Algol ALGOL Pipeline Authority Intelligence · London · algol.cc
Pipeline Authority Intelligence · London

YOUR PIPELINE
ISN'T A WORKFLOW.
IT'S AN AUTHORITY
SYSTEM.

Every step is a permission grant. Every action is a trust decision.
Algol proves what authority your pipeline actually received — and denies the rest.

65→7
Env vars after enforcement
58
Ambient vars removed
0
Sensitive vars inherited
See the proof Request early review
Proof, not vibes

WHAT ACTUALLY
HAPPENED AT
RUNTIME.

Most security tools tell you what might be wrong.
Algol shows you what actually happened — what was injected, what was denied, and what evidence was written.

Before Algol: the process inherited undeclared secrets.
After Algol: the process received only contract-declared authority.
Evidence: audit artefact written to algol-run.json.

Real output. Real repo. Real numbers.
Actual Algol output from a messy Node.js repo with .env files, GitHub Actions secrets, and ambient AWS credentials in the shell. Scanned, planned, enforced, and audited in under 200ms.

algol enforce · runtime output
Algol enforcement active
Command: npm test

Environment:
  Parent env:  65 vars
  Child env:   7 vars
  Removed:     58 vars
  Sensitive ambient vars inherited: 0

Injected:
  API_TOKEN     sha256:101aa6b3...
  DATABASE_URL  sha256:29cffa77...

Denied:
  AWS_SECRET_ACCESS_KEY
  GH_TOKEN

AWS_SECRET_ACCESS_KEY present: false
DATABASE_URL present: true
Process exited: 0
Evidence written: algol-run.json
The workflow

FOUR COMMANDS.
COMPLETE AUTHORITY RECORD.

01
algol scan

Finds authority risks across your repo — .env files, CI secrets, ambient environment reads. Produces a risk score.

02
algol plan

Drafts an authority contract for your command. Declares exactly which secrets are allowed. Everything else: denied by default.

03
algol enforce

Runs your command with the ambient environment stripped. Only contract-declared secrets are injected. No surprises.

04
algol audit

Produces an immutable audit record showing what was injected, what was denied, and what the process received. Evidence, not logs.

The stack

THE ALGOL
ECOSYSTEM.

Together, they turn pipeline security from assumption into proof.

Production ready
tsafe

Runtime authority enforcement for secrets. Inject only what is declared in the contract. No plaintext. No ambient leaks. Works locally and in CI. Available now on crates.io.

Production ready
taudit

Authority graph and audit trail for every secret access. Maps identities, steps, and trust boundaries across your CI/CD pipeline. Evidence you can show an auditor.

Maturing
CellOS

Execution substrate for deterministic pipelines. Governs execution boundaries and supply-chain integrity. Rapidly evolving — not yet pen tested at production scale.

Experimental
tsign

SLSA-aligned build provenance and signing layer. Early stage — not yet tested in anger. Included here for visibility, not as a production commitment.

Honest boundary

Algol MVP enforces environment authority only. It does not yet claim full secret isolation across files, sockets, cloud metadata endpoints, SSH agents, Docker daemon sockets, or OS keychains.

That boundary is intentional: narrow, testable, and provable. Security buyers will want receipts — we only claim what we can demonstrate.

Case studies

CVE PATTERNS
ALGOL CATCHES.

CVE-2023-27164 · tj-actions/changed-files
Poisoned Action Prints Secrets to Logs

A compromised GitHub Action printed all runner environment variables to the workflow log — exposing every ambient secret in scope. Algol's enforcement model removes ambient secrets before the child process runs. Nothing to print.

Supply Chain · Mutable Action Tags
STRIDE: Tampering via Unpinned Actions

Actions pinned by tag rather than SHA can be silently replaced. taudit flags every mutable action reference and maps the blast radius — branch push scope, package publish access, downstream trust chain.

Pattern · GITHUB_TOKEN Elevation
STRIDE: Elevation of Privilege

GITHUB_TOKEN with write permissions inherited across unrelated pipeline steps creates unintended reach. taudit surfaces the authority graph — showing exactly which steps received which token scopes and why that's a risk.

STRIDE coverage matrix (5 categories)
STRIDE Category Pipeline Pattern Algol Response
Spoofing Unverified action identity, mutable tags taudit maps SHA pins and identity provenance
Tampering Mutable action references, unpinned deps taudit flags all non-SHA-pinned references
Repudiation No audit trail for secret access algol audit writes immutable evidence artefact
Information Disclosure Ambient secrets in child process environment tsafe strips ambient env before execution
Elevation of Privilege GITHUB_TOKEN scope bleeding across steps taudit surfaces authority graph and blast radius
Early access

WANT THIS ON
YOUR PIPELINE?

We are exploring early pipeline authority reviews for teams dealing with secret sprawl, CI/CD risk, or audit pressure.

tsafe and taudit are production ready. Get in touch and we'll help you run your first scan.

hello@algol.cc
London, UK

No spam. We'll reply within 48 hours.

✓ Message received. We'll be in touch within 48 hours.
Brigitta Makai
Brigitta Makai
Co-founder · Business & Strategy · Algol
Security tooling is trust in engineering judgement — not just code.