Spaces:
Sleeping
Sleeping
Create THREAT_MODEL.md
Browse files- THREAT_MODEL.md +79 -0
THREAT_MODEL.md
ADDED
|
@@ -0,0 +1,79 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Threat Model Appendix
|
| 2 |
+
|
| 3 |
+
## Threat Modeling Framework
|
| 4 |
+
|
| 5 |
+
This application follows a **STRIDE-informed but scope-limited** threat model,
|
| 6 |
+
focused on misuse prevention rather than adversarial exploitation.
|
| 7 |
+
|
| 8 |
+
---
|
| 9 |
+
|
| 10 |
+
## Identified Threats & Mitigations
|
| 11 |
+
|
| 12 |
+
### 1. Unauthorized Data Collection
|
| 13 |
+
**Threat:** Automated scraping or bulk harvesting
|
| 14 |
+
**Mitigation:**
|
| 15 |
+
- Link-out only architecture
|
| 16 |
+
- No crawlers or schedulers
|
| 17 |
+
- No background tasks
|
| 18 |
+
|
| 19 |
+
---
|
| 20 |
+
|
| 21 |
+
### 2. AI Hallucination or Misuse
|
| 22 |
+
**Threat:** AI outputs mistaken for evidence
|
| 23 |
+
**Mitigation:**
|
| 24 |
+
- AI disabled by default
|
| 25 |
+
- Mandatory disclosure footer
|
| 26 |
+
- Citation-anchored prompts
|
| 27 |
+
- Integrity hashing
|
| 28 |
+
|
| 29 |
+
---
|
| 30 |
+
|
| 31 |
+
### 3. Surveillance or Profiling
|
| 32 |
+
**Threat:** Use for tracking individuals
|
| 33 |
+
**Mitigation:**
|
| 34 |
+
- Public records only
|
| 35 |
+
- No personal data ingestion
|
| 36 |
+
- No identity resolution features
|
| 37 |
+
|
| 38 |
+
---
|
| 39 |
+
|
| 40 |
+
### 4. Data Persistence Risk
|
| 41 |
+
**Threat:** Long-term storage of sensitive material
|
| 42 |
+
**Mitigation:**
|
| 43 |
+
- In-memory session state only
|
| 44 |
+
- No databases required
|
| 45 |
+
- No logs of user queries
|
| 46 |
+
|
| 47 |
+
---
|
| 48 |
+
|
| 49 |
+
### 5. Agency Policy Circumvention
|
| 50 |
+
**Threat:** Bypassing FOIA site controls
|
| 51 |
+
**Mitigation:**
|
| 52 |
+
- No automated access
|
| 53 |
+
- No authentication bypass
|
| 54 |
+
- User-initiated navigation only
|
| 55 |
+
|
| 56 |
+
---
|
| 57 |
+
|
| 58 |
+
## Out-of-Scope Threats
|
| 59 |
+
|
| 60 |
+
- Nation-state cyber attacks
|
| 61 |
+
- FOIA content authenticity disputes
|
| 62 |
+
- Agency data completeness or redaction
|
| 63 |
+
|
| 64 |
+
---
|
| 65 |
+
|
| 66 |
+
## Residual Risk Assessment
|
| 67 |
+
|
| 68 |
+
Overall residual risk is **LOW**, given:
|
| 69 |
+
- Public data only
|
| 70 |
+
- No automation
|
| 71 |
+
- No persistence
|
| 72 |
+
- No privileged access
|
| 73 |
+
|
| 74 |
+
---
|
| 75 |
+
|
| 76 |
+
## Conclusion
|
| 77 |
+
|
| 78 |
+
This tool presents materially lower risk than traditional search engines
|
| 79 |
+
or document crawlers due to its intentionally constrained design.
|