Sentinel Core v2.2 Auditor Core v2.2 Embedded

Stop Threats Before They Emerge

Deterministic security gate for CI/CD pipelines. Intercepts every commit, runs Auditor Core v2.2 internally, enforces policy in real-time. ALLOW or BLOCK β€” no ambiguity, no silent bypass. Hardware-bound licensing. 100% local execution.

Gate: ACTIVE

$ git push origin main

[SENTINEL] Analyzing commit…

βœ“ Security policy satisfied

2
States Only: ALLOW / BLOCK
11
Embedded Detectors
0
Silent Bypasses
HW
Hardware-Bound License
AI
Gemini + Groq Advisory

Deterministic by Design

Unlike scanners that provide risk opinions, Sentinel delivers authoritative decisions. Every execution results in exactly one of two states.

ALLOW (exit 0)

Zero violations detected. Code meets all security policies. Pipeline proceeds without interruption.

Pipeline Proceeds

BLOCK (exit 1)

Critical violations detected. Pipeline terminates immediately. Alert created in GitHub Issues with full details.

Pipeline Terminated

WARN (Audited)

Overridden violation with formal justification in sentinel.yaml. Pipeline proceeds with full audit trail.

Audited Exception

Audit-First Exception Model

Violations cannot be silently ignored. Every exception must be formally justified in sentinel.yaml β€” creating an immutable audit trail visible to administrators.

# sentinel.yaml β€” Policy Overrides
overrides:
- rule_id: "SUPPLY-001"
justification: "Legacy base image required for test-suite compatibility"
- rule_id: "SEC-001"
justification: "Verified public mock token for internal tests only"

How Sentinel Works

Two enforcement layers β€” pre-commit hook for local development, CI/CD pipeline for every push.

Developer Commits
git commit β†’ pre-commit hook fires
git commit
Sentinel + Auditor Core
11 detectors scan changed files
SCANNING
Policy Decision
ALLOW, BLOCK, or WARN
ALLOW
Pipeline Proceeds
Build β†’ Test β†’ Deploy
Only if ALLOW
1

Pre-commit Hook Intercepts

Installed by start.sh in .git/hooks/pre-commit. Fires before every commit β€” developer cannot bypass without explicit --no-verify flag (which triggers CI/CD alert).

2

Auditor Core v2.2 Scans Changed Files

Full 11-engine scan runs internally β€” Bandit, Semgrep, Gitleaks, Secret Detector, CICD Analyzer, IaC Scanner, Dependency Scanner and more. Same engine, same WSPM v2.2 scoring. Every blocked commit report includes a PDF Evidence Appendix with source-level code context for CRITICAL/HIGH findings, and compliance tags (SOC 2 TSC Β· CIS Controls v8 Β· ISO/IEC 27001:2022).

3

AI Verifies Top Findings

Gemini 2.5 analyzes critical findings β€” eliminates false positives before policy enforcement. Groq (Llama 3.3 70B) takes over automatically if Gemini quota is exhausted.

Findings
Gemini
Groq
Verified
4

BLOCK β†’ GitHub Issue Alert

Every blocked commit automatically creates a GitHub Issue in the admin repository β€” machine identity, developer username, timestamp, violation details. Immutable audit trail.

❌ BLOCK β€” SEC-001: Hardcoded Password
Environment: πŸ’» Local Development
Machine: worker-pc-01 | Triggered by: developer_username
Timestamp: 2026-03-13 14:22:01
Controls: SOC2-CC6.1 Β· CIS-16.1 Β· ISO-A.5.17
πŸš€ Alert sent β†’ admin-repo #47
5

CI/CD Pipeline β€” Second Line of Defence

GitHub Actions workflow runs sentinel scan . on every push. Even if a developer bypasses the local hook, the CI/CD gate blocks the push and alerts the admin.

Built-in Security Rules

Policy-driven enforcement β€” each rule maps to a specific threat class with configurable BLOCK / WARN response.

Hardcoded Secrets
SEC-001 Β· BLOCK

AWS keys, API tokens, private keys, passwords hardcoded in source files or committed to git history.

Docker Integrity
SUPPLY-001 Β· BLOCK

Mutable :latest tags prohibited. Pinned digest versions enforced for build reproducibility.

