Context
In a cFS-on-WASM architecture, each flight software app (Stored Command, Limit Checker, Scheduler, etc.) is an independent WASM component. Sigil's supply chain attestation becomes critical: each component needs independent signing and verification before deployment to safety-critical targets.
Proposal
Mission-Specific Signing Policies
# sigil-policy.toml
[mission]
name = "artemis-gateway"
classification = "class-a"
[policy]
# All components must have at least 2 signers
min_signers = 2
# Components must be signed by both developer and IV&V
required_roles = ["developer", "ivv"]
# Verification evidence must be attached
require_attestation = ["loom-verified", "synth-z3-validated", "meld-proof-checked"]
# Component-specific overrides
[policy.components."health-safety"]
# HS is safety-critical — require additional safety review
required_roles = ["developer", "ivv", "safety-reviewer"]
require_attestation = ["loom-verified", "synth-z3-validated", "meld-proof-checked", "stpa-reviewed"]
Attestation Chain
Each WASM component carries embedded attestations from the build pipeline:
- Loom attestation: "This component was optimized with Z3-verified passes"
- Meld attestation: "This component was fused with Rocq-proven merge correctness"
- Synth attestation: "This component was compiled with Z3 translation validation"
- Sigil signature: Developer + IV&V signatures on the final binary
Verification at Load Time
When Kiln loads a component (or Gale loads a Synth-compiled ELF):
- Verify Sigil signatures against mission policy
- Check attestation chain completeness
- Reject components missing required verification evidence
- Log verification results for mission audit trail
Connects to
- kiln#231: cFS reference architecture (components need signing)
- kiln#227: Executive Services (component loading with verification)
Priority
Medium — important for certification but can follow component development.
Context
In a cFS-on-WASM architecture, each flight software app (Stored Command, Limit Checker, Scheduler, etc.) is an independent WASM component. Sigil's supply chain attestation becomes critical: each component needs independent signing and verification before deployment to safety-critical targets.
Proposal
Mission-Specific Signing Policies
Attestation Chain
Each WASM component carries embedded attestations from the build pipeline:
Verification at Load Time
When Kiln loads a component (or Gale loads a Synth-compiled ELF):
Connects to
Priority
Medium — important for certification but can follow component development.