packages/chip/docs/security/secure-boot-lifecycle-evidence.md
Status: BLOCKED for production secure boot.
This repository currently contains a e1-chip identity ROM, not a secure boot
implementation. The ROM exposes the platform contract words OPSO, CHIP,
contract version 1, and a boot-vector placeholder. It has no firmware
authentication or lifecycle enforcement.
| Surface | Local evidence | Security result |
|---|---|---|
| Boot ROM identity words | rtl/bootrom/e1_bootrom.sv and platform-contract checks | Contract ROM only; not a trust anchor. |
| Boot ROM write behavior | verify/cocotb/test_e1_lifecycle.py writes ROM offsets and verifies reads stay fixed | Negative evidence that the current ROM is immutable through the MMIO path. |
| Lifecycle state | No lifecycle RTL, registers, pins, or reset straps | BLOCKED. |
| eFuse/OTP | No fuse macro, fuse shadow registers, or provisioning flow | BLOCKED. |
| Root key material | No key hash, public key, certificate chain, or device-unique key source | BLOCKED. |
| Image authentication | No ROM hash parser, signature verifier, manifest parser, or fail-closed branch | BLOCKED. |
| Rollback protection | No monotonic counter, version fuse, RPMB, or anti-rollback policy | BLOCKED. |
| Debug authentication | Package debug bridge is a bring-up bus master; no lifecycle-gated authentication | BLOCKED for production debug lock. |
The first claim may only be "development secure boot prototype" after all of these artifacts exist and are locally reproducible:
Do not claim production secure boot, verified boot, device identity, hardware-backed key storage, secure debug, anti-rollback, or Android AVB enforcement from the current RTL. Those are future requirements, not present features.