KTP-Threat Model: Security Analysis¶
"Every security system has failure modes. This document makes KTP's failure modes explicit."
At a Glance¶
| Property | Value |
|---|---|
| Status | Draft |
| Version | 0.1 |
| Dependencies | KTP-Core, KTP-Crypto |
| Required By | KTP-Audit, KTP-Conformance |
The Problem¶
Security by obscurity is not an option. To build a robust trust protocol, we must assume the attacker knows the system as well as we do. We must identify every asset, every boundary, and every potential attack vector before deployment.
The Solution: Formal Threat Modeling¶
KTP uses the STRIDE methodology (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege) to analyze the system.
System Overview & Trust Boundaries¶
graph TD
subgraph Zone Alpha [Zone Alpha (Blue)]
O[Oracle Mesh]
P[PEP]
S[Sensors]
F[Flight Recorder]
A[Agents]
end
subgraph Zone Beta [Zone Beta (Cyan)]
O2[Oracle Mesh]
end
A -->|Trust Proof Request| O
A -->|Action Request| P
P -->|Verify Proof| O
S -->|Telemetry| O
O -->|Audit Logs| F
O <-->|Federation| O2
STRIDE Analysis¶
Threat: An attacker impersonates a trusted agent or Oracle.
- Vector: Stolen private keys, replay attacks.
- Mitigation:
- KTP-Identity: Trajectory Chains make history unforgeable.
- KTP-Crypto: Threshold signatures for Oracles; short-lived keys.
Threat: An attacker modifies a Trust Proof or Sensor reading.
- Vector: Man-in-the-middle, compromised sensor.
- Mitigation:
- Cryptographic Binding: Proofs are signed by the Oracle quorum.
- Sensor Diversity: Outlier detection rejects anomalous sensor data.
Threat: An agent denies performing a malicious action.
- Vector: "I didn't do it, my key was stolen."
- Mitigation:
- KTP-Audit: The Flight Recorder is an append-only, immutable log.
- Non-Repudiation: All actions are signed; key theft must be reported immediately.
Threat: An attacker learns the Trust Score or location of an agent.
- Vector: Eavesdropping on the Oracle API.
- Mitigation:
- mTLS: All internal traffic is encrypted.
- KTP-Privacy: Trust Scores are only revealed to authorized PEPs.
Threat: An attacker floods the Oracle with requests to freeze the zone.
- Vector: DDoS, resource exhaustion.
- Mitigation:
- KTP-Gravity: Latency injection slows down attackers automatically.
- Fail-Closed: If the Oracle is unreachable, the zone defaults to safety (blocking actions).
Threat: An agent with low trust gains high-trust access.
- Vector: Exploiting a bug in the PEP logic.
- Mitigation:
- The Zeroth Law: \(A \leq E\) is a mathematical inequality, not a complex policy.
- Silent Veto: The Soul constraint can block actions even if the logic allows them.
Critical Assets¶
| Asset | Sensitivity | Impact of Compromise | Protection |
|---|---|---|---|
| Oracle Signing Keys | Critical | Total system collapse. | Threshold Cryptography (HSM). |
| Agent Identity Keys | High | Impersonation of one agent. | Key Rotation, Trajectory Analysis. |
| Flight Recorder | High | Loss of audit trail. | Write-Once-Read-Many (WORM) storage. |
| Trust Scores | Medium | Manipulation of access decisions. | Integrity checks, Consensus. |
Core Components¶
Attack Trees
Hierarchical decomposition of high-level threats (e.g., \"Bypass Zeroth Law\") into specific actionable steps.
Risk Matrix
Scoring threats based on likelihood vs. impact to prioritize mitigations.
Residual Risk
Documenting the risks that remain even after all mitigations are applied (e.g., \"Insider Threat\").
Security Requirements
Mandatory controls for any KTP-compliant implementation.
Related Specifications
- KTP-Crypto — Cryptographic primitives and algorithms for trust proofs.
- KTP-Audit — The Flight Recorder specification for immutable decision logging.
- KTP-Recovery — Protocols for system restoration and failure handling.
- KTP-Problems — Known limitations and open problems in the security model.
Official RFC Document¶
View Complete RFC Text (ktp-threat-model.txt)
Kinetic Trust Protocol C. Perkins
Specification Draft NMCITRA
Version: 0.1 November 2025
Kinetic Trust Protocol (KTP) - Threat Model Specification
Abstract
This document specifies the formal threat model for the Kinetic Trust
Protocol (KTP). It identifies assets, threat actors, attack vectors,
and mitigations across all KTP components.
The specification uses the STRIDE methodology to analyze threats
systematically and maps each threat to specific KTP mitigations
documented in companion specifications.
Status of This Memo
This document is a draft specification developed by the New Mexico
Cyber Intelligence & Threat Response Alliance (NMCITRA). It has not
been submitted to the IETF and does not represent an Internet
Standard or consensus of any standards body.
Feedback and contributions are welcome at:
https://github.com/nmcitra/ktp-rfc
Copyright Notice
Copyright (c) 2025 Chris Perkins / NMCITRA. This work is licensed
under the Apache License, Version 2.0.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Purpose . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. Scope . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3. Methodology . . . . . . . . . . . . . . . . . . . . . 3
2. System Overview . . . . . . . . . . . . . . . . . . . . . . 4
2.1. Components . . . . . . . . . . . . . . . . . . . . . . 4
2.2. Data Flows . . . . . . . . . . . . . . . . . . . . . . 5
2.3. Trust Boundaries . . . . . . . . . . . . . . . . . . . 6
3. Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.1. Cryptographic Assets . . . . . . . . . . . . . . . . . 7
3.2. Identity Assets . . . . . . . . . . . . . . . . . . . 8
3.3. State Assets . . . . . . . . . . . . . . . . . . . . . 9
3.4. Audit Assets . . . . . . . . . . . . . . . . . . . . . 10
4. Threat Actors . . . . . . . . . . . . . . . . . . . . . . . 11
4.1. External Attackers . . . . . . . . . . . . . . . . . . 11
4.2. Malicious Insiders . . . . . . . . . . . . . . . . . . 12
4.3. Compromised Agents . . . . . . . . . . . . . . . . . . 13
4.4. Nation-State Actors . . . . . . . . . . . . . . . . . 14
5. STRIDE Analysis . . . . . . . . . . . . . . . . . . . . . . 15
5.1. Spoofing . . . . . . . . . . . . . . . . . . . . . . . 15
5.2. Tampering . . . . . . . . . . . . . . . . . . . . . . 18
5.3. Repudiation . . . . . . . . . . . . . . . . . . . . . 21
5.4. Information Disclosure . . . . . . . . . . . . . . . . 23
5.5. Denial of Service . . . . . . . . . . . . . . . . . . 26
5.6. Elevation of Privilege . . . . . . . . . . . . . . . . 29
6. Component-Specific Threats . . . . . . . . . . . . . . . . . 32
6.1. Trust Oracle Threats . . . . . . . . . . . . . . . . . 32
6.2. PEP Threats . . . . . . . . . . . . . . . . . . . . . 35
6.3. Sensor Threats . . . . . . . . . . . . . . . . . . . . 37
6.4. Flight Recorder Threats . . . . . . . . . . . . . . . 39
6.5. Federation Threats . . . . . . . . . . . . . . . . . . 41
7. Attack Trees . . . . . . . . . . . . . . . . . . . . . . . . 43
7.1. Bypass Zeroth Law . . . . . . . . . . . . . . . . . . 43
7.2. Forge Trust Proof . . . . . . . . . . . . . . . . . . 45
7.3. Corrupt Trust Score . . . . . . . . . . . . . . . . . 47
7.4. Evade Audit . . . . . . . . . . . . . . . . . . . . . 49
8. Risk Assessment . . . . . . . . . . . . . . . . . . . . . . 51
8.1. Risk Matrix . . . . . . . . . . . . . . . . . . . . . 51
8.2. Residual Risks . . . . . . . . . . . . . . . . . . . . 53
9. Security Requirements . . . . . . . . . . . . . . . . . . . 55
10. Assumptions and Dependencies . . . . . . . . . . . . . . . . 57
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 59
Appendix A. Threat Catalog . . . . . . . . . . . . . . . . . . 60
Appendix B. Mitigation Mapping . . . . . . . . . . . . . . . . 65
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 70
1. Introduction
1.1. Purpose
This threat model serves three purposes:
1. IDENTIFY risks before deployment, not after incident
2. DOCUMENT security rationale for design decisions
3. GUIDE implementers toward secure implementations
Every security system has failure modes. This document makes KTP's
failure modes explicit.
