v1.0
L1 EssentialAutomated verification
6.1 Verified Component Sources
6. Supply Chain Integrity — How do we trust components?
Description
All agent components MUST come from verified and trusted sources.
Rationale
Supply chain attacks inject malicious code through trusted distribution channels.
Audit Procedure
1. List all external components 2. Verify each source is trusted 3. Check for components from arbitrary URLs
Remediation
1. Maintain allowlist of approved sources 2. Use package registries with verified publishers 3. Pin all dependencies
Framework Mappings
CIS Control 2.5CIS Control 2.6NIST PR.DS-6