π SENTINEL Changelog
All notable changes to the SENTINEL AI Security Platform.
[3.0.0] - 2026-02-26 (Sentinel Lattice β 7 Novel Security Primitives)
π¬ Sentinel Lattice Engines (8 new β 59 total)
Seven original security primitives from our arXiv paper, plus L2 Capability Proxy:
| Engine |
File |
Tests |
Primitive |
| TSA |
temporal_safety.rs |
23 |
Temporal Safety Automata β LTL β O(1) monitors |
| L2 |
capability_proxy.rs |
24 |
Capability Proxy + IFC β Bell-LaPadula, NEVER lists |
| AAS |
argumentation_safety.rs |
30 |
Adversarial Argumentation β Dung 1995 grounded semantics |
| CAFL |
capability_flow.rs |
24 |
Capability-Attenuating Flow Labels |
| GPS |
goal_predictability.rs |
27 |
Goal Predictability Score β 16-bit state enumeration |
| IRM |
intent_revelation.rs |
28 |
Intent Revelation Mechanisms β economics-based |
| MIRE |
model_containment.rs |
28 |
Model-Irrelevance Containment β Goldwasser-Kim |
| PASR |
provenance_reduction.rs |
22 |
Provenance-Annotated Semantic Reduction β fibrations |
π Test Suite
- 1101 tests passing, 0 failures (up from 887)
- 206 new tests across 8 Lattice engines
- All engines integrated in
mod.rs (4 integration points each)
π Documentation Radical Restructuring
- Removed 43 dead files:
docs/framework/, docs/getting-started/, docs/guides/, docs/operations/, docs/architecture/, docs/articles/, docs/examples/, docs/index.html, 13 sensitive security files (audit reports, OSINT, real vulnerability submissions)
- Rewrote root docs:
README.md, QUICKSTART.md, SECURITY.md, devkit/README.md
- Rewrote docs hub:
docs/README.md, ARCHITECTURE.md, COMPARISON.md, CONTRIBUTING.md
- Updated all reference docs:
engines-en.md, engines.md (49β59 engines), owasp_agentic_mapping.md (PythonβRust, coverage 2/10β6/10), api.md, compliance.md, design-review.md, micro-swarm.md, requirements.md
- Removed all Python API references from documentation (no more
from brain.X import)
- Updated academy files with correct engine counts
π OWASP Agentic AI Coverage Improvement
| Before |
After |
| β
2/10 Full |
β
6/10 Full |
| β οΈ 3/10 Partial |
β οΈ 3/10 Partial |
| β 5/10 None |
β 1/10 None |
Lattice primitives now cover ASI01-ASI04, ASI06, ASI09, ASI10 formally.
π arXiv Paper
- 23-page paper: βThe Sentinel Lattice: Seven Security Primitives for AI Systemsβ
- Category: cs.CR (Cryptography and Security)
- PDF:
papers/sentinel-lattice/main.pdf
[2.0.0] - 2026-02-16 (Rust Migration + Micro-Model Swarm)
π¦ Engine Migration
- 49 Rust Super-Engines consolidating 220+ legacy Python engines
- PyO3 bindings: <1ms per engine inference
- Legacy engines archived in
_archive/brain-engines-python/
- STRIKE rewritten in Go
π Micro-Model Swarm v0.4.0
- TextFeatureExtractor: 22 features from raw text
- JailbreakPreset: 4-domain detection (F1=0.997, Accuracy=99.7%)
- Trained on 87,056 real jailbreak patterns
- Additional presets: adtech, security, fraud, strike
π Documentation Overhaul
- Removed outdated expert-deep-dive files (~1MB dead weight)
- Updated all references: 217 Python engines β 49 Rust Super-Engines
- New:
docs/reference/micro-swarm.md
- Updated: ARCHITECTURE, README, COMPARISON, engines reference