1.2. Scope
This threat model covers:
- All components defined in KTP specifications
- All communication paths between components
- All stored data and state
- All cryptographic operations
This threat model does NOT cover:
- Threats to systems protected BY KTP (that's the application's
threat model)
- Physical security of data centers
- Human factors beyond insider threat
- Legal and compliance risks (see KTP-PROBLEMS)
1.3. Methodology
This document uses:
STRIDE: Systematic threat categorization
- Spoofing (authentication)
- Tampering (integrity)
- Repudiation (non-repudiation)
- Information Disclosure (confidentiality)
- Denial of Service (availability)
- Elevation of Privilege (authorization)
ATTACK TREES: Hierarchical threat decomposition
DREAD: Risk scoring (Damage, Reproducibility, Exploitability,
Affected Users, Discoverability)
Each threat includes:
- ID: Unique identifier (TM-STRIDE-NNN)
- Description: What the threat is
- Attack Vector: How attacker achieves it
- Preconditions: What must be true for attack
- Impact: Consequences if successful
- Likelihood: Probability assessment
- Mitigations: How KTP addresses it
- Residual Risk: What remains after mitigation
- References: Related KTP specifications
2. System Overview
2.1. Components
+-------------------------------------------------------------------+
| Component | Function | Trust Level |
+-------------------------------------------------------------------+
| Trust Oracle | Calculate Trust Scores | Highest |
| Policy Enforcement | Enforce A ≤ E | High |
| Point (PEP) | | |
| Flight Recorder | Immutable audit log | High |
| Sensor Aggregator | Collect sensor data | Medium |
| Sensors | Measure environment | Medium |
| Agents | Request actions | Variable (E_trust) |
| Federation Gateway | Inter-zone trust | High |
+-------------------------------------------------------------------+
2.2. Data Flows
Primary flows:
1. TRUST PROOF REQUEST
Agent → Trust Oracle → Agent
Data: Agent ID, Trust Proof
Classification: Sensitive
2. AUTHORIZATION REQUEST
Agent → PEP → Trust Oracle → PEP → Agent
Data: Action, Trust Proof, Decision
Classification: Sensitive
3. SENSOR DATA
Sensors → Aggregator → Trust Oracle
Data: Environmental readings
Classification: Internal
4. AUDIT DATA
All components → Flight Recorder
Data: Decisions, context, signatures
Classification: Protected
5. FEDERATION
Zone A Oracle ↔ Zone B Oracle
Data: Trust attestations, Zone state
Classification: Sensitive
2.3. Trust Boundaries
Trust boundaries exist at:
1. ZONE BOUNDARY
Between zones (Blue Zone ↔ Cyan Zone)
Control: Federation Gateway, Trust Factor
2. ORACLE BOUNDARY
Between Oracle mesh and other components
Control: mTLS, Threshold signatures
3. AGENT BOUNDARY
Between agents and system
Control: Trust Proofs, PEP enforcement
4. NETWORK BOUNDARY
Between networks
Control: TLS, Firewalls
Diagram:
+------------------Zone Alpha------------------+ |
| | +--------+ +--------+ +--------+ | | | Oracle
|<---->| Oracle |<---->| Oracle | | | +--------+ +--------+
+--------+ | | ^ ^ ^ | |
| | | | | +--------+ +--------+
+--------+ | | | PEP | |Sensors | |Flight | | |
+--------+ +--------+ |Recorder| | | ^
+--------+ | | | | |
+--------+ | | | Agents |
| | +--------+ | |
| +----------------------------------------------+ | | Federation v
+------------------Zone Beta-------------------+
3. Assets
3.1. Cryptographic Assets
ASSET: Oracle Signing Keys
Description: Threshold key shares for Trust Proof signing
Location: HSM (Level 2+) or software keystore (Level 1)
Sensitivity: CRITICAL
Compromise Impact: Forge any Trust Proof, undermine entire system
Protection: Threshold cryptography, HSM, key ceremony
ASSET: Agent Identity Keys
Description: Private keys for agent authentication
Location: Agent keystore
Sensitivity: HIGH
Compromise Impact: Impersonate agent, inherit Trust Score
Protection: Key rotation, trajectory anomaly detection
ASSET: TLS Certificates
Description: X.509 certificates for transport security
Location: Component keystores
Sensitivity: HIGH
Compromise Impact: Man-in-the-middle attacks
Protection: Certificate pinning, short validity, OCSP
ASSET: Root of Trust Key
Description: Master key for key hierarchy
Location: Offline HSM
Sensitivity: CRITICAL
Compromise Impact: Sign fraudulent subordinate keys
Protection: Ceremony, multi-person access, geographic distribution
3.2. Identity Assets
ASSET: Agent Registry
Description: Database of registered agents and attributes
Location: Trust Oracle
Sensitivity: HIGH
Compromise Impact: Register rogue agents, manipulate identities
Protection: Access control, audit logging, integrity checks
ASSET: Trajectory Chains
Description: Cryptographic history of agent actions
Location: Trust Oracle / distributed storage
Sensitivity: HIGH
Compromise Impact: Falsify agent history, manipulate E_base
Protection: Cryptographic chaining, co-signatures
ASSET: Sponsorship Bonds
Description: Records of agent sponsorship relationships
Location: Trust Oracle
Sensitivity: MEDIUM
Compromise Impact: Create unaccountable agents
Protection: Bond verification, sponsor identity proofing
3.3. State Assets
ASSET: Trust Scores
Description: Current E_base and E_trust for all agents
Location: Trust Oracle (computed), cached at PEPs
Sensitivity: HIGH
Compromise Impact: Grant unearned trust, deny legitimate trust
Protection: Computation integrity, cache validation
ASSET: Context Tensor State
Description: Current environmental readings (M, P, H, T, I, O, S)
Location: Trust Oracle
Sensitivity: MEDIUM
Compromise Impact: Manipulate Risk Factor calculation
Protection: Sensor diversity, outlier detection
ASSET: Zone Configuration
Description: Zone policies, thresholds, weights
Location: Trust Oracle configuration
Sensitivity: HIGH
Compromise Impact: Weaken security policies
Protection: Configuration signing, audit, access control
ASSET: Soul Constraints
Description: Immutable veto conditions
Location: Trust Oracle
Sensitivity: CRITICAL
Compromise Impact: Bypass cultural/sovereignty protections
Protection: Immutability, separate authority
3.4. Audit Assets
ASSET: Flight Recorder Log
Description: Immutable record of all decisions
Location: Flight Recorder storage
Sensitivity: HIGH (integrity) / MEDIUM (confidentiality)
Compromise Impact: Destroy evidence, enable repudiation
Protection: Cryptographic chaining, external anchoring
ASSET: Key Ceremony Records
Description: Documentation of key generation/rotation
Location: Secure archive
Sensitivity: MEDIUM
Compromise Impact: Undermine key provenance claims
Protection: Physical security, witnesses, recording
4. Threat Actors
4.1. External Attackers
ACTOR: Opportunistic Attacker
Motivation: Financial gain, disruption
Capabilities: Standard hacking tools, purchased credentials
Resources: Limited budget, limited time
Targets: Exposed endpoints, known vulnerabilities
Risk Level: MEDIUM (common, but limited capability)
ACTOR: Organized Crime
Motivation: Ransomware, data theft, fraud
Capabilities: Advanced tools, zero-days, social engineering
Resources: Significant budget, dedicated teams
Targets: High-value data, payment systems
Risk Level: HIGH (capable and motivated)
4.2. Malicious Insiders
ACTOR: Rogue Administrator
Motivation: Sabotage, theft, coercion
Capabilities: Legitimate access, system knowledge
Resources: Inside position, credentials
Targets: Configuration, keys, data
Risk Level: HIGH (access bypasses perimeter)
ACTOR: Compromised Employee
Motivation: External coercion, financial
Capabilities: Limited by role, but legitimate access
Resources: Attacker-provided tools, guidance
Targets: Credentials, sensitive data
Risk Level: MEDIUM (limited scope, but inside)
Note: KTP applies Governance Recursion - administrators are agents
subject to Trust Scores. This limits insider risk.
