Conformance Levels
L1, L2, and L3 conformance gates — what each level guarantees and how to test.
Conformance Levels: technical reference for this page.
HELM Conformance
Canonical architecture: see ARCHITECTURE.md §8 for normative level definitions.
Levels
| Level | Meaning | Gates |
|---|---|---|
| L1 | Core kernel correctness: JCS canonicalization, PEP boundary, Ed25519 signatures, Lamport clock ordering, ProofGraph DAG integrity | 6 |
| L2 | Full operational correctness: L1 + WASI sandbox bounds, approval ceremonies, EvidencePack determinism, offline replay, output drift detection, trust rotation | 12 |
| L3 | Enterprise correctness: L2 + HSM key management (G13), policy bundle integrity (G14), proof condensation (G15) | Shipped |
Running Conformance
# Build
make build
# Run L1
./bin/helm conform --level L1 --json
# Run L2 (includes all L1 gates)
./bin/helm conform --level L2 --json
Expected Output (L2)
{
"run_id": "conform-...",
"profile": "CORE",
"pass": true,
"timestamp": "2026-03-22T...",
"duration": "...",
"gate_results": [
{"gate_id": "G0", "pass": true, "reasons": []},
{"gate_id": "G1", "pass": true, "reasons": []},
{"gate_id": "G2", "pass": true, "reasons": []}
]
}
Gate Details
- JCS Canonicalization — RFC 8785 deterministic JSON serialization
- PEP Boundary — Schema validation on both input and output
- WASI Sandbox — Gas, time, and memory bounds enforced
- Approval Ceremony — Timelock + 4-hash challenge/response with Ed25519
- ProofGraph DAG — Append-only, Lamport-ordered, hash-chained
- Trust Registry — Event-sourced key lifecycle
- Evidence Pack — Deterministic export (same content → same hash)
- Offline Replay — Replay from genesis without network
- Output Drift — SHA-256 output hash mismatch detection
- Idempotency — Receipt-based duplicate rejection
- Island Mode — Build and verify without network
- Conformance Gates — Self-test harness
L3 Gates (Shipped)
L3 conformance gates extend L2 with enterprise requirements. These gates are structurally implemented but not yet adversarially tested.
| Gate | Requirement |
|---|---|
| G13 | HSM key management — hardware-backed signing with ceremony-based rotation |
| G14 | Policy bundle integrity — signed bundles with content-addressed loading |
| G15 | Proof condensation — Merkle checkpoints for long-running sessions |
CI Integration
Conformance runs as a CI gate on every push to main. See .github/workflows/helm_core_gates.yml → conformance-gate job.