KiLu is not a general cybersecurity system. Its security properties are specific: they concern the integrity of execution authority — how grants are issued, validated, and denied, and what happens when the boundary is violated.
In a bounded authority model, the default state is no authority. Execution does not proceed unless a valid, in-scope, non-expired grant is present and verified. Any configuration, implementation, or failure mode that allows execution in the absence of a valid grant is a security violation — not a degraded mode.
These are the threat classes that KiLu's architecture is designed to address. Each represents a distinct attack vector against the bounded authority model.
web:fetch on a specific allowlist is presented
for a different action or target. The Hub validates scope at the action-class level.
Out-of-scope execution is a hard deny.
Rejection is structural — not a runtime policy choice. The following conditions always produce a deny without fallback.
A security boundary is only as strong as its failure behavior. The following are the non-negotiable properties of failure in the bounded authority model.
Production security failures in authorization systems are rarely caused by cryptographic weakness. They are caused by configuration that silently widens the authority boundary. The following patterns represent the specific misconfiguration class that KiLu's design aims to prevent.