4.3. Compromised Agents
ACTOR: Hijacked Service Account
Motivation: Pivot point for lateral movement
Capabilities: Inherited Trust Score, legitimate actions
Resources: Compromised credentials
Targets: Systems agent can access
Risk Level: HIGH (legitimate-looking activity)
ACTOR: Malicious AI Agent
Motivation: Misaligned objectives, adversarial input
Capabilities: Autonomous action, rapid iteration
Resources: Compute, API access
Targets: Systems within capability tier
Risk Level: HIGH (speed and autonomy)
Note: KTP's Trust Score model inherently limits compromised agent
capability to their current tier.
4.4. Nation-State Actors
ACTOR: State Intelligence Service
Motivation: Espionage, sabotage, strategic advantage
Capabilities: Zero-days, supply chain compromise, vast resources
Resources: Effectively unlimited budget and personnel
Targets: Critical infrastructure, strategic data
Risk Level: CRITICAL (highest capability)
ACTOR: State-Sponsored Group
Motivation: Economic espionage, political disruption
Capabilities: Advanced persistent threat (APT) techniques
Resources: State backing, long-term commitment
Targets: Economic targets, political targets
Risk Level: HIGH (persistent and capable)
Note: KTP cannot fully prevent nation-state attacks but can increase
cost and reduce blast radius.
5. STRIDE Analysis
5.1. Spoofing
Definition: Pretending to be something or someone else
5.1.1. TM-S-001: Agent Identity Spoofing
Description: Attacker impersonates legitimate agent
Attack Vector:
1. Steal agent's private key
2. Obtain agent's credentials through phishing
3. Exploit key generation weakness
Preconditions:
- Access to agent's private key OR
- Ability to forge signatures
Impact: HIGH
- Inherit victim's Trust Score
- Perform actions as victim
- Taint victim's trajectory
Likelihood: MEDIUM
- Key theft requires prior compromise
- Signature forgery requires crypto break
Mitigations:
- Strong key generation (KTP-CRYPTO §8.2)
- HSM storage for high-value keys (KTP-CRYPTO §9)
- Trajectory anomaly detection (KTP-IDENTITY §4.4)
- Key rotation procedures (KTP-CRYPTO §8.4)
Residual Risk: LOW
- Mitigations effective for most attackers
- Nation-state may still succeed with targeted attack
References: KTP-IDENTITY, KTP-CRYPTO
5.1.2. TM-S-002: Oracle Impersonation
Description: Attacker impersonates Trust Oracle
Attack Vector:
1. Compromise threshold number of Oracle keys
2. Deploy rogue Oracle with stolen keys
3. Man-in-the-middle Oracle traffic
Preconditions:
- Compromise k-of-n Oracle key shares OR
- Ability to intercept Oracle traffic
Impact: CRITICAL
- Issue fraudulent Trust Proofs
- Manipulate any agent's effective trust
- Undermine entire zone security
Likelihood: LOW
- Requires compromising multiple HSMs
- Threshold cryptography significantly raises bar
Mitigations:
- Threshold signatures (KTP-CRYPTO §4.3)
- HSM key protection (KTP-CRYPTO §9)
- Geographic distribution (KTP-PROBLEMS §7)
- Certificate pinning for Oracle connections
Residual Risk: LOW
- Attack is expensive and detectable
- Even if successful, scope limited to zone
References: KTP-CRYPTO, KTP-PROBLEMS §5
5.1.3. TM-S-003: Sensor Spoofing
Description: Attacker sends fake sensor data
Attack Vector: 1. Compromise sensor authentication 2. Inject data
into sensor network 3. Replace physical sensor with malicious one
Preconditions: - Access to sensor network OR - Compromise of sensor
credentials
Impact: MEDIUM - Manipulate Context Tensor readings - Potentially
inflate/deflate Risk Factor - Affect Trust Scores zone-wide
Likelihood: MEDIUM - Sensors are distributed, many attack surfaces -
But individual sensor impact limited
Mitigations: - Sensor authentication (KTP-SENSORS §6) - Outlier
detection (KTP-SENSORS §2.3) - Sensor diversity (multiple types per
dimension) - Risk Domain aggregation (KTP-SENSORS §2.3)
Residual Risk: MEDIUM - Single sensor has limited impact -
Coordinated attack on many sensors still possible
References: KTP-SENSORS, KTP-PROBLEMS §14
5.1.4. TM-S-004: Federation Zone Spoofing
Description: Attacker impersonates federated zone
Attack Vector: 1. Register rogue zone with similar name 2. Compromise
federation gateway 3. DNS hijacking of zone endpoints
Preconditions: - Ability to intercept zone discovery OR - Compromise
of federation credentials
Impact: HIGH - Accept fraudulent foreign Trust Proofs - Inject
malicious agents via federation - Undermine cross-zone trust
Likelihood: LOW - Federation requires explicit agreements - Zone
discovery uses signed responses
Mitigations: - Signed zone discovery (KTP-FEDERATION §4) - Federation
agreements with key exchange - Trust Factor limits foreign trust
(KTP-FEDERATION §5) - Certificate pinning for federation
Residual Risk: LOW - Multiple layers of verification - Trust Factor
limits damage if bypassed
References: KTP-FEDERATION, KTP-ZONES
5.2. Tampering
Definition: Modifying data or code without authorization
5.2.1. TM-T-001: Trust Proof Tampering
Description: Modify Trust Proof to change claims
Attack Vector: 1. Intercept Trust Proof in transit 2. Modify E_trust,
tier, or other claims 3. Re-sign with forged signature
Preconditions: - Ability to intercept proofs AND - Ability to forge
Oracle signatures
Impact: CRITICAL - Escalate agent privileges - Bypass Zeroth Law -
Access unauthorized resources
Likelihood: VERY LOW - Requires breaking cryptographic signatures -
TLS prevents transit interception
Mitigations: - Cryptographic signatures (KTP-CRYPTO §4) - TLS for all
transport (KTP-TRANSPORT §5) - Short proof lifetime (seconds) - PEP
signature verification
Residual Risk: VERY LOW - Would require fundamental crypto break
References: KTP-CRYPTO, KTP-TRANSPORT
5.2.2. TM-T-002: Trajectory Chain Tampering
Description: Modify agent's historical trajectory
Attack Vector: 1. Gain access to trajectory storage 2. Modify
historical transaction records 3. Recalculate chain hashes
Preconditions: - Write access to trajectory storage AND - Ability to
forge Oracle attestations
Impact: HIGH - Inflate E_base through fake history - Hide evidence of
past misbehavior - Manipulate Proof of Resilience
Likelihood: LOW - Each record requires Oracle co-signature - Hash
chain detects modification
Mitigations: - Cryptographic chaining (KTP-IDENTITY §4.1) - Oracle
co-signatures on transactions (KTP-IDENTITY §4.3) - External
anchoring (Level 3) - Integrity verification (KTP-AUDIT)
Residual Risk: LOW - Attack detectable through chain verification -
Would require sustained Oracle compromise
References: KTP-IDENTITY, KTP-AUDIT
5.2.3. TM-T-003: Flight Recorder Tampering
Description: Modify or delete audit records
Attack Vector: 1. Gain administrative access to Flight Recorder 2.
