Skip to main content

Workload Attestation & Step Tracking — prove what ran, where, why, and catch compromised nodes

Project description

tibet-workload

Workload Attestation & Step Tracking — prove what ran, where, why, and catch compromised nodes.

Part of the TIBET protocol suite by Humotica AI Lab.

The Problem

Relay station 3 is hacked. A delivery drone changes course. An AI pipeline ingests poisoned data. How do you know what happened?

Current solutions tell you who had access. They can't tell you what each step actually did — with cryptographic proof.

The Solution

tibet-workload tracks every step of every pipeline as a TIBET token:

[dispatch] → [relay] → [drone] → [deliver] → [confirm]
   ↓            ↓          ↓          ↓           ↓
  TIBET       TIBET      TIBET      TIBET       TIBET
  token       token      token      token       token

If any step is compromised, the chain breaks. You see exactly:

  • WHAT happened (input/output hashes)
  • WHO executed it (JIS DID / SPIFFE ID)
  • WHERE it ran (node attestation)
  • WHY it ran (intent tracking)

Install

pip install tibet-workload

# With SPIFFE integration:
pip install tibet-workload[spiffe]

Quick Start

from tibet_workload import WorkloadEngine

engine = WorkloadEngine(actor="jis:relay-3")

# Create a workload pipeline
wl = engine.create("drone-delivery-42", owner="jis:dispatch")

# Define steps
engine.add_step(wl.workload_id, "receive_order", intent="Accept delivery order")
engine.add_step(wl.workload_id, "navigate", intent="Navigate to destination")
engine.add_step(wl.workload_id, "deliver", intent="Execute delivery")

# Execute with provenance
engine.start_step(wl.workload_id, "receive_order",
                  input_data={"order": "PKG-42", "dest": "Amsterdam"})
engine.complete_step(wl.workload_id, "receive_order",
                     output_data={"accepted": True})

# Verify chain integrity
chain = engine.verify_chain(wl.workload_id)
print(chain["valid"])  # True (or False if compromised)

Compromise Detection

# If a step's input was tampered with:
engine.complete_step(wl.workload_id, "relay_command",
                     output_data={"forwarded": True},
                     verify_input=tampered_data)
# → Step marked COMPROMISED
# → Workload marked COMPROMISED
# → TIBET token records exactly what happened

CLI

# Full demo (drone + AI + SPIFFE scenarios)
tibet-workload demo

# Specific scenario
tibet-workload demo --scenario drone    # Compromised relay station
tibet-workload demo --scenario ai       # AI pipeline provenance
tibet-workload demo --scenario spiffe   # SPIFFE integration

Use Cases

Military/Defense — Drone Swarm

command → relay-1 → relay-2 → relay-3(HACKED) → drone-swarm
                                  ↑
                            Chain breaks here.
                            Exact tampered data recorded.

AI Pipeline — Data Provenance

data source → preprocessing → model → fact-check → output
     ↓              ↓           ↓         ↓          ↓
  "Where did     "What was    "Which    "Against   "Who
   this data      cleaned?"   model?"   what?"     reviewed?"
   come from?"

Delivery/Logistics — Chain of Custody

warehouse → sort → load → transit → deliver → confirm

Financial — Payment Pipeline

validate → authorize → process → settle → audit

SPIFFE Integration

from tibet_spiffe import AttestationEngine
from tibet_workload import WorkloadEngine

# Connect SPIFFE for workload identity
spiffe = AttestationEngine(trust_domain="humotica.com")
engine = WorkloadEngine()
engine.connect_spiffe(spiffe)

# Now each step gets SPIFFE-attested identity + TIBET provenance

IETF Drafts

License

MIT — Humotica AI Lab 2025-2026

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tibet_workload-0.1.0.tar.gz (11.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tibet_workload-0.1.0-py3-none-any.whl (13.4 kB view details)

Uploaded Python 3

File details

Details for the file tibet_workload-0.1.0.tar.gz.

File metadata

  • Download URL: tibet_workload-0.1.0.tar.gz
  • Upload date:
  • Size: 11.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_workload-0.1.0.tar.gz
Algorithm Hash digest
SHA256 6ad89c291fa19f3272132b4134e71660164f2b2f0e6ac072fb6a7f49b3aca749
MD5 53b7960d31bdfec2e09fb59fda1e52f8
BLAKE2b-256 c75c2e32688c158d31e90f0b8e9b777c6528fc795271c6492e8955228916c176

See more details on using hashes here.

File details

Details for the file tibet_workload-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: tibet_workload-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 13.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_workload-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 47c78d998d9083844eef5aa786bdc2d7b0626a023c94ec794974549625280b76
MD5 eb43dbba7158b88c05c1c332ab8be90a
BLAKE2b-256 d059c1f98581a1ab50062a17171e380c872eca0a4a0fed9aea7a0988bc2e25be

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page