UNCLASSIFIED // TECHNICAL BRIEF // ACCESS LOGGED // 2026-05-09
WICK SECURITYPLATFORM BRIEF — FORMAL PROOF INFRASTRUCTURE

Formal proof infrastructure for systems where
probabilistic security is unacceptable.

Instead of alerts and confidence scores, WICK produces machine-verifiable proof artifacts showing whether defined failure classes are reachable, impossible, or proven under formal constraints.

// Operational model
HARDENSRF-01→13 · Proof before attack
Formal verification before deployment across prevention surfaces.
INTERCEPTSRF-14→17 · Proof at contact
Runtime constraint enforcement and behavioral drift detection.
RECOVERSRF-18→21 · Proof after breach
Forensic tracing, judicial packages, sovereign attestation.
// Field validation
25+
Confirmed findings (CVE filings + vendor ACKs)
55.8%
of tested AI-generated code provably vulnerable
3,500
Artifacts analyzed arXiv 2604.05292
FIELD VALIDATION TARGETS
Systems / SecurityNASA cFS · wolfSSL · Mozilla NSS · Zephyr RTOS · FreeRTOS
Networking / IoTEclipse Mosquitto · libupnp · libmodbus · Mongoose · lwIP
Research / AI / DeFiarXiv 2604.05292 · llama.cpp · COMPAS · Balancer V3 · Euler V2 · Morpho Blue
OPERATIONAL USE
Selected WICK surfaces have been used in active security verification, blockchain tracing, and financial crime investigation workflows. Sensitive case details available under NDA to qualified government, defence, or institutional contacts.
// 21 surfaces — grouped by operational theatre
SRFSurfaceTheatreTarget systemPrimary artifact / value
Theatre I
Critical Software Verification
SRF-01CobaltC / C++ / RTOS / firmware / crypto libsVendor-validated findings — NASA, wolfSSL, Mozilla, CESNET / Z3 proof artifact
SRF-02ForgeSolidity / EVM smart contractsReentrancy / oracle manipulation constraint proof
SRF-03FerriteRust / WASM / FFI boundariesUnsafe block reachability — memory safety certificate
SRF-04Cobalt PQCNIST FIPS 203/204/205 — Kyber/Dilithium/FalconParameter correctness + timing-safety proof
SRF-05Cobalt COBOLCOBOL / mainframe batch / copybooks100% proof success across a 2,345-program COBOL verification corpus
SRF-06BedrockFirmware / bootloaders / UEFI / embedded MCUStack overflow / unsafe call path proof below OS
SRF-07VeinSBOM supply chain — CycloneDX / SPDXCVE constraint violation per dependency — proved
SRF-13SignalICS / OT / SCADA / PLC — Modbus / DNP3 / IEC 61850CNSC safety case — Z3 certificate per invariant
SRF-14CassandreLive DeFi protocols — on-chain invariantsInvariant violation detection before exploit — $197M Euler pattern
Theatre II
Autonomous Systems Control
SRF-10AugurMulti-agent swarm systemsEmergent behavior divergence proof — Byzantine bounds
SRF-11The AnswerAI model decision outputs — EU AI Act / COMPASCOMPAS-validated fairness certificate — causal bias proved or disproved
SRF-15VerdictAI agent behavioral drift — session-levelBehavioral envelope violation proof — no thresholds
SRF-16SentinelAI agent pre-execution constraints<100ms constraint verdict — 100% audit trail
Theatre III
Sovereign Intelligence Infrastructure
SRF-08WraithAdversarial reachability + blockchain AML — 12 chainsField-used adversarial reachability / AML screening artifact
SRF-09SkyveilMilitary OSINT — ADS-B / AIS / GDELT / NOTAMNATO INTSUM brief — threat score — Canadian-controlled
SRF-17PhantomHoneypot probe intelligenceAttacker signature artifact — formal attack classification
SRF-18TraceCross-chain fund tracing — 6+ chains / 13 CEXField-used tracing workflows / freeze-ready evidence package
SRF-19VantumMaritime + judicial + FINTRAC STR pipelineSTR Art. 7 LRPCFAT · Art. 462.32 C.cr. — freeze-ready evidence trail
SRF-20IRISOn-device facial recognition — PIPEDA / Law 25Immutable biometric audit entry — zero cloud
SRF-21SovereigntyJurisdiction proof — IaC / vendor / data flowCanadian-controlled attestation — signable by CISO
Proof Integration Layer
Cross-surface verdict chain
SRF-12LatticeAll 21 surfaces — proof chain compositionSHA-256 tamper-evident verdict — single document for regulator
// Sovereignty — SRF-21 + deployment architecture
Canadian infrastructureCompute, storage, and transit on Canadian-controlled nodes
Canadian data residencyDesigned to support Canadian data residency under defined deployment controls.
CLOUD Act exposureMinimized by architecture — Canadian-controlled deployment chain
Foreign jurisdictional exposureReduced through vendor selection and deployment controls
GC procurement alignmentDesigned with Protected B / PBMM / ITSG-33 in mind
FSCFederal security clearance pathway identified
Sovereignty artifact (SRF-21)Machine-verifiable attestation signable by CISO or contracting authority
Sovereignty and compliance claims depend on deployment architecture, hosting model, contractual controls, and operational scope.
// Sample proof artifact — wick-artifact/v1
SurfaceCobalt — SRF-01
Targetlibyang 3.x — LYB IPC parser
Input conditionstring_len = 0xFFFFFFFF
Constraint eval.malloc(0) → WRITE SEGV at offset 4GB
VerdictSAT — failure condition reachable
Witness values{ "string_len": "0xFFFFFFFF" }
Review statusPR #2513 merged by CESNET maintainer
Evidence chainz3-smtlib2-artifact · SHA-256 sealed
LATTICE SRF-12 — PROOF CHAIN OUTPUT
All surface artifacts composed into one SHA-256 tamper-evident chain. One document. One deterministic verdict. The artifact a CISO or regulator signs.
Dominik Blain
Founder, Wick Security / QreativeLab
dominik@qreativelab.io
wicksecurity.ca
Live demos
wraith-007.fly.dev
skyveil-bice.vercel.app
arxiv.org/abs/2604.05292
Technical briefing document. Not legal advice.
Sovereignty and compliance claims depend on deployment architecture, hosting model, contractual controls, and operational scope.

Wick Security — MMXXVI.