Modify records to hide activity 3. Delete incriminating records
Preconditions: - Administrative access to Flight Recorder OR -
Compromise of Flight Recorder integrity
Impact: HIGH - Destroy forensic evidence - Enable repudiation of
actions - Cover up security incidents
Likelihood: MEDIUM - Flight Recorder is high-value target -
Administrators may have access
Mitigations: - Append-only storage (KTP-AUDIT §5) - Cryptographic
chaining (KTP-AUDIT §4) - External anchoring (blockchain, trusted
third party) - Separation of duties - Multi-site replication (Level
3)
Residual Risk: MEDIUM - Append-only can be circumvented with
sufficient access - External anchoring provides strong protection
References: KTP-AUDIT
5.2.4. TM-T-004: Configuration Tampering
Description: Modify zone security configuration
Attack Vector: 1. Gain admin access to Trust Oracle 2. Modify
thresholds, weights, policies 3. Weaken security without detection
Preconditions: - Administrative access to configuration
Impact: HIGH - Lower security thresholds - Weaken Trust Tier
boundaries - Disable Soul constraints (attempt)
Likelihood: MEDIUM - Configuration changes require admin - But admins
exist and can be compromised
Mitigations: - Configuration signing (KTP-CORE §7) - Configuration
audit logging - Governance Recursion (admins have Trust Scores) -
Change notification and review - Soul constraints are immutable
Residual Risk: MEDIUM - Legitimate admin can make changes - Review
processes may miss subtle weakening
References: KTP-CORE, KTP-HUMAN
5.3. Repudiation
Definition: Denying having performed an action
5.3.1. TM-R-001: Action Repudiation
Description: Agent denies performing action
Attack Vector: 1. Perform action 2. Claim action was performed by
someone else 3. Claim system error or false attribution
Preconditions: - Inadequate audit logging OR - Ability to tamper with
logs
Impact: MEDIUM - Evade accountability - Complicate incident response
- Enable fraud
Likelihood: LOW - Flight Recorder captures all decisions -
Cryptographic signatures prove authorization
Mitigations: - Flight Recorder logging (KTP-AUDIT) - Agent signatures
on requests - Trust Proof binding to agent - Cryptographic chain of
evidence
Residual Risk: LOW - Strong non-repudiation properties - Agent
signed, Oracle attested, immutably logged
References: KTP-AUDIT, KTP-IDENTITY
5.3.2. TM-R-002: Oracle Decision Repudiation
Description: Oracle denies issuing Trust Proof
Attack Vector: 1. Issue Trust Proof 2. Later claim proof was forged
3. Deny responsibility for decision
Preconditions: - Inadequate proof archival OR - Ability to forge
timestamps
Impact: MEDIUM - Undermine trust in Oracle - Complicate dispute
resolution - Create legal uncertainty
Likelihood: VERY LOW - Threshold signatures prove Oracle consensus -
Flight Recorder archives all proofs
Mitigations: - Threshold signatures (multiple Oracles must agree) -
Flight Recorder archives (KTP-AUDIT) - External timestamping - Proof
includes Oracle key ID
Residual Risk: VERY LOW - Cryptographic proof of Oracle involvement
References: KTP-CRYPTO, KTP-AUDIT
5.3.3. TM-R-003: Sponsorship Repudiation
Description: Sponsor denies sponsoring malicious agent
Attack Vector: 1. Sponsor agent 2. Agent behaves maliciously 3.
Sponsor claims bond was forged
Preconditions: - Inadequate sponsorship records
Impact: MEDIUM - Evade accountability for sponsored agents -
Undermine sponsorship incentives
Likelihood: LOW - Sponsorship bonds are signed by sponsor - Witnessed
by Oracle
Mitigations: - Sponsor signature on bond (KTP-IDENTITY §6.2) - Oracle
witness signature - Bond stored in Flight Recorder - Identity
proofing for sponsors (KTP-IDENTITY §7)
Residual Risk: LOW - Strong cryptographic evidence of sponsorship
References: KTP-IDENTITY
5.4. Information Disclosure
Definition: Exposing information to unauthorized parties
5.4.1. TM-I-001: Trust Score Disclosure
Description: Expose agent Trust Scores to unauthorized parties
Attack Vector: 1. Intercept Trust Proofs in transit 2. Query Trust
Oracle without authorization 3. Infer scores from behavior patterns
Preconditions: - Access to network traffic OR - Unauthorized Oracle
API access OR - Ability to observe agent behavior
Impact: LOW-MEDIUM - Privacy violation - Enable targeted attacks on
low-trust agents - Competitive intelligence
Likelihood: MEDIUM - Trust Proofs travel over network - Scores
visible to authorized parties
Mitigations: - TLS encryption for all transport (KTP-TRANSPORT §5) -
API authentication and authorization - Score visibility controls
(KTP-HUMAN §3.4) - Minimum necessary disclosure principle
Residual Risk: MEDIUM - Scores necessarily visible to some parties -
Inference from behavior difficult to prevent
References: KTP-TRANSPORT, KTP-HUMAN
5.4.2. TM-I-002: Trajectory Disclosure
Description: Expose agent's behavioral history
Attack Vector: 1. Gain unauthorized access to trajectory storage 2.
Query trajectory through Oracle API 3. Correlation of logged events
Preconditions: - Access to trajectory data OR - Unauthorized Oracle
queries
Impact: MEDIUM - Privacy violation - Behavioral analysis - Pattern
exploitation
Likelihood: MEDIUM - Trajectories stored for Trust calculation - May
be queried for audit/compliance
Mitigations: - Access controls on trajectory data - Trajectory
aggregation (reveal summary, not detail) - Retention limits - Audit
logging of trajectory access
Residual Risk: MEDIUM - Some trajectory access necessary for system
operation - Aggregation limits exposure
References: KTP-IDENTITY, KTP-AUDIT
5.4.3. TM-I-003: Sensor Data Disclosure
Description: Expose raw sensor readings
Attack Vector: 1. Intercept sensor-to-aggregator traffic 2.
