Compliance

OWASP Agentic Skills Top 10 — Compliance Posture

How SwarmSpace maps to the OWASP AST10 framework (v1.0, 2026 Edition). This page is for developers and security reviewers evaluating the platform.

Implemented Code exists and is enforced in production
Partially Implemented Some controls enforced; gaps remain
Designed Spec and architecture defined; no runtime enforcement
Planned Acknowledged but not yet designed or built

AST01 — Malicious Skills

Malicious Skills Designed

What SwarmSpace does

The manifest spec includes Ed25519 signing and content_hash (SHA-256) fields for verifying plugin authenticity. Trust revocation is instant — removing a plugin from the index disables it universally with no uninstall needed, which is architecturally true today.

Current gaps

No signing or verification code has been implemented yet. The Ed25519 and content-hash fields exist in the spec only. Until signing is enforced, authenticity verification depends on manual review during submission.

AST02 — Supply Chain Compromise

Supply Chain Compromise Partially Designed

What SwarmSpace does

The manifest spec includes Ed25519 signing and content_hash fields for integrity verification. Plugins are API endpoints, not installable code — there are no executable uploads, which eliminates an entire class of supply-chain vectors.

Current gaps

No hash verification code exists yet. While the API-endpoint architecture avoids binary supply-chain risks, manifest integrity checking is spec-only and not enforced at runtime.

AST03 — Over-Privileged Skills

Over-Privileged Skills Designed

What SwarmSpace does

The manifest spec defines network_permissions (explicit domain allowlist replacing binary network on/off), deny_write (protects identity, memory, and context files), and data_required (declares what user data a plugin needs). These fields enable fine-grained least-privilege declarations.

Current gaps

No code currently validates or enforces these constraints at execution time. The fields exist in the manifest schema but are not checked at the runtime layer. Until enforcement ships, privilege restriction depends on manual review.

AST04 — Insecure Metadata (formerly: Inadequate Sandboxing)

Insecure Metadata Partially Addressed

Inconsistent or misleading metadata formats allow skill impersonation and misrepresentation.

What SwarmSpace does
Current gaps

No runtime enforcement of metadata accuracy — a plugin’s declared capabilities may differ from its actual behavior. Metadata fields are declared but not validated against actual plugin behavior at runtime. Ed25519 signing of metadata is spec-only (no verification code exists).

AST05 — Unsafe Deserialization (formerly: Insecure Inter-Skill Communication)

Unsafe Deserialization Partially Implemented

YAML/JSON/Markdown deserialization vulnerabilities enable code execution on skill load.

What SwarmSpace does
Current gaps

Plugin JSON responses are not validated against a declared output schema before being passed to agents, which leaves a vector for malformed or adversarial output injection.

AST06 — Weak Isolation (formerly: Insufficient User Consent)

Weak Isolation Partially Implemented

Running skills without containerization/sandboxing exposes the host system.

What SwarmSpace does
Current gaps

Credential isolation is not yet scoped per-tenant. Plugin credentials are shared across tenants rather than isolated per-user context.

AST07 — Update Drift

Update Drift Designed

What SwarmSpace does

The manifest spec includes a version_pinning field that enables consumers to lock to specific plugin versions. This is a prerequisite for safe updates and rollback.

Current gaps

No pinning or version-check code exists yet. Alerting on plugin updates and re-review flagging are planned but not implemented. Plugins can change behavior between calls without any notification to consumers.

AST08 — Poor Scanning

Poor Scanning Partially Addressed

What SwarmSpace does
Current gaps

A full behavioral and semantic scanning pipeline is not yet deployed. Plugin review is currently manual. Automated runtime behavioral analysis and continuous scanning are planned.

AST09 — No Governance

No Governance Partially Implemented

What SwarmSpace does
Current gaps

The risk_tier field (L0–L3) exists in the manifest spec but is not enforced at runtime. Governance tooling for automated merit reviews and tier transitions is planned but not yet built.

AST10 — Cross-Platform Reuse (formerly: Lack of Observability)

Cross-Platform Reuse Designed

Security properties lost when skills are ported across platforms without translation.

What SwarmSpace does
Current gaps

Security properties defined in the manifest are only enforced within the SwarmSpace runtime. When plugins are accessed outside the SwarmSpace router (e.g., direct API calls), declared security properties like network_permissions and deny_write have no enforcement mechanism. No cross-platform security property translation or verification exists.

OWASP “Lethal Trifecta” Mapping

OWASP defines the lethal trifecta as three capabilities that, combined, create maximum risk for agentic systems.

ChannelSwarmSpace controlStatus
Access to private data data_required field + PRISM consent flow Designed, not enforced
Exposure to untrusted content Output schema validation + untrusted data wrapping Planned
Ability to communicate externally network_permissions allowlist + deny_write protection Spec only, no enforcement

PRISM consent fields are defined in the manifest spec; runtime enforcement is not yet in place. Full lethal trifecta coverage requires implementing the controls listed in the Compliance Timeline below.

Compliance Timeline

MilestoneStatus
Manifest spec aligned with AST10 fieldsComplete (spec only — no runtime enforcement)
PRISM consent flow for privacy-sensitive pluginsDesigned, not enforced
Activity logging and observabilityComplete
Ed25519 manifest signing for Verified tierDesigned (no signing code exists)
Runtime enforcement of network_permissions, deny_write, risk_tierPlanned
Output schema validation for plugin responsesPlanned
Version pinning and update alertingPlanned
Behavioral scanning pipelinePlanned

Honest Limitations

What is NOT solved yet

What is designed but not enforced

References

Documentation & Standards