✅ RPAS‑CM Amendment Record: AMD‑2026‑04‑12‑0001
Source:
governance/AMD-2026-04-12-0001-Security-Hardening.md— branchadpa-project-charter, repository mdresch/adpa.
✅ RPAS‑CM Amendment Record: AMD‑2026‑04‑12‑0001
1. Metadata
- Type: FIX / INT
- Status: Certified
- Version Impact: v2.3.1 (Security Patch)
- Reference Commit: a4f39bb6
- Governance Gate: DRACO-Automated + Gemini-Verified
2. Change Description
This amendment records the domain-wide security hardening of the ADPA framework.
Core remediations:
- Broken Access Control: Ownership enforcement (
created_by) implemented at the SQL layer for Playbooks, Issues, and Risks. - RCE Mitigation: Removal of
new Function()andwithpatterns; integration ofexpr-evalsandboxed parser. - Regression Baseline: Initialization of the
/server/src/__tests__/securitysuite.
3. Verification Evidence
- Automated Tests: 100% Pass (Playbook isolation, Strategy injection rejection).
- Manual Verification: Empirical reproduction script confirmed User B access denial to User A resources.
- Audit Trail: Reference artifacts moved to
/governance/security/archive/2026-04-remediation/.
4. Certification
The ADPA framework is hereby certified as Secure-by-Default regarding the specified vectors. All future modules must inherit the ownership propagation pattern established in this amendment.