11. Security Model (Spec v2.1.3)

This page mirrors normative security behavior from §§16–17.

1) Hermetic compilation boundary

Phases 1–2 must be hermetic:

2) Import sandbox

@import must be constrained to allowlisted roots. Disallowed import patterns must raise F601:

Import cycle must raise F602.

3) Runtime I/O restrictions

Runtime I/O is allowed only through:

Anything else must raise F801.

4) Policy and runtime guard

Hypervisor must enforce fail-closed runtime guard for guarded operations:

Guard decision must happen before prohibited external initiation.

5) Fail-closed error split

F455 must not replace F454 when deterministic deny is available.

6) Effect classes

Standard effects: read, write, external, payment, filesystem, network.

Key rules:

7) Provenance artifact

Hypervisor run/test may emit Execution Artifact with:

Use artifact data for auditability and reproducible policy enforcement analysis.