ProtocolGovGuardFinGuardExplorerPlaygroundAdoptCloudTrustDocsRequest Pilot
Trust & Security

Security posture, transparently

Procurement teams cannot evaluate a vendor without a real picture of where the security and compliance work stands today and where it is sequenced next. This page lists what is shipped, what is funded and in progress, and what is intent. We update it as commitments change. We never publish target dates we cannot hit.

Shipped

Each item below is verifiable today — independently reproducible from the public repo or directly inspectable on this site.

Apache 2.0 license
github.com/emiliaprotocol/emilia-protocol/blob/main/LICENSE
NIST AI RMF mapping (governance + measurement)
/spec
EU AI Act high-risk-system control mapping
/spec
Formal verification — 26 TLA+ theorems, 35 Alloy facts in CI
/spec, repo formal/ directory
Open conformance suite + reference implementations
/adopt, /spec
Responsible disclosure policy + security.txt
/.well-known/security.txt

In progress

Funded or actively being scoped. Each item shows the target window and named partner where committed; items without a named auditor or sponsor are flagged as such — we believe a missed target is more damaging than no target.

External cryptographic-protocol review of the ceremony spec
Target: Pending pilot funding · Targeting Trail of Bits / NCC Group / Kudelski Security
SOC 2 Type I
Target window: pending engagement gate (named auditor + funded scope)
Public bug bounty program
Target: Q3 2026 · Targeting HackerOne or Immunefi

Intent

Targeted certifications and frameworks sequenced against named pilot or sponsor engagement. We treat these as commitments to pursue when the corresponding buyer relationship is real, not as marketing claims.

ISO/IEC 27001
Targeted for first enterprise pilot
StateRAMP authorization
Required for state benefit-integrity programs (GovGuard buyers)
FedRAMP Moderate ATO
Pursuing federal innovation-office sandbox engagement first; full ATO sequenced against named federal sponsor and Phase II SBIR / DARPA funding
PCI DSS / NYDFS Part 500 mapping
For FinGuard treasury-controls deployments
FFIEC IT Examination Handbook alignment
For community-bank and credit-union deployments

Formal verification

The protocol is mathematically modeled in TLA+ and Alloy. The TLA+ specification declares 26 theorems covering safety and liveness — handshake binding integrity, replay resistance, signoff accountability, receipt integrity, federation consistency. The Alloy model declares 35 facts and 15 assertions covering structural invariants the TLA+ time-domain doesn't reach.

Both run on every push in CI. A counterexample fails the build. The model is part of the codebase, not a paper attached to it.

Responsible disclosure

Security findings on the protocol, the reference runtime, the SDKs (@emilia-protocol/sdk, @emilia-protocol/verify), the MCP server, or any *.emiliaprotocol.ai surface should be reported privately first.

A formal bug-bounty program (HackerOne or Immunefi) is in roadmap. Until launched, the address above is monitored and triaged.

Operational practices

Procurement & assurance documents

Requestable under NDA for active procurement engagements:

Request via security@emiliaprotocol.ai.

Talk to us

Email securityPrivacy policySub-processors →
Trust & Security — EMILIA Protocol | EMILIA Protocol