---
vault_clearance: EUCLID
halo:
  classification: INTERNAL
  confidence: HIGH
  front: "15_Project_ShadowsOfSight"
  custodian: "The Architect"
  created: 2026-03-27
  updated: 2026-03-28
  wing: UNASSESSED
  containment: "Local integrity tooling — not a substitute for EDR or legal process"
---
# BOUNTY BOARD — 15 Project ShadowsOfSight

> **Current Tier: Zenodo** | **Orthodox Cultivator:** Orthodox HMAC seal (9/12 attacks detected) | **Target: Consensus**
> **FORM question:** Can file integrity be fractal and self-verifying? **Our answer:** Bioship v2 — 12/12 attacks detected, 3 wins over orthodox.

> **Order of memory:** **[This board](BOUNTY_BOARD.md)** = OPEN/SOLVED. **[WORLDLINE.md](WORLDLINE.md)** = narrative. Vault law: [README § Lab protocol](../README.md#lab-protocol). Tiers: IMPLEMENTED | DEMONSTRATED | OBSERVATION. **Last updated:** 2026-03-28.

---

## SOLVED

| ID | Bounty | One-line answer | Date | Where | Tier |
|----|--------|-----------------|------|-------|------|
| S1 | **Bioship living binary** — Self-verifying container with fractal integrity, Merkle DNA, heartbeat, and KEEL immune response | `bioship.py` v2 — domain-separated Merkle tree, cell-level diagnosis, 12/12 NP-Cultivator attacks detected | 2026-03-27 | `tools/bioship.py` | IMPLEMENTED |
| S2 | **NP-Complete Cultivator** — FORM head-to-head: build strongest orthodox opponent, test both, improve ours | 12-attack suite (basic + advanced + cryptographic). Bioship v2: 12/12 detected, 3 wins. Orthodox: 9/12, 0 wins. | 2026-03-27 | `tools/np_cultivator.py` | DEMONSTRATED |
| S3 | **Bioship Vault integration** — HALO-aware wrapping + Apollyon key delivery pipeline | `bioship_vault.py` — keygen→Bioship→Shamir→deliver→verify DNA. Fleet management. Policy per HALO tier. | 2026-03-27 | `tools/bioship_vault.py` | IMPLEMENTED |
| S4 | **Orthodox comparison class** — Traditional file + SHA-256 + HMAC seal for FORM baseline | `orthodox_seal.py` — seal/verify/reseal. Proved forgeable via Attack 5 (seal forge). | 2026-03-27 | `tools/orthodox_seal.py` | IMPLEMENTED |
| S5 | **Domain separation fix** — Second-preimage vulnerability closed via RFC 6962 leaf/internal domain separation | v1→v2: `_leaf_hash = H(0x00\|\|data)`, `_internal_hash = H(0x01\|\|left\|\|right)`. Cell index validation added. | 2026-03-27 | `tools/bioship.py` | DEMONSTRATED |

---

## OPEN

| ID | Bounty | Status | Assigned | Impact |
|----|--------|--------|----------|--------|
| O1 | **Scheduler hardening** — Document a "happy path" Task Scheduler XML for `TRIGGER_VERIFY_QUICK.bat` on Windows. | OPEN | — | Ops |
| O2 | **Watch-path policy** — Decide whether `watch_paths.json` should ever include vault markdown roots. | OPEN | — | Design |
| O3 | **Honeyfile drill** — One tabletop: place a canary, baseline, simulate edit, confirm `verify` fails loudly. | OPEN | — | DEMONSTRATED |
| O4 | **Heartbeat automation** — Scheduled refresh for all fleet ships per HALO tier policy (30d/7d/24h/1h). | OPEN | — | Ops/Critical |
| O5 | **Key management hardening** — Migrate `.shadow_key` from file → Windows DPAPI / HSM / Azure Key Vault. | OPEN | — | Security/Critical |
| O6 | **Fleet alerting** — `fleet-check` should send alerts (email/webhook/Cerberus) when ships go stale or infected. | OPEN | — | Ops |
| O7 | **Proper Shamir SSS** — Replace XOR-based share generation with polynomial interpolation (proper threshold scheme). | OPEN | — | Security/Critical |
| O8 | **Fuzzing** — Fuzz the Bioship parser with malformed `.bio` files to harden against crashes. | OPEN | — | Security |
| O9 | **Multi-key support** — Support per-ship keys (not one key for all ships). Key hierarchy with master + derived keys. | OPEN | — | Security |
| O10 | **VM-to-VM delivery test** — Transfer Bioship between Lantern 1 and Lantern 2, verify on arrival, simulate MITM. | OPEN | — | DEMONSTRATED |
| O11 | **Post-sync / post-pull verify** — After Astronomicon `sync_worker_to_local` or any mirror pull, disk state can diverge from edge truth with no automatic alarm. **Fix:** Documented hook: run fleet `verify` or Cerberus `shadow_verify` path; record manifest hash + timestamp in project `WORLDLINE.md` (vault root O11). | OPEN | — | Integrity |
| O12 | **Encryption suite binding** — Bioship DNA, Orthodox seals, and Apollyon keys are separate codepaths; HALO tier policy is not yet a single machine-readable matrix. **Fix:** Publish `encryption_matrix.yaml` (classification × asset × algorithm × rotation owner); CI subset that fails if exported public_lab references KETER key material; pair with [11 O9](../11_Project_WordsOfTomorrow/BOUNTY_BOARD.md) and vault **O12**. | OPEN | — | **CRITICAL** |
| O13 | **FORM orthodox integrity head-to-head** — On the same fixture tree, run **Sigstore `cosign verify`** (or **git signed-commit verify**) vs **Bioship/Shadow verify**; record pass/fail + timestamps in `verify.jsonl`-compatible JSONL and one paragraph in `WORLDLINE.md`. Survey bar: [16_Project_Constellation/FORM_ORTHODOX_APEX_TOOLING.md](../16_Project_Constellation/FORM_ORTHODOX_APEX_TOOLING.md) Chapter 15. **Functional cluster:** third-party verify interop vs local seals; complements vault **[O6](../BOUNTY_BOARD.md)** (HMAC-chained / signed narrative at the edge). | OPEN | — | **CRITICAL** |

---

## RETRACTED / WONTFIX

| ID | What | Why |
|----|------|-----|
| *(none)* | | |
