
What a “Development Session Proof” Workflow Looks Like with SessionAttested
This article is a hands-on / operational follow-up to my earlier write-up about SessionAttested. Instead of focusing on architecture or implementation internals, this one focuses on: how SessionAttested fits into a real development workflow how policy refinement actually works in practice what audit results look like in the built-in WebUI The example used here is a real PoC workspace: attested_poc/ . In that PoC, I compare two cases under a policy that forbids VS Code (server/node executables) : a session without VS Code usage (PASS) a session with VS Code usage (FAIL) If you want to jump straight to the repository: GitHub: https://github.com/shizuku198411/SessionAttested PoC workspace example: https://github.com/shizuku198411/SessionAttested/blob/main/attested_poc/README.md What This Article Tries to Show SessionAttested is not only about “detecting forbidden tools.” What becomes more interesting in practice is that it gives you a repeatable workflow for: auditing development work in
Continue reading on Dev.to
Opens in a new tab

