Entity Catalog — Security & Audit
Entities are the real-world quantities that become channels in the trace vector. Each maps to [0,1]^n through the embedding.
27 entities across 5 modules
Catalog
| Entity | Source Module |
|---|---|
| T-ATK-1 | attack_surface_kernel |
| T-ATK-2 | attack_surface_kernel |
| T-ATK-3 | attack_surface_kernel |
| T-ATK-4 | attack_surface_kernel |
| T-ATK-5 | attack_surface_kernel |
| T-ATK-6 | attack_surface_kernel |
| system_binary | how_it_sees |
| user_script | how_it_sees |
| unknown_exe | how_it_sees |
| malware | how_it_sees |
| John Doe | privacy_auditor |
| T-SK-1 | security_kernel |
| T-SK-2 | security_kernel |
| T-SK-3 | security_kernel |
| T-SK-4 | security_kernel |
| T-SK-5 | security_kernel |
| T-SK-6 | security_kernel |
| T-SEC-1 | security_theorems |
| T-SEC-2 | security_theorems |
| T-SEC-3 | security_theorems |
| T-SEC-4 | security_theorems |
| T-SEC-5 | security_theorems |
| T-SEC-6 | security_theorems |
| T-SEC-7 | security_theorems |
| T-SEC-8 | security_theorems |
| T-SEC-9 | security_theorems |
| T-SEC-10 | security_theorems |
Attack Surface Kernel
Source: closures/security/attack_surface_kernel.py
6 entities:
- T-ATK-1
- T-ATK-2
- T-ATK-3
- T-ATK-4
- T-ATK-5
- T-ATK-6
How It Sees
Source: closures/security/how_it_sees.py
4 entities:
- system_binary
- user_script
- unknown_exe
- malware
Privacy Auditor
Source: closures/security/privacy_auditor.py
1 entities:
- John Doe
Security Kernel
Source: closures/security/security_kernel.py
6 entities:
- T-SK-1
- T-SK-2
- T-SK-3
- T-SK-4
- T-SK-5
- T-SK-6
Security Theorems
Source: closures/security/security_theorems.py
10 entities:
- T-SEC-1
- T-SEC-2
- T-SEC-3
- T-SEC-4
- T-SEC-5
- T-SEC-6
- T-SEC-7
- T-SEC-8
- T-SEC-9
- T-SEC-10
Generated by the Headless Contract Gateway (HCG) · Domain: security · UMCP v2.3.1