feat: add comprehensive security vetting framework (inst_041-046)
Created 6 permanent strategic instructions for rigorous external input vetting:
**inst_041: File Upload Validation**
- Mandatory malware scanning using sovereign tools (ClamAV, YARA, file(1))
- Multi-layer validation: type verification, virus scanning, pattern matching
- Quarantine suspicious files, never auto-process flagged content
- Implementation: src/middleware/file-security.middleware.js
**inst_042: Email Security Pipeline**
- Sovereign email stack (SpamAssassin, amavisd-new, postfix/dovecot)
- DKIM/SPF/DMARC validation, attachment type restrictions
- Rate limiting per sender, malware scanning via ClamAV
- Quarantine suspicious attachments with admin alerts
**inst_043: Form Input Sanitization**
- Rigorous validation before processing/storage
- DOMPurify HTML sanitization, parameterized queries only
- NoSQL injection prevention, XSS prevention (CSP + output encoding)
- CSRF protection on all state-changing endpoints
- Implementation: src/middleware/input-validation.middleware.js
**inst_044: HTTP Security Headers**
- Comprehensive security headers on all responses
- CSP enforcement at HTTP level (defense in depth with inst_008)
- HSTS, X-Frame-Options, X-Content-Type-Options
- CSP violation reporting endpoint for attack detection
- Implementation: src/middleware/security-headers.middleware.js
**inst_045: API Endpoint Protection**
- Rate limiting (public/authenticated/admin tiers)
- JWT authentication with short expiry (15min access, 7day refresh)
- IP blocking after repeated violations (10 in 1hr = 24hr block)
- Request validation, response sanitization
- Monitoring for attack patterns (enumeration, brute force, etc.)
**inst_046: Security Monitoring & Alerting**
- Centralized logging to /var/log/tractatus/security-audit.log
- Real-time monitoring dashboard at /admin/security-monitoring.html
- Alert thresholds (10 violations/IP/hour = alert, 100 global/hour = attack alert)
- fail2ban integration for automated IP blocking
- Sovereign log analysis tools (grep, awk, jq) - no external services
All instructions use sovereign tools (open-source, auditable, under organizational control)
and implement defense in depth across multiple layers. Synced to production.
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude <noreply@anthropic.com>