1+ ---
2+ title : Privateer SDK Self-Assessment
3+ metadata :
4+ id : PrivProj.SDK
5+ description : Threat catalog for Privateer SDK Self-Assessment
6+ version : 2026.Feb.28
7+ author :
8+ id : pvtr-maintainers
9+ name : Privateer Maintainer Group
10+ type : Human
11+ mapping-references :
12+ - id : CCC
13+ title : Common Cloud Controls Core
14+ version : v2025.10
15+ url : https://github.com/finos/common-cloud-controls/releases/download/v2025.10/CCC.Core_v2025.10.yaml
16+ description : |
17+ Foundational repository of reusable security controls, capabilities,
18+ and threat models maintained by FINOS.
19+
20+ capabilities :
21+ - id : PrivProj.SDK.CP01
22+ title : Go Package
23+ description : Privateer SDK is a go package, version controlled and released via GitHub and distributed by pkg.go.dev
24+ - id : PrivProj.SDK.CP02
25+ title : Plugin Development Kit
26+ description : Provides the foundational logic required for building the base of any Privateer plugin
27+ - id : PrivProj.SDK.CP03
28+ title : Shared Plugin Interfaces
29+ description : Standardizes data structures across diverse plugin implementations
30+ - id : PrivProj.SDK.CP04
31+ title : Configuration Management
32+ description : Manages plugin settings, environment variables, and configuration logic for Privateer (core) and plugins
33+ - id : PrivProj.SDK.CP05
34+ title : Evaluation Framework
35+ description : Orchestrates assessment logic to ensure consistent machine-readable validation
36+
37+ threats :
38+ - id : PrivProj.SDK.TH01
39+ title : Source Repository is Compromised
40+ description : |
41+ Access control failures on the source repository may result in distribution of compromised code,
42+ which will then compromise all downstream users.
43+ capabilities :
44+ - reference-id : PrivProj.SDK
45+ entries :
46+ - reference-id : PrivProj.SDK.CP01
47+ - reference-id : PrivProj.SDK.CP02
48+ - id : PrivProj.SDK.TH02
49+ title : Undetected Breaking Changes Disrupt Downstream Plugins
50+ description : |
51+ Syntactic or behavioral modifications to core interfaces or evaluation logic may disrupt
52+ compatibility for existing plugins, leading to silent validation failures or logic errors
53+ in security assessments.
54+ capabilities :
55+ - reference-id : PrivProj.SDK
56+ entries :
57+ - reference-id : PrivProj.SDK.CP02
58+ - reference-id : PrivProj.SDK.CP03
59+ - reference-id : PrivProj.SDK.CP05
60+ - id : PrivProj.SDK.TH03
61+ title : Supply Chain Contamination via Dependencies
62+ description : |
63+ The use of unvetted, unpinned, or compromised third-party Go modules can
64+ introduce vulnerabilities or malicious logic into the SDK and derived plugins.
65+ capabilities :
66+ - reference-id : PrivProj.SDK
67+ entries :
68+ - reference-id : PrivProj.SDK.CP01
0 commit comments