Skip to content

Threat Model

This model focuses on practical threats and mitigations across service boundaries.

Trust Boundary Diagram

Primary Threat Classes

ThreatBoundaryRiskMitigations
Unauthorized API accessportal/control/coordinatoraccount takeover or misuseauth checks, role gates, token enforcement
Rogue node participationcoordinator/workerworkload integrity and data exposure riskenrollment tokens, approval workflow, blacklist propagation
Tampered runtime executionworkerincorrect or unsafe executionconstrained execution model, subset/sandbox controls
Model supply-chain driftinference/model sourceuntrusted model behaviorapproved source policy, rollout controls, integrity validation
Economic record manipulationeconomy/ledgerpayout and credit corruptionappend-only verification, audit checks, reconciliation
Replay or forged internal requestscoordinator/inferenceworkflow spoofingsigned requests, nonce/timestamp validation

Defense Strategy

  • Prevent: strong identity, strict routing policy, least-privilege roles.
  • Detect: health checks, audit records, anomaly monitoring.
  • Respond: isolate affected nodes, pause assignment paths, reconcile state.
  • Recover: staged re-enable with verification and post-incident review.

References