Skip to main content

Phase Reference

Each of the SSSC Planner's six phases has defined inputs, outputs, state transitions, and artifacts. This reference documents the details that govern how the agent moves through a complete supply chain security assessment.

Phase Summary

PhaseNameKey outputState fields updated
1Project ScopingScope definitionentryMode, context.*
2Supply Chain AssessmentCapability inventoryassessmentComplete
3Standards MappingStandards coverage mapstandardsMapped
4Gap AnalysisPrioritized gap tablegapAnalysisComplete
5Backlog GenerationWork itemsbacklogGenerated
6Review & HandoffProjections and handoffhandoffGenerated

Phase 1: Project Scoping

Purpose

Capture the target repository's technology stack, package managers, CI platform, release strategy, and compliance targets. Determine entry mode and establish the assessment context.

Inputs

  • User responses to scoping questions (capture mode).
  • PRD artifacts from .copilot-tracking/ (From-PRD mode).
  • BRD artifacts from .copilot-tracking/ (From-BRD mode).
  • Security Planner state file (From-Security-Plan mode).

Process

The agent asks 3-5 questions per turn covering:

  • Target repository purpose and technology stack.
  • Package managers (npm, pip, NuGet, etc.).
  • CI/CD platform (GitHub Actions, Azure Pipelines, etc.).
  • Release strategy (tags, branches, release-please, etc.).
  • Compliance targets (OpenSSF Scorecard tier, SLSA level, Badge tier).
  • Existing supply chain security tooling already in place.
  • Cross-agent references (Security Planner link, RAI Planner link).

Outputs

  • Completed scope definition in the plan file.
  • Context fields populated in state.

State Transitions

FieldBeforeAfter
currentPhase12 (on user confirmation)
entryModeunsetcapture, from-prd, from-brd, or from-security-plan
scopingCompletefalsetrue
context.techStack[]Populated
context.packageManagers[]Populated
context.ciPlatformunsetPopulated

Phase 2: Supply Chain Assessment

Purpose

Inventory 27 supply chain security capabilities across hve-core and physical-ai-toolchain, classifying each by source and coverage status.

The 27 Capabilities

Capabilities are classified into three source categories:

hve-core Unique (6)

#CapabilityDescription
1pip-audit integrationPython dependency vulnerability scanning
2Action version consistencyCross-workflow action version validation
3Automated SHA pinningScript-based SHA pinning for GitHub Actions
4Weekly security summaryScheduled security posture reporting
5Get-VerifiedDownload.ps1Cryptographic hash verification for downloads
6Security workflow orchestrationMulti-workflow security pipeline coordination

physical-ai-toolchain Unique (10)

#CapabilityDescription
7SBOM generationanchore/sbom-action with SPDX-JSON output
8Sigstore signinggitsign keyless commit and artifact signing
9DAST / ZAP integrationDynamic application security testing
10Dual attestationBuild provenance + SBOM attestation
11Stale docs → issueAutomated issue creation for outdated documentation
12Best Practices BadgeOpenSSF Best Practices Badge enrollment
13Dependabot security prefixSecurity-prefixed Dependabot branch naming
14Threat modelStructured threat model documentation
15release-pleaseAutomated release management
16Vulnerability SLATime-bound vulnerability remediation policy

Shared (11)

#CapabilityDescription
17Dependency pinningSHA-pinned GitHub Actions dependencies
18SHA staleness checksValidation that pinned SHAs are current
19gitleaksSecret scanning in CI/CD
20CodeQLStatic analysis for security vulnerabilities
21Dependency reviewPR-time dependency change analysis
22OpenSSF ScorecardAutomated Scorecard checks in CI
23Workflow permissionsMinimal token permissions enforcement
24Copyright headersAutomated copyright header validation
25DependabotAutomated dependency update PRs
26SECURITY.mdSecurity policy documentation
27CODEOWNERSCode ownership and review enforcement

Assessment Protocol

The agent follows a four-step protocol for each capability:

StepAction
DetectScan the target repository for evidence of the capability
ClassifyAssign a source (hve-core, PAT, shared) and coverage status
DocumentRecord findings in the assessment artifact
VerifyConfirm with the user before proceeding

Coverage Icons

IconMeaning
Present
⚠️Partial
Missing
Not applicable

State Transitions

FieldBeforeAfter
currentPhase23
assessmentCompletefalsetrue

Phase 3: Standards Mapping

Purpose

Map the capability inventory to five standard areas, assigning current score estimates and identifying coverage gaps.

Five Standard Areas

OpenSSF Scorecard (20 Checks)

#CheckRiskScore RangeAgent Mapping
1Binary-ArtifactsHigh0-10Convention enforcement
2Branch-ProtectionHigh0-10Platform configuration
3CI-TestsLow0-10Workflow adoption
4CII-Best-PracticesLow0-10Badge enrollment
5Code-ReviewHigh0-10CODEOWNERS enforcement
6ContributorsLow0-10Organic
7Dangerous-WorkflowCritical0-10Pattern validation
8Dependency-Update-ToolHigh0-10Dependabot configuration
9FuzzingMedium0-10New capability
10LicenseLow0-10LICENSE file presence
11MaintainedHigh0-10Organic
12PackagingMedium0-10Existing capability
13Pinned-DependenciesMedium0-10Script adoption
14SASTMedium0-10CodeQL + linters
15SBOMMedium0-10Workflow adoption
16Security-PolicyMedium0-10SECURITY.md presence
17Signed-ReleasesHigh0-10Sigstore adoption
18Token-PermissionsHigh0-10Script validation
19VulnerabilitiesHigh0-10Scanner integration
20WebhooksCritical0-10Platform managed

