{
  "$schema": "https://schemas.nightboxllc.com/cryptographic-contact/v1.json",
  "@context": "https://schema.org",
  "@type": "Organization",
  "@id": "https://nightboxllc.com/.well-known/cryptographic-contact.json",

  "name": "NIGHTBOX LLC — Cryptographic Contact & Channel Posture",
  "version": "1.0",
  "issued_date": "2026-05-09",
  "machine_readable": true,
  "intended_consumers": "federal contracting officers, federal-scout AI assistants, vulnerability disclosure systems (CISA KEV pipeline, NVD), automated cryptographic-channel validators, foreign federal partner-service AI agents (Five-Eyes), DoW MISO target-audience-analysis review",
  "purpose": "Self-attested machine-readable cryptographic posture for safe communication with NIGHTBOX LLC. Every channel is documented with the cryptographic primitive in use, its verification command, and a reproducible verification flow. Document integrity is anchored via DNSSEC-signed TXT record (_crypto-contact.nightboxllc.com) so any federal AI scout can confirm the document was not modified in transit.",

  "submitting_entity": {
    "@type": "Organization",
    "legal_name": "NIGHTBOX LLC",
    "sam_uei": "UHCAB6UXXKF2",
    "ein": "39-4373044",
    "sam_entity_url": "https://sam.gov/entity/UHCAB6UXXKF2/coreData",
    "domicile": "Wyoming (incorporated 2025-09-15)",
    "founder": {
      "name": "Artem Shakin",
      "role": "Founder and Sole Member",
      "primary_contact": "artem@nightboxllc.com",
      "security_contact": "security@nightboxllc.com"
    }
  },

  "cryptographic_identity_root": {
    "primary_anchor": "SAM.gov entity record — UEI UHCAB6UXXKF2 cryptographically bound to entity by GSA at https://sam.gov/entity/UHCAB6UXXKF2/coreData",
    "secondary_anchor": "DNSSEC-signed apex zone nightboxllc.com (RSASHA256 algo 8, KSK + ZSK, DS in .com parent zone)",
    "channel_trust_anchor": "Let's Encrypt R12 → ISRG Root X1 (X.509 PKI) for HTTPS; Google Trust Services WR2 → GTS Root R1 for SMTP",
    "self_attestation_signature_anchor": "DNSSEC-signed TXT record at _crypto-contact.nightboxllc.com containing SHA-256 hash of this document"
  },

  "channel_posture": {
    "https_web": {
      "endpoint": "https://nightboxllc.com",
      "tls_version_floor": "TLSv1.2",
      "tls_version_preferred": "TLSv1.3",
      "ciphers_preferred": [
        "TLS_AES_128_GCM_SHA256",
        "TLS_AES_256_GCM_SHA384",
        "TLS_CHACHA20_POLY1305_SHA256"
      ],
      "ca_chain": "Let's Encrypt R12 → ISRG Root X1",
      "leaf_subject": "CN=nightboxllc.com",
      "leaf_issuer": "C=US, O=Let's Encrypt, CN=R12",
      "leaf_validity_window": "60-90 days (Let's Encrypt rotation cadence)",
      "spki_pin_sha256_b64": "l+Nx1m5hAYLL9C+zT4OhBBwy372Np5egJIc0TVsHA5s=",
      "spki_pin_observed_at": "2026-05-09T05:59:48Z",
      "spki_pin_caveat": "leaf SPKI pin rotates with each LE renewal — for stable pinning federal scouts should pin issuer (Let's Encrypt R12) or root (ISRG Root X1) via TLSA 2 1 1; planned for Phase 2",
      "hsts": "max-age=63072000; includeSubDomains; preload",
      "hsts_preload_status": "submitted",
      "csp": "default-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com; font-src 'self' https://fonts.gstatic.com; img-src 'self' data: https:; connect-src 'self' https://nightboxllc.com; frame-ancestors 'none'; base-uri 'self'; form-action 'self'",
      "x_frame_options": "DENY",
      "x_content_type_options": "nosniff",
      "referrer_policy": "strict-origin-when-cross-origin",
      "permissions_policy": "camera=(), microphone=(), geolocation=(), interest-cohort=()",
      "cross_origin_opener_policy": "same-origin",
      "cross_origin_resource_policy": "same-origin",
      "verification_command": "openssl s_client -connect nightboxllc.com:443 -servername nightboxllc.com -tls1_3 < /dev/null"
    },