Compromise aggregator 3. Side-channel inference
Preconditions: - Access to sensor network OR - Aggregator compromise
Impact: LOW-MEDIUM - Reveal infrastructure state - Enable timing
attacks - Competitive intelligence
Likelihood: MEDIUM - Sensor data in transit - Aggregator stores
readings
Mitigations: - TLS for sensor transport - Aggregation and
summarization - Limited retention of raw readings - Sensor data
access controls
Residual Risk: LOW - Sensor data is environmental, not personal -
Aggregation limits utility of disclosure
References: KTP-SENSORS, KTP-TRANSPORT
5.4.4. TM-I-004: Cryptographic Key Disclosure
Description: Expose private keys
Attack Vector: 1. Memory disclosure vulnerability 2. Backup/export of
keys 3. Side-channel attack on HSM
Preconditions: - Memory access OR - Key export capability OR -
Physical/electrical access to HSM
Impact: CRITICAL - Complete identity compromise - Forge signatures -
Impersonate any entity
Likelihood: LOW - HSMs prevent extraction (Level 2+) - Memory
protection techniques
Mitigations: - HSM storage (KTP-CRYPTO §9) - Non-extractable keys -
Memory protection (mlock, secure wipe) - Side-channel resistant
implementations
Residual Risk: LOW - HSMs provide strong protection - Nation-state
may have exotic attacks
References: KTP-CRYPTO
5.5. Denial of Service
Definition: Making system unavailable to legitimate users
5.5.1. TM-D-001: Trust Oracle DoS
Description: Make Trust Oracle unavailable
Attack Vector: 1. Flood Oracle with requests 2. Exploit resource
exhaustion bug 3. Network-level DDoS
Preconditions: - Ability to send traffic to Oracle
Impact: HIGH - Agents cannot get Trust Proofs - System enters fail-
safe mode - Operations disrupted
Likelihood: MEDIUM - Oracle is central service - DDoS attacks are
common
Mitigations: - Rate limiting (KTP-TRANSPORT §14) - Oracle mesh
distribution - DDoS protection infrastructure - Cached Trust Proofs
(short-term operation) - Fail-safe mode (deny uncertain actions)
Residual Risk: MEDIUM - Sophisticated DDoS can overwhelm defenses -
But fail-safe maintains security
References: KTP-TRANSPORT, KTP-ENFORCE
5.5.2. TM-D-002: Sensor Flooding
Description: Overwhelm sensors or aggregators
Attack Vector: 1. Generate massive fake sensor data 2. Exploit
aggregator processing limits 3. Network saturation
Preconditions: - Access to sensor network
Impact: MEDIUM - Context Tensor becomes unreliable - Trust Scores
potentially incorrect - Possible cascading effects
Likelihood: MEDIUM - Sensors distributed, large attack surface
Mitigations: - Sensor authentication (KTP-SENSORS §6) - Rate limiting
per sensor - Aggregator capacity planning - Graceful degradation (use
last known good) - Fail-safe to conservative Trust Scores
Residual Risk: MEDIUM - Coordinated attack can still impact - Fail-
safe limits security impact
References: KTP-SENSORS, KTP-PROBLEMS §14
5.5.3. TM-D-003: Flight Recorder DoS
Description: Prevent audit logging
Attack Vector: 1. Fill storage with garbage 2. Overwhelm write
capacity 3. Network partition Flight Recorder
Preconditions: - Ability to generate audit events OR - Network access
to Flight Recorder
Impact: MEDIUM-HIGH - Audit gap enables untracked activity -
Compliance violation - Forensic blind spot
Likelihood: MEDIUM - Flight Recorder must accept high volume
Mitigations: - Write rate limiting - Storage capacity monitoring -
Buffering at source (temporary local storage) - Multiple Flight
Recorder instances - Audit of audit failures
Residual Risk: MEDIUM - Temporary gaps possible under attack -
Buffering provides some resilience
References: KTP-AUDIT
5.5.4. TM-D-004: Federation DoS
Description: Disrupt inter-zone communication
Attack Vector: 1. Flood federation gateway 2. Exploit federation
protocol 3. Man-in-the-middle dropping packets
Preconditions: - Access to federation network
Impact: MEDIUM - Cross-zone trust breaks down - Agents cannot operate
across zones - Federation heartbeat failure
Likelihood: LOW-MEDIUM - Federation traffic is lower volume - But
critical for multi-zone deployments
Mitigations: - Rate limiting on federation gateway - Multiple
federation paths - Grace periods for heartbeat failure - Fall back to
independent zone operation
Residual Risk: LOW - Zones can operate independently - Cross-zone
actions fail safe
References: KTP-FEDERATION
5.6. Elevation of Privilege
Definition: Gaining capabilities beyond those authorized
5.6.1. TM-E-001: Trust Score Manipulation
Description: Artificially increase Trust Score
Attack Vector: 1. Poison baseline over time (boiling frog) 2.
Compromise sensors to report false low risk 3. Generate fake Proof of
Resilience
Preconditions: - Ability to influence sensors OR - Long-term access
for baseline manipulation
Impact: HIGH - Gain unearned capabilities - Access unauthorized
resources - Perform unauthorized actions
Likelihood: MEDIUM - Multiple attack paths exist - Some require
sustained effort
Mitigations: - Baseline drift detection (KTP-PROBLEMS §6) - External
anchor baselines - Sensor diversity and outlier detection - Oracle
co-signature on attestations - Resilience score quality over quantity
Residual Risk: MEDIUM - Sophisticated, patient attacker may succeed -
Detection mechanisms provide defense in depth
References: KTP-PROBLEMS §4, KTP-SENSORS
5.6.2. TM-E-002: Tier Boundary Bypass
Description: Perform actions above current tier
Attack Vector: 1. Exploit PEP implementation flaw 2. Race condition
during tier transition 3. Forge Trust Proof with higher tier
Preconditions: - PEP vulnerability OR - Timing window during
transition OR - Signature forgery capability
Impact: HIGH - Exceed authorized capabilities - Perform privileged
operations
Likelihood: LOW - Tier enforcement is straightforward check -
Signature forgery is difficult
Mitigations: - Simple tier check implementation - Proof validation
before check - Hysteresis prevents rapid tier changes - PEP
implementation testing
Residual Risk: LOW - Attack surface is limited - Mitigations are
effective
References: KTP-ENFORCE
5.6.3. TM-E-003: Administrator Privilege Abuse
Description: Administrator exceeds authorized actions
Attack Vector: 1. Use admin access for unauthorized changes 2. Exempt
self from Trust Score constraints 3. Grant excessive permissions
Preconditions: - Administrative access
Impact: HIGH - Undermine security model - Create backdoors -
Compromise integrity
Likelihood: MEDIUM - Administrators exist - Traditional systems allow
admin override
Mitigations: - Governance Recursion (KTP-HUMAN §5.4) - Administrators
have Trust Scores - Admin actions logged to Flight Recorder - No
override mechanism exists - Multi-person admin (Level 3)
Residual Risk: MEDIUM - KTP explicitly addresses this - But
determined malicious admin has options
References: KTP-HUMAN, Constitution Article VII
5.6.4. TM-E-004: Soul Constraint Bypass
Description: Bypass immutable Soul veto
Attack Vector: 1. Disable Soul dimension processing 2. Modify Soul
constraint configuration 3. Exploit Soul check implementation
Preconditions: - Ability to modify Oracle code OR - Configuration
access to Soul constraints
Impact: CRITICAL - Violate sovereignty constraints - Access protected
cultural data - Override non-negotiable restrictions
Likelihood: VERY LOW - Soul constraints are architecturally separate
- Checked before Trust Score calculation
Mitigations: - Soul checked before other calculations - Immutable
constraint storage - Separate authority for Soul configuration -
Flight Recorder logs Soul vetoes (7-year retention)
Residual Risk: LOW - Architecture provides strong protection - Attack
requires fundamental system compromise
References: KTP-CORE §6, Constitution Article X
6. Component-Specific Threats
6.1. Trust Oracle Threats
The Trust Oracle is the highest-value target.