[1.7.0] - 2026-01-18 (CVE-2026-22812 + RLM v1.0.1 Security Fix)
π― New STRIKE Payloads (24)
AI Coding Assistant RCE (CVE-2026-22812):
- OpenCode unauthenticated local HTTP API exploitation
- Session hijacking, file read, reverse shell vectors
- Browser-based CORS exploitation (pre-fix)
- AI coding assistant port database (Cursor, Codeium, TabNine, Continue)
- Removed unsafe
exec() fallback in PythonREPLTool
- Expanded
BLOCKED_IMPORTS from 22 to 38 modules
- Added:
shelve, dill, cloudpickle, code, codeop, http, urllib, ftplib, telnetlib, smtplib, tempfile, glob, fnmatch, asyncio, webbrowser, platform
- Security audit: 25/25 tests passing
π¬ R&D Intelligence (10 Sources)
- ETSI EN 304 223 β First global AI security standard
- arXiv:2510.26702 β Intent-Based Permissions
- Anthropic Red Team β Claude 4.5 autonomous exploit
- OpenA2A β ServiceNow AI vulnerability
- CVE-2026-22812 β OpenCode RCE
π§ͺ R&D Queue (Pending Review)
Potential integration: RLM-Toolkit InfiniRetri, H-MEM scoring, SENTINEL Brain long-context engines
π Full Analysis
π Statistics
- New Payloads: 24
- Blocked Modules: 38
- RLM Tests: 927 passing
[1.6.3] - 2026-01-09 (R&D Gap Closure)
π New Patterns & Rules (+38)
Based on R&D Digest Jan 9, 2026 threat analysis:
MCP OAuth Validation (17 patterns)
Extended mcp_security_monitor.py with credential/OAuth detection:
| Category |
Count |
Detection |
| credential_exposure |
12 |
API keys, tokens, passwords, AWS/GitHub/GitLab secrets |
| oauth_misconfiguration |
5 |
OAuth 2.0 (not 2.1), implicit grant, weak token lifetime |
Claude Code CVE-2025-64755 (9 patterns)
New patterns in jailbreaks.yaml for Claude-specific attacks:
- Privilege escalation: allow file ops, sudo, bypass permissions
- Authority bypass: developer mode, Anthropic internal testing
- Autonomous mode abuse
Silicon Psyche AVI (12 patterns)
Anthropomorphic Vulnerability Inheritance patterns from arxiv paper:
| Category |
Count |
Detection |
| psychological_authority |
5 |
Fake CEO/creator commands, internal directives |
| psychological_temporal |
4 |
Time pressure, emergency bypass |
| psychological_convergent |
3 |
Fake agreement history |
π Statistics
- New Patterns: 38
- Total Jailbreak Patterns: 81 β 102
- SDD Specs: +3 (mcp-oauth, claude-code, silicon-psyche)
π₯ Threat Sources
- CVE-2025-64755 (Claude Code RCE)
- GTG-1002 APT using Claude Code
- arxiv βThe Silicon Psycheβ (Jan 2026)
- MCP CVEs (CVSS 7.3-9.6)
[1.6.2] - 2026-01-09 (Gap Closure Sprint)
π New Security Engines (2)
Based on AI Security Digest Week 1 2026 gap analysis:
SandboxMonitor (ASI05 - Unexpected Code Execution)
Detects Python sandbox escape techniques.
| Category |
Detection |
| os_execution |
os.system(), os.popen(), os.exec*() |
| subprocess_execution |
subprocess.Popen/call/run() |
| dynamic_execution |
eval(), exec(), import() |
| builtins_manipulation |
builtins, globals, subclasses() |
| sensitive_file_access |
/etc/passwd, .ssh/, .aws/ |
| code_obfuscation |
base64.b64decode, bytes.fromhex |
| ctypes_escape |
ctypes.CDLL, ctypes.pythonapi |
Validates AI marketplace skills and extensions.