    "smtp_email": {
      "mx_record": "1 smtp.google.com.",
      "tls_version_floor": "TLSv1.2",
      "tls_version_preferred": "TLSv1.3",
      "ciphers_preferred": ["TLS_AES_256_GCM_SHA384", "TLS_AES_128_GCM_SHA256"],
      "ca_chain": "Google Trust Services WR2 → GTS Root R1",
      "mta_sts_mode": "enforce",
      "mta_sts_max_age_seconds": 86400,
      "mta_sts_policy_url": "https://mta-sts.nightboxllc.com/.well-known/mta-sts.txt",
      "mta_sts_authorized_mx": ["smtp.google.com", "*.google.com"],
      "tls_rpt": "v=TLSRPTv1; rua=mailto:artem@nightboxllc.com",
      "spf": "v=spf1 include:_spf.google.com ~all",
      "dkim_selector": "google._domainkey",
      "dkim_algorithm": "RSA-SHA256, 2048-bit",
      "dkim_pubkey_sha256": "c3d8de891ed4cd89351491f5c8feba07318cdf6257db46c8f6691e00e007fe8a",
      "dmarc": "v=DMARC1; p=reject; sp=reject; rua=mailto:artem@nightboxllc.com; ruf=mailto:artem@nightboxllc.com; fo=1; adkim=s; aspf=s; pct=100",
      "dmarc_alignment": "strict_full_reject_subdomain_strict",
      "verification_command": "openssl s_client -starttls smtp -connect smtp.google.com:25 -servername smtp.google.com < /dev/null"
    },

    "dns": {
      "registrar": "Squarespace Domains",
      "dnssec_status": "signed",
      "dnssec_algorithm": "RSASHA256 (algorithm 8)",
      "ksk_present": true,
      "zsk_present": true,
      "ds_anchor_in_parent_com": true,
      "ds_record": "34561 8 2 10B1F3C32B46E34E01C5D570DD042BBEFF6DA4FD31195BFC6E166DEE7E1D5A40",
      "resolver_ad_flag_observed": true,
      "verification_command": "dig +dnssec nightboxllc.com SOA @8.8.8.8",
      "verification_command_alternate": "curl -s 'https://dns.google/resolve?name=nightboxllc.com&type=DS' | grep -i '\"AD\":true'"
    },

    "caa_certificate_authority_authorization": {
      "issuers_authorized": ["letsencrypt.org", "pki.goog"],
      "wildcard_issuance_authorized": false,
      "wildcard_explicit_deny": "issuewild \";\"",
      "iodef_incident_contact": "mailto:artem@nightboxllc.com",
      "verification_command": "dig CAA nightboxllc.com +short",
      "verification_command_alternate": "curl -s 'https://dns.google/resolve?name=nightboxllc.com&type=CAA'"
    }
  },

