Skip to content

chore: migrate proof primitives and enforce fail-closed gate exits#43

Merged
davidahmann merged 1 commit intomainfrom
codex/adhoc-proof-migration
Feb 18, 2026
Merged

chore: migrate proof primitives and enforce fail-closed gate exits#43
davidahmann merged 1 commit intomainfrom
codex/adhoc-proof-migration

Conversation

@davidahmann
Copy link
Collaborator

Summary

  • migrate Gait proof primitives to github.com/Clyra-AI/proof compatibility packages
  • keep signature compatibility semantics while enforcing fail-closed verification behavior
  • update pack build/verify flows, docs, tests, and fixtures for the proof migration

Validation

  • make prepush-full
  • ./gait doctor --json

@davidahmann davidahmann merged commit 388107a into main Feb 18, 2026
7 checks passed
@davidahmann davidahmann deleted the codex/adhoc-proof-migration branch February 18, 2026 14:41
Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 745825ed92

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

func validateMCPBoundaryOAuthEvidence(call mcp.ToolCall, profile gateEvalProfile) error {
mode := strings.ToLower(strings.TrimSpace(call.Context.AuthMode))
if mode == "" {
if raw, ok := call.Context.AuthContext["oauth_mode"]; ok {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Read auth_mode from auth_context for OAuth fail-closed checks

In validateMCPBoundaryOAuthEvidence, the fallback reads call.Context.AuthContext["oauth_mode"], but the rest of this change propagates mode as auth_mode (see core/mcp/proxy.go), so requests that carry OAuth mode only in context.auth_context.auth_mode are treated as if no mode was provided. In oss-prod, that path hits the early return nil branch when OAuthEvidence is not set on the top-level context, which lets boundary calls bypass the new required OAuth evidence enforcement instead of failing closed.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant

Comments