| Category |
Detection |
| typosquatting |
Similar names to known packages |
| publisher_impersonation |
Fake verified publishers |
| dangerous_permissions |
file_system, shell_exec, network |
| permission_combo |
Lethal combinations (file + network) |
| suspicious_code |
Exfiltration URLs, obfuscation |
π Statistics
- Total Synced Engines: 29 β 31
- New Tests: 34
- LOC Added: ~1,000
[1.6.1] - 2026-01-09 (Lasso Security Integration)
π New Jailbreak Patterns (21)
Integrated prompt injection detection patterns from lasso-security/claude-hooks:
| Category |
Count |
Detection |
| Encoding/Obfuscation |
5 |
Base64, Hex, Leetspeak, Homoglyphs, Zero-width |
| Context Manipulation |
5 |
Fake admin claims, JSON role injection |
| Instruction Smuggling |
3 |
HTML/C/Hash comment injection |
| Extended Injection |
4 |
Delimiters, training forget |
| Extended Roleplay |
4 |
Pretend you are, evil twin |
π Files Modified
src/brain/config/jailbreaks.yaml β +160 lines, 21 new patterns
tests/test_lasso_patterns.py β New test suite (10 tests)
π Statistics
- Total Patterns: 60 β 81
- Test Coverage: +10 tests
π SDD Spec
.kiro/specs/lasso-patterns-integration/ β Full spec-driven development cycle
π₯ Threat Source
[1.6.0] - 2026-01-08 (AWS-Inspired Feature Sprint)
π New Feature Modules
Inspired by AWS Security Agent, added 3 major feature modules:
Custom Security Requirements
User-defined security policies with OWASP mappings.
requirements/models.py β Data models
requirements/storage.py β YAML + SQLite storage
requirements/enforcer.py β Engine integration
api/requirements_api.py β REST endpoints
configs/default.yaml β 12 OWASP-mapped defaults
Unified Compliance Report
One scan β coverage across all frameworks.
AI Design Review
Analyze architecture docs for AI security risks.
π Statistics
| Module |
LOC |
Tests |
| Requirements |
~1,100 |
9 |
| Compliance |
~620 |
12 |
| Design Review |
~550 |
12 |
| Total |
~2,700 |
33 |
π REST API Endpoints
POST /requirements/sets β Create requirement set
GET /requirements/sets/{id} β Get requirements
POST /requirements/sets/{id}/check β Check text
GET /compliance/coverage β Coverage summary
POST /compliance/report β Generate report
POST /design-review/documents β Review documents
[1.5.0] - 2026-01-07 (Security Engines R&D Marathon)
π New Security Engines (8)
- SupplyChainScanner β Detects malicious patterns in AI model code
- Pickle RCE detection (
__reduce__, exec, eval)
- HuggingFace
trust_remote_code=True warnings
- Sleeper trigger patterns in code
- Exfiltration URL detection
- MCPSecurityMonitor β MCP tool abuse detection
- Sensitive file access (
/etc/passwd, ~/.ssh)
- Dangerous tool usage (
shell_exec, bash)
- Data exfiltration patterns
- Command injection detection
- AgenticBehaviorAnalyzer β AI agent anomaly detection
- Goal drift detection
- Deceptive behavior patterns
- Cascading hallucination detection
- Action loop detection
- SleeperAgentDetector β Dormant malicious code detection
- Date-based triggers (
year >= 2026)
- Environment triggers (
PRODUCTION)
- Version-based triggers
- Counter/threshold triggers
- ModelIntegrityVerifier β Model file integrity verification