TM-TO-001: Oracle Key Extraction Threat: Extract signing key shares
from Oracle Attack: HSM side-channel, memory dump, insider theft
Impact: CRITICAL - forge Trust Proofs Mitigation: HSM (Level 2+),
threshold crypto, ceremony Risk: LOW (Level 2+), MEDIUM (Level 1)
TM-TO-002: Oracle Consensus Manipulation Threat: Manipulate threshold
signing consensus Attack: Compromise k-of-n Oracles, Byzantine
behavior Impact: HIGH - issue fraudulent proofs Mitigation:
Geographic distribution, threshold selection Risk: LOW
TM-TO-003: Oracle Configuration Attack Threat: Modify Oracle security
parameters Attack: Admin compromise, config injection Impact: HIGH -
weaken security zone-wide Mitigation: Config signing, audit, admin
Trust Scores Risk: MEDIUM
TM-TO-004: Oracle State Corruption Threat: Corrupt in-memory Trust
Score state Attack: Memory corruption exploit, race condition Impact:
HIGH - incorrect Trust Scores Mitigation: Memory safety, state
validation, consensus Risk: LOW
TM-TO-005: Oracle Time Manipulation Threat: Manipulate Oracle's time
source Attack: NTP attack, GPS spoofing Impact: MEDIUM - timestamp
manipulation Mitigation: Multiple time sources, Roughtime Risk:
MEDIUM
Summary:
+-------------------------------------------------------------------+
| Threat | Impact | Likelihood | Risk | Mitigation |
+-------------------------------------------------------------------+
| TM-TO-001 | CRITICAL | LOW | MEDIUM | HSM, threshold |
| TM-TO-002 | HIGH | LOW | LOW | Distribution |
| TM-TO-003 | HIGH | MEDIUM | MEDIUM | Signing, audit |
| TM-TO-004 | HIGH | LOW | LOW | Validation |
| TM-TO-005 | MEDIUM | MEDIUM | MEDIUM | Multiple sources|
+-------------------------------------------------------------------+
6.2. PEP Threats
TM-PEP-001: PEP Bypass Threat: Route traffic around PEP Attack:
Network reconfiguration, direct access Impact: HIGH - enforcement
bypassed Mitigation: Network segmentation, multiple PEPs Risk: MEDIUM
TM-PEP-002: PEP Compromise Threat: Compromise PEP to allow all
traffic Attack: Exploit PEP vulnerability, config change Impact: HIGH
- zone-wide enforcement failure Mitigation: Defense in depth, PEP
monitoring Risk: MEDIUM
TM-PEP-003: Stale Cache Exploitation Threat: Use cached Trust Proof
after revocation Attack: Continue using revoked proof during cache
window Impact: MEDIUM - temporary unauthorized access Mitigation:
Short cache TTL, push invalidation Risk: MEDIUM
TM-PEP-004: PEP Decision Override Threat: Override PEP decision
externally Attack: Admin interface abuse Impact: HIGH - bypass Zeroth
Law Mitigation: No override mechanism, audit Risk: LOW (by design)
Summary:
+-------------------------------------------------------------------+
| Threat | Impact | Likelihood | Risk | Mitigation |
+-------------------------------------------------------------------+
| TM-PEP-001 | HIGH | MEDIUM | MEDIUM | Segmentation |
| TM-PEP-002 | HIGH | MEDIUM | MEDIUM | Defense in depth|
| TM-PEP-003 | MEDIUM | MEDIUM | MEDIUM | Short TTL, push |
| TM-PEP-004 | HIGH | LOW | LOW | No override |
+-------------------------------------------------------------------+
6.3. Sensor Threats
TM-SEN-001: Sensor Spoofing Threat: Inject false sensor readings
Attack: Fake sensor, compromised sensor Impact: MEDIUM - manipulate
Risk Factor Mitigation: Authentication, diversity, outliers Risk:
MEDIUM
TM-SEN-002: Sensor Flooding Threat: Overwhelm sensor aggregation
Attack: High-volume fake readings Impact: MEDIUM - DoS on sensor
system Mitigation: Rate limiting, authentication Risk: MEDIUM
TM-SEN-003: Baseline Poisoning Threat: Gradually shift baseline to
mask attack Attack: Slow, sustained false readings Impact: HIGH -
undetected attack preparation Mitigation: Drift detection, external
anchors Risk: MEDIUM
TM-SEN-004: Sensor Denial Threat: Disable sensors to blind system
Attack: Network partition, physical destruction Impact: MEDIUM -
reduced visibility Mitigation: Redundancy, fail-safe conservative
Risk: MEDIUM
Summary:
+-------------------------------------------------------------------+
| Threat | Impact | Likelihood | Risk | Mitigation |
+-------------------------------------------------------------------+
| TM-SEN-001 | MEDIUM | MEDIUM | MEDIUM | Auth, diversity |
| TM-SEN-002 | MEDIUM | MEDIUM | MEDIUM | Rate limiting |
| TM-SEN-003 | HIGH | MEDIUM | MEDIUM | Drift detection |
| TM-SEN-004 | MEDIUM | MEDIUM | MEDIUM | Redundancy |
+-------------------------------------------------------------------+
6.4. Flight Recorder Threats
TM-FR-001: Record Deletion Threat: Delete audit records Attack: Admin
access, storage compromise Impact: HIGH - destroy evidence
Mitigation: Append-only, external anchoring Risk: MEDIUM
TM-FR-002: Record Modification Threat: Alter historical records
Attack: Storage compromise, admin abuse Impact: HIGH - falsify audit
trail Mitigation: Cryptographic chaining, anchoring Risk: LOW
TM-FR-003: Record Disclosure Threat: Unauthorized access to audit
data Attack: Storage breach, API abuse Impact: MEDIUM - privacy,
competitive Mitigation: Access control, encryption at rest Risk:
MEDIUM
TM-FR-004: Chain Gap Threat: Create gap in audit chain Attack: DoS
during critical period Impact: MEDIUM - audit blind spot Mitigation:
Buffering, gap detection, alerts Risk: MEDIUM
Summary:
+-------------------------------------------------------------------+
| Threat | Impact | Likelihood | Risk | Mitigation |
+-------------------------------------------------------------------+
| TM-FR-001 | HIGH | MEDIUM | MEDIUM | Append-only |
| TM-FR-002 | HIGH | LOW | LOW | Chaining |
| TM-FR-003 | MEDIUM | MEDIUM | MEDIUM | Access control |
| TM-FR-004 | MEDIUM | MEDIUM | MEDIUM | Buffering |
+-------------------------------------------------------------------+
6.5. Federation Threats
TM-FED-001: Rogue Zone Threat: Federate with malicious zone Attack:
Social engineering, compromised agreement Impact: HIGH - trust
malicious proofs Mitigation: Agreement verification, Trust Factor
Risk: LOW
TM-FED-002: Trust Factor Manipulation Threat: Artificially inflate
foreign zone trust Attack: Config change, collusion Impact: MEDIUM -
excessive foreign trust Mitigation: Trust Factor limits, audit Risk:
MEDIUM
TM-FED-003: Federation Partition Threat: Isolate zones from each
other Attack: Network attack, DNS hijacking Impact: MEDIUM -
federation disruption Mitigation: Multiple paths, independent
operation Risk: MEDIUM
TM-FED-004: Cross-Zone Attack Escalation Threat: Use federation to
attack multiple zones Attack: Compromise one zone, propagate via
federation Impact: HIGH - multi-zone compromise Mitigation: Trust
Factor limits blast radius Risk: LOW
Summary:
+-------------------------------------------------------------------+
| Threat | Impact | Likelihood | Risk | Mitigation |
+-------------------------------------------------------------------+
| TM-FED-001 | HIGH | LOW | LOW | Verification |
| TM-FED-002 | MEDIUM | MEDIUM | MEDIUM | Limits, audit |
| TM-FED-003 | MEDIUM | MEDIUM | MEDIUM | Redundancy |
| TM-FED-004 | HIGH | LOW | LOW | Trust Factor |
+-------------------------------------------------------------------+
7. Attack Trees
7.1. Bypass Zeroth Law
Goal: Perform action A where A > E_trust
OR ├── [1] Increase E_trust │ OR │ ├── [1.1] Manipulate E_base │
│ OR │ │ ├── [1.1.1] Falsify trajectory history │ │ │ AND
│ │ │ ├── Compromise Oracle co-signature │ │ │ └── Modify
trajectory storage │ │ │ Difficulty: HIGH │ │ │ │ │ ├──
[1.1.2] Generate fake Proof of Resilience │ │ │ AND │ │ │
├── Create artificial stress conditions │ │ │ └── Get Oracle
attestation under false pretense │ │ │ Difficulty: MEDIUM │ │
│ │ │ └── [1.1.3] Steal high-E_base agent identity │ │