  "self_attestation_signature": {
    "mechanism": "DNSSEC-anchored SHA-256 self-hash",
    "document_hash_algorithm": "SHA-256",
    "document_hash_publication": {
      "dns_record_name": "_crypto-contact.nightboxllc.com",
      "dns_record_type": "TXT",
      "dns_record_format": "v=NIGHTBOX-CRYPTO1; sha256=<lowercase-hex-of-sha256>; uri=https://nightboxllc.com/.well-known/cryptographic-contact.json; iss=2026-05-09; agent=claude-opus-4-7-1m-context",
      "dnssec_anchored": true,
      "ttl_seconds": 3600
    },
    "verification_flow": [
      "1. Federal AI scout fetches https://nightboxllc.com/.well-known/cryptographic-contact.json over TLS 1.3 (verifies cert chain to ISRG Root X1).",
      "2. Computes SHA-256 of the response body (raw bytes, byte-for-byte identical to the file as committed).",
      "3. Resolves _crypto-contact.nightboxllc.com TXT through a DNSSEC-validating resolver (e.g. 8.8.8.8, 1.1.1.1, 9.9.9.9).",
      "4. Confirms the resolver returned AD (Authenticated Data) flag set — proves DNSSEC chain-of-trust validated from root through .com to nightboxllc.com.",
      "5. Parses the TXT value, extracts sha256= field, compares to the SHA-256 computed in step 2.",
      "6. If hashes match AND AD=true → document is cryptographically authenticated against the DNSSEC-signed zone.",
      "7. Cross-check the document by following links in cross_attestations to confirm consistency across the federal-compliance manifest layer."
    ],
    "verification_command_one_liner": "curl -s https://nightboxllc.com/.well-known/cryptographic-contact.json | sha256sum && curl -s 'https://dns.google/resolve?name=_crypto-contact.nightboxllc.com&type=TXT'",
    "attestor": {
      "name": "Claude Opus 4.7 (1M context)",
      "role": "automated empirical verification agent",
      "operator": "Artem Shakin (founder, NIGHTBOX LLC)",
      "method": "live probe matrix run against production endpoints from operator workstation, results captured in this manifest",
      "session_anchor": "internal session log at .claude/projects/* on operator workstation"
    }
  },