SLSA Build Track

LevelRequirements
L0No guarantees (default)
L1Build process exists and produces provenance
L2Hosted build platform, authenticated provenance
L3Hardened build platform, unforgeable provenance

Best Practices Badge

TierKey criteria
PassingBasic security practices in place
SilverAdvanced testing, static analysis, governance
GoldDynamic analysis, full reproducibility

Sigstore Maturity

LevelDescription
Not adoptedNo signing in place
BasicManual key-based signing
Intermediategitsign for commit signing
AdvancedKeyless signing with Fulcio + Rekor + SBOM attestation

SBOM Standards

StandardDescription
SPDX-JSONStandard SBOM format
NTIA minimumMinimum elements for SBOM compliance

State Transitions

FieldBeforeAfter
currentPhase34
standardsMappedfalsetrue

Phase 4: Gap Analysis

Purpose

Compare current posture against desired state, classify gaps by adoption category, and assign effort sizing.

Gap Table Format

Gaps are sorted by Scorecard risk level (Critical > High > Medium > Low):

GapScorecard CheckRiskCurrent StateTarget StateAdoption TypeEffort
descriptioncheck_namelevelcurrenttargetcategoryS/M/L/XL

Six Adoption Categories

CategoryDescriptionEffort
Reusable Workflow AdoptionReference an hve-core workflow via uses:Lowest
Workflow Copy/ModifyCopy and adapt a workflow to the target repoMedium
Reusable Workflow + ScriptAdopt both a workflow and supporting scriptsMedium
Platform ConfigurationGitHub or ADO settings via UI or APIVariable
New CapabilityBuild something not available in either repoHighest
N/A / OrganicNot actionable; improves through natural activityNone

Effort Sizing

SizeCriteriaTypical Duration
SSingle file addition or configuration change< 1 day
MMultiple files or workflow customization required1-3 days
LCross-cutting changes across CI/CD pipeline3-5 days
XLNew capability build or major architectural change1+ weeks

Prioritization

Gaps are prioritized by Scorecard risk level, with adoption type as a secondary sort (reusable workflow first, new capability last).

State Transitions

FieldBeforeAfter
currentPhase45
gapAnalysisCompletefalsetrue

Phase 5: Backlog Generation

Purpose

Convert gap analysis results into actionable work items with adoption steps, acceptance criteria, and priority assignments.

Work Item Formats

PlatformID formatExample
ADOWI-SSSC-{NNN}WI-SSSC-001
GitHub{{SSSC-TEMP-N}}{{SSSC-TEMP-1}}

Priority Derivation

Risk LevelPriorityExecution Order
CriticalP1First
HighP2Second
MediumP3Third
LowP4Fourth

ADO Work Item Hierarchy

LevelScope
EpicSupply chain security improvement program (one per assessment)
FeaturePer adoption category (reusable workflow, platform configuration, etc.)
User StoryPer Scorecard check or SLSA improvement step
TaskIndividual implementation steps for a user story

Autonomy Tiers

TierHuman involvementTypical use
FullNone requiredLow-risk configuration changes
PartialReview and approveDefault for most supply chain work items
ManualHuman plans and implementsNew capability builds, policy decisions

State Transitions

FieldBeforeAfter
currentPhase56
backlogGeneratedfalsetrue

Phase 6: Review and Handoff

Purpose

Validate the complete analysis, generate improvement projections, and produce platform-specific handoff files for backlog managers.

Handoff Protocol

  1. Read the neutral work item list from Phase 5.
  2. Validate completeness: every gap from Phase 4 has a corresponding work item.
  3. Generate improvement projections (Scorecard, SLSA, Badge).
  4. Present the complete plan to the user for final review.
  5. On confirmation, generate platform-specific handoff files.
  6. Update state with handoff flags.

Scorecard Improvement Projection

For each of the 20 checks, project the score improvement if all related work items are completed:

#CheckRiskCurrent ScoreProjected ScoreWork Items
ncheck_nameriskcurrent/10projected/10WI-SSSC-{NNN}, ...

SLSA Level Assessment

FieldValue
Current levelBuild L{N}
Projected levelBuild L{N}
Remaining stepsItems needed beyond the generated backlog

Badge Readiness

FieldValue
Current readinessPassing, Silver, Gold, or Not enrolled
Projected readinessPassing, Silver, or Gold
Missing criteriaItems not covered by the backlog (if any)

Review Checklist

The agent validates:

  • All 20 Scorecard checks have been assessed.
  • Standards mapping covers all five standard areas.
  • Every gap has a corresponding work item.
  • Work items have adoption steps and acceptance criteria.
  • Cross-agent references are populated if applicable.

ADO and GitHub Handoff Paths

PlatformPath
ADO.copilot-tracking/workitems/backlog/{project-slug}-sssc/work-items.md
GitHub.copilot-tracking/github-issues/discovery/{project-slug}-sssc/issues-plan.md

State Transitions

FieldBeforeAfter
currentPhase66
handoffGenerated{ado: false, github: false}Updated per target

🤖 Crafted with precision by ✨Copilot following brilliant human instruction, then carefully refined by our team of discerning human reviewers.