The one I want to probe is the file-based hash attestation assumption. If the SHA-256 check runs against on-disk bytes: env injection, lazy-loaded remote modules, and eval() of fetched content all modify execution context without touching the binary. On-disk hash stays clean, behavior changes.
Also interested in whether trust score timing creates an elevation path — benign calls that build score, then exploitation once the threshold is cleared.
Emailed you at raza@agentsign.dev with a formal proposal. $299 flat for a structured adversarial run, first-look before anything is published.