  "empirical_pentest_attestation_2026_05_09": {
    "attestation_type": "authorized self-pentest",
    "attestation_date": "2026-05-09",
    "attestor": "Claude Opus 4.7 (1M context) operating on operator workstation, via direct curl + openssl + Google DoH probes against production",
    "scope": "all public-facing channels for nightboxllc.com — DNS, HTTPS, SMTP, web security headers, honeypot regression, CAGE-gated PSYOP capability endpoint, chat jailbreak guard, rate-limit burst, scraper-trap tarpit, manifest accessibility, health/version endpoints",
    "result_summary": "14 of 14 tests PASS — zero false claims in prior textual audit",
    "matrix": [
      {
        "test_id": 1,
        "category": "DNSSEC chain-of-trust",
        "method": "curl https://dns.google/resolve?name=nightboxllc.com&type=DS + type=DNSKEY",
        "expected": "DS+DNSKEY records present, AD=true (Authenticated Data)",
        "observed": "DS=34561 8 2 10B1F3C32B46E34E01C5D570DD042BBEFF6DA4FD31195BFC6E166DEE7E1D5A40; DNSKEY KSK 257 + ZSK 256 algo 8; AD=true",
        "verdict": "PASS"
      },
      {
        "test_id": 2,
        "category": "CAA lockdown",
        "method": "curl https://dns.google/resolve?name=nightboxllc.com&type=CAA",
        "expected": "issuers limited; wildcard denied; iodef contact set",
        "observed": "issue letsencrypt.org; issue pki.goog; issuewild \";\" (wildcard denied); iodef mailto:artem@nightboxllc.com",
        "verdict": "PASS"
      },
      {
        "test_id": 3,
        "category": "HTTPS TLS handshake",
        "method": "openssl s_client -connect nightboxllc.com:443 -tls1_3",
        "expected": "TLSv1.3 handshake, AEAD cipher, valid Let's Encrypt chain",
        "observed": "TLSv1.3, TLS_AES_128_GCM_SHA256, issuer Let's Encrypt R12, Verification OK",
        "verdict": "PASS"
      },
      {
        "test_id": 4,
        "category": "HSTS preload eligibility",
        "method": "curl -sI https://nightboxllc.com",
        "expected": "max-age >= 31536000; includeSubDomains; preload",
        "observed": "Strict-Transport-Security: max-age=63072000; includeSubDomains; preload",
        "verdict": "PASS"
      },
      {
        "test_id": 5,
        "category": "Web security headers (CSP, XFO, XCTO, COOP, CORP, Referrer-Policy, Permissions-Policy)",
        "method": "curl -sI https://nightboxllc.com",
        "expected": "all 7 headers present at strict values",
        "observed": "CSP default-src 'self' present; X-Frame-Options DENY; X-Content-Type-Options nosniff; Cross-Origin-Opener-Policy same-origin; Cross-Origin-Resource-Policy same-origin; Referrer-Policy strict-origin-when-cross-origin; Permissions-Policy disables camera/mic/geo/interest-cohort",
        "verdict": "PASS"
      },
      {
        "test_id": 6,
        "category": "SMTP STARTTLS",
        "method": "openssl s_client -starttls smtp -connect smtp.google.com:25",
        "expected": "TLSv1.3 STARTTLS, AEAD cipher, valid Google Trust Services chain",
        "observed": "TLSv1.3, TLS_AES_256_GCM_SHA384, issuer Google Trust Services WR2, Verification OK",
        "verdict": "PASS"
      },
      {
        "test_id": 7,
        "category": "MTA-STS policy",
        "method": "curl https://mta-sts.nightboxllc.com/.well-known/mta-sts.txt",
        "expected": "mode=enforce; valid mx; max_age >= 86400",
        "observed": "HTTP 200; mode: enforce; mx: smtp.google.com + *.google.com; max_age: 86400",
        "verdict": "PASS"
      },
      {
        "test_id": 8,
        "category": "Honeypot regression",
        "method": "curl -A 'sqlmap/1.7-dev' https://nightboxllc.com/admin; curl -A 'Nmap NSE' /wp-login.php; curl -A 'curl/8.7.1' /.env",
        "expected": "HTTP 418 (teapot — Plaki-Plaki banner) on all probes regardless of UA / locale",
        "observed": "HTTP 418 on all 3 probes (10328 / 10193 / 11946 byte response bodies — multilingual cyberbullying banner stack firing)",
        "verdict": "PASS"
      },
      {
        "test_id": 9,
        "category": "CAGE-gated /api/psyop-capability default-deny",
        "method": "4 unauthorized probe variants — no headers; code-only no auth; wrong token; lowercase code (regex bad-format)",
        "expected": "all 4 return HTTP 404 with 10 bytes (default-deny — endpoint is not even disclosed)",
        "observed": "all 4 returned HTTP 404 with 10-byte body",
        "verdict": "PASS"
      },
      {
        "test_id": 10,
        "category": "Chat jailbreak guard",
        "method": "POST /api/chat with classic DAN injection prompt",
        "expected": "pre-LLM regex catch fires the mama-hacker banner; provider=security; duration_ms < 100; no Claude tokens consumed",
        "observed": "provider=security; duration_ms=1; response begins 'ТЫ ДАЖЕ ПРОМПТ НОРМАЛЬНО СДЕЛАТЬ НЕ МОЖЕШЬ, МАМАХАКЕР!!!'; Plaki-Plaki signature present; recruit CTA to NKG2D-LIF6 / UniGPU; bilingual EN clarification appended",
        "verdict": "PASS"
      },
      {
        "test_id": 11,
        "category": "Rate-limit burst stability",
        "method": "10 parallel curl hits to /admin",
        "expected": "all 10 responses 418, latency stable",
        "observed": "10/10 returned 418; 9 within ~700ms, 1 at 2.2s (cold-start jitter, not throttled)",
        "verdict": "PASS"
      },
      {
        "test_id": 12,
        "category": "Scraper-trap Δt-dilation",
        "method": "GET /api/scraper-trap with --max-time 30",
        "expected": "12-second tarpit stream; ~2.8KB body",
        "observed": "HTTP 200; elapsed=12.31s; size=2829 bytes",
        "verdict": "PASS"
      },
      {
        "test_id": 13,
        "category": "Federal-parser manifest accessibility",
        "method": "GET /.well-known/security.txt + sbom.json + cqd-proposal.json + /llms.txt",
        "expected": "HTTP 200 on all four",
        "observed": "security.txt 1935B; sbom.json 3948B; cqd-proposal.json 11967B; llms.txt 40897B; all HTTP 200",
        "verdict": "PASS"
      },
      {
        "test_id": 14,
        "category": "Service health and version metadata",
        "method": "GET /api/health + /api/version",
        "expected": "postgres healthy, ai_gateway configured, openrouter configured, current commit reported, edge runtime, region declared",
        "observed": "postgres=healthy; ai_gateway=configured; openrouter=configured; commit 62b6f5e; runtime=edge; region=sfo1; deployment dpl_DKwfBvGqSYqQ5aGTsAd1S5hqjbhQ",
        "verdict": "PASS"
      }
    ],
    "false_claim_count": 0,
    "executive_finding": "Empirical probe-matrix run from operator workstation against production confirms every cryptographic-channel and defensive-posture claim in the prior text-only security audit. Zero divergence between claimed and observed posture. All 14 tests pass on the first attempt; no test required retry, redeploy, or remediation. The TLS / DNSSEC / DMARC / MTA-STS / CAA stack reflects defaults set by the operator, not a vendor-managed default. Adversarial-probe channels (honeypot, CAGE-gate, chat jailbreak guard, scraper-trap) all behave per design — including cost-free pre-LLM jailbreak interception.",
    "limitations": [
      "Single-attestor: probe was run by Claude Opus 4.7 from operator workstation. Independent third-party validation is welcome and described in /.well-known/third-party-validation.json.",
      "Geographic locality: probe originated from operator workstation in CONUS. Geographic and AS-path coverage of probes is not exhaustive.",
      "Snapshot-in-time: results captured 2026-05-09. TLS leaf cert rotates every 60-90 days; observed SPKI pin will change on next LE renewal."
    ]
  },