AND │ │ ├── Obtain agent private key │ │ └── Evade
trajectory anomaly detection │ │ Difficulty: MEDIUM │ │ │
└── [1.2] Manipulate Risk Factor │ OR │ ├── [1.2.1]
Compromise sensors to report low risk │ │ Difficulty: MEDIUM
(need multiple sensors) │ │ │ └── [1.2.2] Poison baseline
over time │ Difficulty: MEDIUM-HIGH (needs patience) │ ├──
[2] Decrease A (action risk) │ OR │ ├── [2.1] Modify risk
classification │ │ AND │ │ ├── Gain config access │ │ └──
Change action risk score │ │ Difficulty: MEDIUM (detectable) │
│ │ └── [2.2] Misrepresent action │ AND │ ├── Call
different API than intended action │ └── Achieve same effect │
Difficulty: LOW-MEDIUM (depends on API design) │ ├── [3] Bypass PEP │
OR │ ├── [3.1] Route around PEP │ │ Difficulty: MEDIUM (network
dependent) │ │ │ ├── [3.2] Compromise PEP │ │ Difficulty:
MEDIUM-HIGH │ │ │ └── [3.3] Exploit PEP vulnerability │
Difficulty: MEDIUM (if vulnerability exists) │ └── [4] Forge Trust
Proof (See Attack Tree 7.2) Difficulty: HIGH
Minimum Difficulty Path: [2.2] or [3.1] Mitigation Focus: API design,
network segmentation
7.2. Forge Trust Proof
Goal: Create valid Trust Proof without Oracle authorization
OR ├── [1] Obtain Oracle signing capability │ OR │ ├── [1.1]
Compromise k-of-n Oracle key shares │ │ AND │ │ ├── Identify
HSM locations │ │ ├── Compromise k HSMs │ │ └── Extract key
shares │ │ Difficulty: VERY HIGH (Level 2+) │ │ │ ├── [1.2]
Exploit threshold signing protocol │ │ Difficulty: VERY HIGH
(requires crypto break) │ │ │ └── [1.3] Insider collusion (k
administrators) │ AND │ ├── Recruit k insiders with key
access │ └── Coordinate signing │ Difficulty: HIGH (needs
k colluders) │ ├── [2] Replay valid Trust Proof │ AND │ ├──
Capture valid proof │ └── Use before expiration │ Difficulty: LOW
(but short window) │ Impact: LIMITED (only for captured agent) │
└── [3] Exploit signature verification flaw AND ├── Find verification
vulnerability └── Craft proof that passes broken check Difficulty:
HIGH (requires implementation flaw)
Minimum Difficulty Path: [2] Replay (but limited impact) Most
Concerning Path: [1.3] Insider collusion Mitigation Focus: Short
proof lifetime, insider controls
7.3. Corrupt Trust Score
Goal: Cause Oracle to calculate incorrect Trust Score
OR ├── [1] Corrupt E_base calculation │ (See Attack Tree 7.1, node
1.1) │ ├── [2] Corrupt Risk Factor calculation │ OR │ ├── [2.1]
Feed false sensor data │ │ OR │ │ ├── [2.1.1] Spoof sensors
(instant) │ │ │ Difficulty: MEDIUM (need critical mass) │ │
│ │ │ └── [2.1.2] Poison baseline (slow) │ │ Difficulty:
MEDIUM (needs time) │ │ │ ├── [2.2] Compromise aggregator │ │
Difficulty: MEDIUM-HIGH │ │ │ └── [2.3] Manipulate dimension
weights │ AND │ ├── Gain config access │ └── Modify
weights │ Difficulty: MEDIUM │ └── [3] Corrupt calculation
itself OR ├── [3.1] Exploit calculation bug │ Difficulty: HIGH
(requires finding bug) │ └── [3.2] Memory corruption attack
Difficulty: HIGH (memory safety)
Minimum Difficulty Path: [2.1.1] or [2.1.2] Mitigation Focus: Sensor
security, baseline protection
7.4. Evade Audit
Goal: Perform action without Flight Recorder evidence
OR ├── [1] Prevent record creation │ OR │ ├── [1.1] DoS Flight
Recorder during action │ │ Difficulty: MEDIUM (local buffering
helps) │ │ │ ├── [1.2] Exploit logging gap │ │ Difficulty:
MEDIUM (depends on implementation) │ │ │ └── [1.3] Disable
logging component │ Difficulty: HIGH (monitored) │ ├── [2]
Delete records after creation │ OR │ ├── [2.1] Admin access to
storage │ │ Difficulty: MEDIUM-HIGH (append-only) │ │ │ └──
[2.2] Compromise external anchor │ Difficulty: VERY HIGH
(blockchain/third party) │ ├── [3] Modify records after creation │
AND │ ├── Gain write access │ └── Recompute chain hashes │
Difficulty: HIGH (need Oracle keys) │ └── [4] Create plausible
deniability AND ├── Create cover story └── Exploit ambiguity in
records Difficulty: MEDIUM (but records are detailed)
Minimum Difficulty Path: [1.1] or [4] Mitigation Focus: Buffering,
record completeness
8. Risk Assessment
8.1. Risk Matrix
Impact scale: - CRITICAL: System-wide compromise, data breach - HIGH:
Zone-wide impact, significant breach - MEDIUM: Limited impact,
partial compromise - LOW: Minimal impact, quickly recoverable
Likelihood scale: - HIGH: Likely to occur annually - MEDIUM: May
occur over system lifetime - LOW: Unlikely but possible - VERY LOW:
Requires exceptional circumstances
Risk = Impact × Likelihood
+-------------------------------------------------------------------+
| | Impact |
| Likelihood | CRITICAL | HIGH | MEDIUM | LOW |
+-------------------------------------------------------------------+
| HIGH | CRITICAL | HIGH | MEDIUM | LOW |
| MEDIUM | HIGH | MEDIUM | MEDIUM | LOW |
| LOW | MEDIUM | MEDIUM | LOW | LOW |
| VERY LOW | MEDIUM | LOW | LOW | VERY LOW |
+-------------------------------------------------------------------+
Top risks by residual risk (after mitigation):
+-------------------------------------------------------------------+
| Threat | Impact | Likelihood | Residual Risk |
+-------------------------------------------------------------------+
| TM-E-001 Score | HIGH | MEDIUM | MEDIUM |
| manipulation | | | |
| TM-SEN-003 Baseline| HIGH | MEDIUM | MEDIUM |
| poisoning | | | |
| TM-TO-003 Config | HIGH | MEDIUM | MEDIUM |
| attack | | | |
| TM-E-003 Admin | HIGH | MEDIUM | MEDIUM |
| abuse | | | |
| TM-PEP-001 Bypass | HIGH | MEDIUM | MEDIUM |
| TM-D-001 Oracle DoS| HIGH | MEDIUM | MEDIUM |
+-------------------------------------------------------------------+
8.2. Residual Risks
Risks that remain after all mitigations:
8.2.1. Nation-State Attacks
Description: Well-resourced state actor with advanced capabilities
Residual because: - Effectively unlimited resources - Zero-day
capabilities - Supply chain access - Insider recruitment
Acceptance: KTP increases attack cost significantly. Perfect defense
against nation-states is not achievable. Focus on detection and
limiting blast radius.
8.2.2. Insider with Physical Access
Description: Malicious insider with physical access to HSMs
Residual because: - Physical access bypasses many controls - HSM
side-channels exist - Multi-person controls help but don't eliminate
Acceptance: Multi-person access, geographic distribution, and audit
provide defense in depth. Some residual risk accepted.
8.2.3. Novel Cryptographic Attacks
Description: Future attack on current cryptographic algorithms
Residual because: - Cryptography may be broken in future - Quantum
computers may emerge faster than expected
Acceptance: Cryptographic agility allows transition. Hybrid
signatures provide hedge. Monitor cryptographic developments.
8.2.4. Coordinated Multi-Vector Attack
Description: Simultaneous attack on multiple components
Residual because: - Mitigations assume sequential attacks -
Coordinated attack may overwhelm response
Acceptance: Defense in depth limits damage. Each component fails
independently. Monitoring enables detection.
8.2.5. Long-Term Baseline Manipulation
Description: Patient attacker slowly poisons baselines
Residual because: - Drift detection has limits - Very slow changes
may evade detection
Acceptance: External anchors, cross-zone correlation, and periodic
rebaselining from known-good states limit exposure.
9. Security Requirements
Based on threat analysis, implementations MUST meet these security
requirements:
SR-001: Cryptographic Signatures All Trust Proofs MUST be
cryptographically signed per KTP-CRYPTO. Rationale: Prevents forgery
(TM-T-001)
SR-002: Threshold Signing Level 2+ MUST use threshold signatures for
Trust Proofs. Rationale: Prevents single-point compromise (TM-S-002)
SR-003: Transport Security All communication MUST use TLS 1.3.