- Format safety (safetensors > pickle)
- Hash computation and verification
- Magic byte verification
- Suspicious content scanning
- GuardrailsEngine β NeMo-style content filtering
- Moderation rails (hate speech, violence)
- Jailbreak rails (DAN, prompt injection)
- Fact-check rails
- Custom rail support
- PromptLeakDetector β System prompt extraction prevention
- Direct extraction attempts
- Encoded extraction (base64, rot13)
- Role-play extraction
- Markdown exploitation
- AIIncidentRunbook β Automated incident response
- 8 incident types supported
- Automated response actions
- Escalation paths
- Integration hooks
π§ͺ Unit Tests (104 new)
test_supply_chain_scanner.py β 18 tests
test_mcp_security_monitor.py β 22 tests
test_agentic_behavior_analyzer.py β 20 tests
test_sleeper_agent_detector.py β 22 tests
test_model_integrity_verifier.py β 22 tests
π Documentation
- Engine README with usage examples
- AI Observability research (LangSmith, Helicone)
- AI Incident Response research (CISA, NIST)
- EU AI Act compliance roadmap
- NIST AI RMF 2.0 integration guide
π Statistics
- New Engines: 8 (~2,125 LOC)
- New Tests: 104 (~800 LOC)
- Research Docs: 8 (~3,400 LOC)
- Total Engines: 212 β 220
π₯ Threat Sources
- Anthropic βSleeper Agentsβ research
- NVIDIA NeMo Guardrails
- CISA AI Cybersecurity Playbook
- EU AI Act (Aug 2026 compliance)
- NIST AI RMF 2.0 + GenAI Profile
[1.4.0] - 2026-01-07 (Deep R&D)
π¨ New Engines (HiddenLayer/Promptfoo Research Response)
- LethalTrifectaDetector β Detects agents with all three vulnerable conditions
- Private data access + untrusted content + external communication
- MCP server combination analysis
- Tool capability scanning
- Risk scoring and recommendations
- MCPCombinationAttackDetector β Detects multi-MCP server attack chains
- Tracks MCP servers used in session
- Detects Fetch + Filesystem exfiltration pattern
- URL encoding exfiltration detection
- Session-based permission tracking
π‘οΈ Enhanced Engines
- PolicyPuppetryDetector β +14 HiddenLayer patterns
<blocked-string> declarations detection
<blocked-modes> bypass detection
<interaction-config> full config injection
- Leetspeak variants (1nstruct1on, byp4ss, 0verr1de)
π Statistics
- New Engines: 2 (~750 LOC)
- Enhanced Engines: 1 (+14 patterns, +5 keywords)
- Total Engines: 217
π₯ Threat Sources
Based on Deep R&D analysis:
- HiddenLayer: βNovel Universal Bypass for All Major LLMsβ (Policy Puppetry)
- HiddenLayer: βMCP: Model Context Pitfalls in an Agentic Worldβ
- Promptfoo: βClaude Code Attack Replicationβ
[1.3.0] - 2026-01-07
π¨ New Engines (AISecHub Threat Response)
- HITLFatigueDetector β Human-in-the-loop oversight degradation detection
- Response time analysis (< 500ms = not reading)
- 100% approval rate = rubber-stamping
- Session duration > 4h = reduced attention
- Night-time operation risk scoring
- Recommendations for operator breaks
π‘οΈ Enhanced Engines
- SupplyChainGuard β +IDEMarketplaceValidator
- VSCode Marketplace & OpenVSX registry validation
- Claude Code Skills security checks
- Cursor/Windsurf/Trae extension validation
- Typosquatting detection for AI extensions
- Malicious permission detection (webRequest, cookies, etc.)
