Summary
Turn TODOs, docs promises, and implied API behavior into a versioned contract with conformance checks.
This issue was generated from an org-wide EvalOps mining pass on 2026-05-10 07:57 UTC. It combines live GitHub repo signals with a per-repo arXiv search. Treat the research links as grounding for a concrete implementation, not as a request for a literature review.
Repo Evidence
- Repository description: PoC zero-trust access stack with Google SSO, Envoy, OPA, and device attestation
- Tree signals: 1 docs files, 4 workflows, 0 proto files, 6 test-like files.
README.md:195 includes latent-spec language: - Device posture updates are unauthenticated; real attestation agent verification is not implemented. - Secrets are sourced from environment variables/ConfigMaps—no dedicated KMS integration.
README.md:295 includes latent-spec language: ## Future Enhancements
agent/internal/posture/posture_test.go:141 includes latent-spec language: if ts != TrustStatusUnknown { t.Fatalf("zero value should be TrustStatusUnknown, got %v", ts) }
agent/internal/posture/posture_test.go:300 includes latent-spec language: {emptyString, DefaultRules}, {decimalValue, DefaultRules}, // Should fail for non-integer }
Research Grounding
Repo axes: security, governance, evaluation, tooling
Search keywords: device, input, posture, authz, access, make, envoy, inventory, opa, services, use, google
- arXiv:2511.15759v1 Securing AI Agents Against Prompt Injection Attacks (Badrinath Ramakrishnan, Akshaya Balaji), 2025.
- arXiv:2509.14285v4 A Multi-Agent LLM Defense Pipeline Against Prompt Injection Attacks (S M Asif Hossain, Ruksat Khan Shayoni, Mohd Ruhul Ameen, Akif Islam, M. F. Mridha, Jungpil Shin), 2025.
- arXiv:2504.18575v3 WASP: Benchmarking Web Agent Security Against Prompt Injection Attacks (Ivan Evtimov, Arman Zharmagambetov, Aaron Grattafiori, Chuan Guo, Kamalika Chaudhuri), 2025.
- arXiv:2410.23308v1 Systematically Analyzing Prompt Injection Vulnerabilities in Diverse LLM Architectures (Victoria Benjamin, Emily Braca, Israel Carter, Hafsa Kanchwala, Nava Khojasteh, Charly Landow), 2024.
- arXiv:2510.03705v1 Backdoor-Powered Prompt Injection Attacks Nullify Defense Methods (Yulin Chen, Haoran Li, Yuan Sui, Yangqiu Song, Bryan Hooi), 2025.
- arXiv:2510.21203v1 The Nuclear Analogy in AI Governance Research (Sophia Hatz), 2025.
- arXiv:2012.09344v2 Machine Learning for Detecting Data Exfiltration: A Review (Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire), 2020.
- arXiv:2410.05451v3 SecAlign: Defending Against Prompt Injection with Preference Optimization (Sizhe Chen, Arman Zharmagambetov, Saeed Mahloujifar, Kamalika Chaudhuri, David Wagner, Chuan Guo), 2024.
- arXiv:2408.00925v1 WHITE PAPER: A Brief Exploration of Data Exfiltration using GCG Suffixes (Victor Valbuena), 2024.
- arXiv:2505.11717v4 WebInject: Prompt Injection Attack to Web Agents (Xilong Wang, John Bloch, Zedian Shao, Yuepeng Hu, Shuyan Zhou, Neil Zhenqiang Gong), 2025.
What To Build
- Create a versioned contract document for the repo's public or agent-facing behavior.
- Move the highest-signal latent TODO/doc promises into explicit normative requirements.
- Add conformance fixtures that detect incompatible behavior changes.
Acceptance Criteria
Notes
- Generated issue 5/5 for
evalops/keep by evalops_org_miner.py.
- Before implementation, confirm the sampled latent-spec snippets still match
main; this issue intentionally cites exact file paths/lines where the mining pass saw them.
Summary
Turn TODOs, docs promises, and implied API behavior into a versioned contract with conformance checks.
This issue was generated from an org-wide EvalOps mining pass on 2026-05-10 07:57 UTC. It combines live GitHub repo signals with a per-repo arXiv search. Treat the research links as grounding for a concrete implementation, not as a request for a literature review.
Repo Evidence
README.md:195includes latent-spec language: - Device posture updates are unauthenticated; real attestation agent verification is not implemented. - Secrets are sourced from environment variables/ConfigMaps—no dedicated KMS integration.README.md:295includes latent-spec language: ## Future Enhancementsagent/internal/posture/posture_test.go:141includes latent-spec language: if ts != TrustStatusUnknown { t.Fatalf("zero value should be TrustStatusUnknown, got %v", ts) }agent/internal/posture/posture_test.go:300includes latent-spec language: {emptyString, DefaultRules}, {decimalValue, DefaultRules}, // Should fail for non-integer }Research Grounding
Repo axes: security, governance, evaluation, tooling
Search keywords: device, input, posture, authz, access, make, envoy, inventory, opa, services, use, google
What To Build
Acceptance Criteria
Notes
evalops/keepbyevalops_org_miner.py.main; this issue intentionally cites exact file paths/lines where the mining pass saw them.