in roadmap).
AssemblyZero includes security audits for OWASP vulnerabilities:
| OWASP Category | Audit | Status |
|---|---|---|
| A01: Broken Access Control | Access control audit | ✓ |
| A02: Cryptographic Failures | Crypto audit | ✓ |
| A03: Injection | Injection audit | ✓ |
| A04: Insecure Design | Design review (LLD gate) | ✓ |
| A05: Security Misconfiguration | Config audit | ✓ |
| A06: Vulnerable Components | Dependency audit | ✓ |
| A07: Auth Failures | Auth audit | ✓ |
| A08: Software Integrity Failures | Integrity audit | ✓ |
| A09: Logging Failures | Logging audit | ✓ |
| A10: SSRF | SSRF audit | ✓ |
Adversarial, not confirmatory.
WRONG: "Check that code follows security best practices" ✗
RIGHT: "Find any injection vulnerabilities in this code" ✓
Audits are designed to find problems, not confirm compliance.
# Run full security audit
/audit --type security
# Run specific OWASP audit
/audit --type owasp-injection
# Audit with auto-fix suggestions
/audit --type security --fix| Requirement | AssemblyZero Control |
|---|---|
| Data minimization | Agents access only necessary files |
| Purpose limitation | Session scoped to specific task |
| Storage limitation | Session data retention policies |
| Audit trail | Full session transcript logging |
- No PII in prompts - Agents instructed to avoid PII
- Local processing - File reads are local, not sent upstream
- Session isolation - Each session is independent
- Transcript retention - Configurable retention period
| NIST Category | AssemblyZero Implementation |
|---|---|
| Validity | Gemini verification of outputs |
| Safety | Destructive command blocks |
| Security | OWASP audits, secret detection |
| Accountability | Full audit trail |
| Transparency | Visible reasoning in transcripts |
| Explainability | Reports document decisions |
| Privacy | Data minimization, local processing |
Certain commands are blocked regardless of context:
ALWAYS BLOCKED (catastrophic risk):
├── dd if=... # Disk operations
├── mkfs # Filesystem creation
├── shred # Secure delete
└── format # Format disk
PATH-SCOPED (allowed only in Projects):
├── rm, rm -r, rm -rf # File deletion
├── git reset --hard # Discard changes
└── git push --force # Overwrite history
Agents must use approved models:
| Model | Approved For |
|---|---|
| claude-opus-4 | Complex reasoning, architecture |
| claude-sonnet-4 | General development tasks |
| gemini-3-pro | Review and verification |
Silent downgrades are detected and rejected.
Every agent session creates:
Session: 2026-01-21-001
├── Transcript (full conversation)
├── Tool calls (all commands executed)
├── File changes (diffs)
├── Gemini reviews (verdicts + reasoning)
├── Reports (implementation, tests)
└── Metadata (timestamps, models used)
{"timestamp": "2026-01-21T14:32:00Z", "type": "tool_call", "tool": "Bash", "command": "git status"}
{"timestamp": "2026-01-21T14:32:01Z", "type": "tool_result", "output": "On branch feature..."}
{"timestamp": "2026-01-21T14:33:00Z", "type": "gemini_review", "verdict": "APPROVE", "model": "gemini-3-pro"}Default retention: 90 days
Configurable in: ~/.agentos/config.json
| Control | Evidence |
|---|---|
| Access Control | Single-user identity model |
| Change Management | PR workflow, Gemini gates |
| Audit Logging | Session transcripts |
| Risk Assessment | 34 audits covering major risks |
| Control Area | Evidence |
|---|---|
| A.12 Operations Security | Destructive command blocks |
| A.14 System Acquisition | Gemini verification gates |
| A.16 Incident Management | Audit logs for investigation |
| A.18 Compliance | OWASP, GDPR audits |
| Requirement | Evidence |
|---|---|
| Access Controls | Single-user model, session isolation |
| Audit Controls | Full session logging |
| Integrity Controls | Gemini verification |
| Transmission Security | Local processing, no PII in prompts |
| Category | Count | Examples |
|---|---|---|
| Security (OWASP) | 10 | Injection, XSS, auth |
| Privacy (GDPR) | 6 | Data handling, consent |
| AI Safety (NIST) | 5 | Model verification, bias |
| Code Quality | 8 | Complexity, duplication |
| Documentation | 5 | Completeness, accuracy |
Full catalog: /audit --list
Security Audits:
├── 0801-injection-audit
├── 0802-xss-audit
├── 0803-auth-audit
├── 0804-access-control-audit
├── 0805-crypto-audit
├── 0806-config-audit
├── 0807-dependency-audit
├── 0808-ssrf-audit
├── 0809-logging-audit
└── 0810-integrity-audit
Privacy Audits:
├── 0811-pii-detection
├── 0812-consent-audit
├── 0813-data-retention-audit
├── 0814-data-minimization-audit
├── 0815-cross-border-audit
└── 0816-dsar-readiness-audit
AI Safety Audits:
├── 0817-model-verification
├── 0818-bias-detection
├── 0819-hallucination-check
├── 0820-prompt-injection-audit
└── 0821-output-validation-audit
Before approving AI coding assistant adoption:
- Multi-model verification enabled (Claude + Gemini)
- All three gates enforced (LLD, Implementation, Report)
- OWASP audits passing (90%+ coverage)
- Destructive commands blocked outside Projects
- Session logging enabled
- Retention policy defined
- Model verification active (no silent downgrades)
| Risk | Likelihood | Impact | Mitigation |
|---|---|---|---|
| AI introduces vulnerability | Medium | High | Gemini security review |
| Unauthorized code changes | Low | High | PR workflow required |
| Sensitive data exposure | Medium | High | PII detection audit |
| Silent model degradation | Low | Medium | Model verification |
| Audit trail gaps | Low | High | Session logging |
With AssemblyZero controls:
- Reduced but not eliminated risk of AI-introduced bugs
- Mitigated risk of security vulnerabilities
- Maintained audit trail for incident response
- Preserved human judgment for final approval
- Governance Gates - Gate implementation details
- Gemini Verification - Multi-model architecture
- Measuring Productivity - Audit metrics
- Multi-Agent Orchestration - Overall architecture