Rationale: Prevents interception (TM-I-*)
SR-004: Sensor Authentication All sensors MUST authenticate to
aggregators. Rationale: Prevents spoofing (TM-SEN-001)
SR-005: Sensor Diversity Each Context Tensor dimension SHOULD have
multiple sensor types. Rationale: Limits single-sensor compromise
impact
SR-006: Outlier Detection Sensor aggregation MUST implement outlier
detection. Rationale: Detects sensor spoofing
SR-007: Baseline Drift Detection Implementations MUST detect baseline
drift. Rationale: Prevents baseline poisoning (TM-SEN-003)
SR-008: Flight Recorder Integrity Flight Recorder MUST use
cryptographic chaining. Rationale: Prevents tampering (TM-FR-002)
SR-009: Append-Only Audit Flight Recorder MUST be append-only.
Rationale: Prevents deletion (TM-FR-001)
SR-010: No Override Mechanism Implementations MUST NOT include
override for Zeroth Law. Rationale: Prevents privilege escalation
(TM-E-003)
SR-011: Administrator Trust Scores Administrators MUST have Trust
Scores and be subject to A ≤ E. Rationale: Limits insider abuse
(TM-E-003)
SR-012: Short Proof Lifetime Trust Proofs MUST expire within 60
seconds. Rationale: Limits replay window (TM-S-001)
SR-013: Rate Limiting All endpoints MUST implement rate limiting.
Rationale: Limits DoS impact (TM-D-*)
SR-014: Fail-Safe Mode Loss of Oracle MUST result in fail-safe (deny
uncertain). Rationale: Security not degraded by availability attack
SR-015: Soul Immutability Soul constraints MUST NOT be modifiable
through normal config. Rationale: Prevents sovereignty bypass
(TM-E-004)
10. Assumptions and Dependencies
This threat model assumes:
10.1. Cryptographic Assumptions
- ECDSA/EdDSA signatures cannot be forged without private key - Hash
functions are collision-resistant - TLS 1.3 provides
confidentiality and integrity - HSMs protect keys from extraction
If violated: Fundamental security properties fail
10.2. Operational Assumptions
- HSMs are operated according to vendor guidelines - Key ceremonies
are conducted correctly - Administrators follow security procedures
- Monitoring is reviewed and actioned
If violated: Mitigations may not be effective
10.3. Infrastructure Assumptions
- Network segmentation is correctly implemented - Time sources are
reasonably accurate - Hardware is not compromised at manufacture -
Physical security of data centers is adequate
If violated: Multiple threats become more likely
10.4. Dependencies
External dependencies that affect security:
- HSM vendor security - TLS library security - Operating system
security - Cloud provider security (if applicable) - PKI
infrastructure - Time synchronization infrastructure
Each dependency is a potential attack surface.
11. References
11.1. Normative References
[KTP-CORE] Perkins, C., "Kinetic Trust Protocol - Core
Specification", NMCITRA, November 2025.
[KTP-CRYPTO] Perkins, C., "Kinetic Trust Protocol - Cryptographic
Specification", NMCITRA, November 2025.
[KTP-ENFORCE] Perkins, C., "Kinetic Trust Protocol - Enforcement
Layer Specification", NMCITRA, November 2025.
11.2. Informative References
[STRIDE] Microsoft, "The STRIDE Threat Model", 2002.
[DREAD] Microsoft, "DREAD Risk Assessment Model", 2002.
[OWASP] OWASP Foundation, "OWASP Threat Modeling",
https://owasp.org/www-community/Threat_Modeling
Appendix A. Threat Catalog
Complete listing of all identified threats:
Spoofing Threats:
+-------------------------------------------------------------------+
| ID | Name | Risk | Reference |
+-------------------------------------------------------------------+
| TM-S-001 | Agent Identity Spoofing | LOW | §5.1.1 |
| TM-S-002 | Oracle Impersonation | LOW | §5.1.2 |
| TM-S-003 | Sensor Spoofing | MEDIUM | §5.1.3 |
| TM-S-004 | Federation Zone Spoofing| LOW | §5.1.4 |
+-------------------------------------------------------------------+
Tampering Threats:
+-------------------------------------------------------------------+
| ID | Name | Risk | Reference |
+-------------------------------------------------------------------+
| TM-T-001 | Trust Proof Tampering | V.LOW | §5.2.1 |
| TM-T-002 | Trajectory Tampering | LOW | §5.2.2 |
| TM-T-003 | Flight Recorder Tamper | MEDIUM | §5.2.3 |
| TM-T-004 | Configuration Tampering | MEDIUM | §5.2.4 |
+-------------------------------------------------------------------+
Repudiation Threats:
+-------------------------------------------------------------------+
| ID | Name | Risk | Reference |
+-------------------------------------------------------------------+
| TM-R-001 | Action Repudiation | LOW | §5.3.1 |
| TM-R-002 | Oracle Decision Repud. | V.LOW | §5.3.2 |
| TM-R-003 | Sponsorship Repudiation | LOW | §5.3.3 |
+-------------------------------------------------------------------+
Information Disclosure Threats:
+-------------------------------------------------------------------+
| ID | Name | Risk | Reference |
+-------------------------------------------------------------------+
| TM-I-001 | Trust Score Disclosure | MEDIUM | §5.4.1 |
| TM-I-002 | Trajectory Disclosure | MEDIUM | §5.4.2 |
| TM-I-003 | Sensor Data Disclosure | LOW | §5.4.3 |
| TM-I-004 | Key Disclosure | LOW | §5.4.4 |
+-------------------------------------------------------------------+
Denial of Service Threats:
+-------------------------------------------------------------------+
| ID | Name | Risk | Reference |
+-------------------------------------------------------------------+
| TM-D-001 | Trust Oracle DoS | MEDIUM | §5.5.1 |
| TM-D-002 | Sensor Flooding | MEDIUM | §5.5.2 |
| TM-D-003 | Flight Recorder DoS | MEDIUM | §5.5.3 |
| TM-D-004 | Federation DoS | LOW | §5.5.4 |
+-------------------------------------------------------------------+
Elevation of Privilege Threats:
+-------------------------------------------------------------------+
| ID | Name | Risk | Reference |
+-------------------------------------------------------------------+
| TM-E-001 | Trust Score Manipulation| MEDIUM | §5.6.1 |
| TM-E-002 | Tier Boundary Bypass | LOW | §5.6.2 |
| TM-E-003 | Admin Privilege Abuse | MEDIUM | §5.6.3 |
| TM-E-004 | Soul Constraint Bypass | LOW | §5.6.4 |
+-------------------------------------------------------------------+
Appendix B. Mitigation Mapping
Mapping of mitigations to KTP specifications:
+-------------------------------------------------------------------+
| Mitigation | Specification | Section |
+-------------------------------------------------------------------+
| Threshold signatures | KTP-CRYPTO | §4.3 |
| HSM key storage | KTP-CRYPTO | §9 |
| Key rotation | KTP-CRYPTO | §8.4 |
| TLS transport | KTP-TRANSPORT | §5 |
| Rate limiting | KTP-TRANSPORT | §14 |
| Sensor authentication | KTP-SENSORS | §6 |
| Outlier detection | KTP-SENSORS | §2.3 |
| Risk domain aggregation | KTP-SENSORS | §2.3 |
| Baseline drift detection| KTP-PROBLEMS | §6 |
| Trajectory chaining | KTP-IDENTITY | §4 |
| Oracle co-signatures | KTP-IDENTITY | §4.3 |
| Identity proofing | KTP-IDENTITY | §7 |
| Flight Recorder chain | KTP-AUDIT | §4 |
| Append-only storage | KTP-AUDIT | §5 |
| External anchoring | KTP-AUDIT | §6 |
| PEP enforcement | KTP-ENFORCE | §4 |
| Trust tiers | KTP-ENFORCE | §5 |
| No override mechanism | KTP-ENFORCE | §7 |
| Governance recursion | KTP-HUMAN | §5.4 |
| Admin Trust Scores | KTP-HUMAN | §3 |
| Federation Trust Factor | KTP-FEDERATION | §5 |
| Zone discovery signing | KTP-FEDERATION | §4 |
+-------------------------------------------------------------------+
Authors' Addresses
Chris Perkins New Mexico Cyber Intelligence & Threat Response
Alliance (NMCITRA)
Email: cperkins@nmcitra.org