- AgenticMonitor β +AutonomousLoopController
- Infinite loop detection (same tool > 10 times)
- Token budget enforcement (100K default)
- Loop timeout (5 min default)
- Task deviation monitoring
- Force termination capability
π Statistics
- Total Engines: 212 β 215
- supply_chain_guard.py: 441 β ~700 LOC
- agentic_monitor.py: 717 β ~920 LOC
- New file: hitl_fatigue_detector.py (~400 LOC)
π₯ Threat Source
All engines added in response to AISecHub Telegram (Jan 7, 2026):
- 900K users affected by malicious AI Chrome extensions
- Claude Code βskillβ injection attacks
- Agentic loop human-in-the-loop fatigue
[1.2.0] - 2026-01-02
π₯ New Engines (6)
- FlipAttackDetector β Character/word reversal attacks (ICLR 2025, 98% ASR on GPT-4o)
- FCS/FCW/FWO mode detection
- Bigram entropy analysis
- Explicit instruction patterns
- ImageStegoDetector β Multimodal injection attacks (AgentFlayer/Odysseus)
- White-on-white text detection
- LSB pattern analysis
- Scaling artifact detection
- FallacyFailureDetector β Logic manipulation attacks
- 7 fallacy types: false_premise, false_dichotomy, circular, appeal_authority, straw_man, slippery_slope, special_pleading
- PsychologicalJailbreakDetector β RLHF exploitation attacks
- 5 categories: persona, trait, authority, emotional, gaslight
- MisinformationDetector β OWASP LLM09 coverage
- Fake news, fabrication, conspiracy, propaganda, deepfake
π‘οΈ Enhanced Engines
- PolicyPuppetryDetector β +9 XML/JSON structured injection patterns
- CrescendoDetector β +10 RL-MTJail multi-turn patterns
- SemanticDriftDetector β MEEA_DRIFT type +
detect_meea_drift() method
π Statistics
- Total Engines: 201 β 207
- SyncedAttackDetector: 13 β 17 engines
- Lines of Code: 105,675
- R&D Gaps Closed: 8/8 (100%)
[1.1.0] - 2026-01-01
π₯ New Engines
- EvolutiveAttackDetector β Real-time LLM-Virus detection (GeneticAlgorithm attacks)
- SimHash similarity for mutation detection
- 5 signals: mutation_cluster, rapid_iteration, fitness_improvement, crossover, generation_cycle
- Risk levels with confidence scoring
- MoEGuardEngine β Detection of Mixture-of-Experts safety bypass attacks
- Counters GateBreaker (arxiv:2512.21008) attacks
- Detects gate manipulation, safety neuron targeting, expert disabling
- Supports Mixtral, DeepSeek-MoE, Qwen-MoE, Arctic, DBRX, Grok
π‘οΈ Enhanced Engines
- HoneypotEngine β Anti-Adaptive Defense Layer
- Dynamic token rotation
- Polymorphic generation
- Behavioral fingerprinting
- Decoy diversity
π New Attack Patterns (jailbreaks.yaml)
- Bad Likert Judge (3 patterns) β Self-evaluation jailbreak
- RSA Methodology (2 patterns) β Role-Scenario-Action
- GateBreaker MoE (2 patterns, zero_day) β MoE safety bypass
- Dark Patterns (2 patterns) β Web agent manipulation
- Agentic ProbLLMs (1 pattern) β Computer-use exploitation
- SKD Bypass (1 pattern) β Honeypot evasion
Total patterns: 60
π Documentation
- Added OWASP Agentic Top 10 (2026) mapping
- Updated engines.md with January 2026 R&D section
- Added docs/CHANGELOG.md
π§ Fixes
- Fixed import errors in
src/brain/engines/__init__.py
- InjectionEngine, BehavioralEngine, PIIEngine aliases
- Corrected class name mappings for all engines
π¬ Code Audit (January 1, 2026)
- Critical fix in
injection.py: Unicode regex was matching ALL characters
- Fixed 48 engine files: relative imports (
base_engine β .base_engine)
- Fixed 71 test files for pytest compatibility
- Added
conftest.py for proper PYTHONPATH
- Enhanced MoEGuard detection patterns for better coverage
- Added
UniversalController export to Strike
- Test results: 1047 passed, 0 failed
[1.0.0] - 2025-12-25
π Christmas 2025 β Full Open Source Release
- 200 detection engines
- Complete SENTINEL platform open-sourced
- PyPI package:
sentinel-llm-security
[0.9.0] - 2025-12-01
December 2025 R&D Engines (8 new)
serialization_security.py β CVE-2025-68664 LangGrinch
tool_hijacker_detector.py β ToolHijacker + Log-To-Leak
echo_chamber_detector.py β Multi-turn poisoning
rag_poisoning_detector.py β PoisonedRAG
identity_privilege_detector.py β OWASP ASI03
memory_poisoning_detector.py β Persistent memory attacks
dark_pattern_detector.py β DECEPTICON
polymorphic_prompt_assembler.py β PPA Defense
Full version history β