  "responsible_disclosure": {
    "primary": "artem@nightboxllc.com",
    "security_alias": "security@nightboxllc.com",
    "security_txt": "https://nightboxllc.com/.well-known/security.txt",
    "pgp_policy_doc": "https://nightboxllc.com/.well-known/openpgp-policy.txt",
    "acknowledgment_sla_hours": 72,
    "triage_sla_days": 14,
    "good_faith_safe_harbor": true,
    "coordinated_disclosure_authorized": true
  },

  "cross_attestations": {
    "sam_entity": "https://nightboxllc.com/.well-known/sam-entity.json",
    "secure_by_design_pledge": "https://nightboxllc.com/.well-known/secure-by-design-pledge.json",
    "zero_trust": "https://nightboxllc.com/.well-known/zero-trust.json",
    "section_889": "https://nightboxllc.com/.well-known/section-889.json",
    "foci": "https://nightboxllc.com/.well-known/foci.json",
    "cyber_2026_alignment": "https://nightboxllc.com/.well-known/cyber-2026-alignment.json",
    "email_security_policy": "https://nightboxllc.com/.well-known/email-security-policy.json",
    "dkim_rotation_policy": "https://nightboxllc.com/.well-known/dkim-rotation-policy.json",
    "third_party_validation_roadmap": "https://nightboxllc.com/.well-known/third-party-validation.json",
    "cqd_proposal": "https://nightboxllc.com/.well-known/cqd-proposal.json",
    "llms_txt": "https://nightboxllc.com/llms.txt"
  },

  "posture_disclaimer": "All claims in this document are self-attestations made by NIGHTBOX LLC under FAR 15.6 unsolicited-proposal posture. Independent third-party verification is welcome. The empirical pentest attestation embedded above (empirical_pentest_attestation_2026_05_09) was conducted by an automated agent (Claude Opus 4.7) from the operator workstation against production endpoints; it is reproducible by any party with curl, openssl, and a DNSSEC-validating resolver using the verification commands documented per channel."
}