GitHub Actions Pinning
CICD-001 Β· BLOCK

SHA pinning enforced for all GitHub Actions β€” prevents supply chain attacks via compromised action versions.

Kubernetes Security
INFRA-K8S-001 Β· BLOCK

runAsNonRoot and resource limits enforced in all K8s manifests. Privilege escalation blocked.

MQTT IoT Security
IOT-001 Β· WARN

Unencrypted MQTT connections and insecure broker configurations in IoT infrastructure code.

Supply Chain
DEP-001 Β· BLOCK

Unpinned dependencies, known CVEs in requirements. Prevents vulnerable packages from entering the build.

Zero-Leakage Guarantee

Sentinel forbids all unsanctioned network access at runtime by design. Safe for air-gapped environments.

No Telemetry

No usage data collected. Sentinel operates without phoning home under any circumstance.

Air-Gap Ready

Operates without internet access. Safe for classified, banking, and high-security internal environments.

Immutable Logic

Never self-updates or pulls remote rules at runtime. Security logic is Cython-compiled and guaranteed.

Hardware-Bound Licensing

Each license is cryptographically tied to your machine's hardware identifier. Non-transferable by design.

1

Get Your Machine ID

Run on every machine where Sentinel will be deployed:

python3 get_id.py
2

Send Machine ID β†’ Receive License Key

Email your Machine ID to [email protected]. You will receive a License Key unique to that machine.

3

Run start.sh in Target Repository

Installs Sentinel, configures .env, sets up pre-commit hook and CI/CD workflow automatically.

bash start.sh
4

Test the Gate

echo 'password = "admin123"' > test.py
git add test.py && git commit -m "test"

Expected: commit blocked, GitHub Issue created, alert sent.

A License Key issued for one Machine ID will not work on any other machine. Each deployment requires its own key. Cannot be copied, transferred, or shared.
NEW IN v2.2

What's New in Sentinel v2.2

Every improvement to Auditor Core v2.2 propagates automatically to the enforcement gate.

PDF Evidence Appendix

Every blocked commit report now includes source-level code context for CRITICAL/HIGH findings β€” audit-defensible out of the box.

SOC 2 / CIS / ISO 27001 Mapping

Every finding tagged to specific controls in JSON and PDF output. Compliance tags included in every GitHub Issue alert.

Gate Override

Effective grade capped at C when CRITICAL findings exist in production code β€” regardless of SPI score.

Context Intelligence

NON_RUNTIME context for test/, docs/, examples/ excluded from SPI. Taint analysis and reachability scoring applied before enforcement.

Duplicate Aggregation

Multiple findings in the same file grouped as one block with line list in PDF output. NUL-byte sanitization prevents binary files from causing scan failures.

Cython-Compiled Distribution

Delivered as .so compiled modules for IP protection. Consistent verdict labels across PDF and HTML report formats.

Frequently Asked Questions

Can a developer bypass Sentinel?

A developer can run git commit --no-verify locally. However, the CI/CD pipeline catches the push, blocks it, and sends an alert to the administrator with the developer's identity, machine ID, and timestamp.

Does Sentinel slow down commits?

Basic scanning takes 2–5 seconds on typical projects. With Gemini AI analysis enabled β€” 15–30 seconds depending on project size and number of findings sent for verification.

What happens if Gemini API is unavailable?

Groq (Llama 3.3 70B) takes over automatically. If both are unavailable, Sentinel continues operating without AI enrichment β€” all core enforcement rules run fully offline at all times.

Is developer activity logged?

Yes. Every blocked commit is recorded as a GitHub Issue with machine identity, username, timestamp, and violation details β€” creating an immutable audit trail. Developers have no access to the enforcement dashboard.

How is Sentinel different from Auditor Core?

Auditor Core is a deep audit engine β€” run on demand to produce comprehensive posture reports with SPI score. Sentinel is a real-time enforcement gate that intercepts every commit. Sentinel uses Auditor Core internally as its scanning engine.

Ready to Secure Your Perimeter?

Stop threats before they emerge. ALLOW or BLOCK β€” no ambiguity.

No telemetry Β· 100% local execution Β· Hardware-bound licensing Β· Python 3.10+ Β· Linux / macOS / Windows