External attacks mapped to domain behaviour
Select an external attack surface to see the resulting state of the domain under conventional controls and under MAX rule enforcement.
Key theft targets secrets used by applications, services and operators. Typical controls include hardened key generation, storage, rotation and isolation.
Even with good practice, the domain remains dependent on correct configuration and operator discipline, and behaviour may still drift in ways that are hard to predict and audit.
MAX does not treat keys as implicit authority. A stolen key cannot invent new rule capsules or extend the rule space. It can only interact with behaviours that were already modeled, simulated, authorized and signed.
Misuse of keys may still create infrastructure load or repeated valid invocations, but it cannot create any new domain behaviour. The behaviour space remains exactly the same set of activated rule capsules as before the attack.
INFRA), is not defined inside the domain (NDEF), or depends on what the operator authorizes (MIXED).