hardpoint trust
Create a cryptographic baseline of AI configuration files using HMAC-SHA256 signatures. Use withhardpoint verify to detect unauthorized changes (Rules File Backdoor attacks).
Usage
Arguments
| Argument | Description |
|---|---|
file | Specific file to trust (optional) |
Flags
| Flag | Description |
|---|---|
--all | Trust all detected AI config files |
--list | List all trusted files |
--remove <file> | Remove a file from trusted list |
--reason <text> | Reason for trusting (recommended for audit trail) |
How It Works
- Hardpoint computes SHA-256 hashes of AI config files
- The hash baseline is signed with an HMAC key stored in
.hardpoint/secret - Trusted entries are stored in
.hardpoint/trusted.yaml - Later,
hardpoint verifycompares current file hashes against this baseline
Examples
Trust All AI Config Files
Trust Specific File
List Trusted Files
Remove from Trusted List
Trust File Format
The.hardpoint/trusted.yaml file:
Storage
Best Practices
- Trust after review - Only trust files after manually reviewing their contents
- Document reasons - Use
--reasonto record why the file was trusted - Verify in CI - Run
hardpoint verify --ciin your CI pipeline - Re-trust after changes - After intentional changes, re-run
hardpoint trust - Keep
.hardpoint/secretconfidential - Add to.gitignoreif needed