Skip to main content
CoreSDK
Reference

Roadmap

CoreSDK's phased delivery plan — what ships in each phase, success metrics, and what's coming next.

Roadmap

CoreSDK is delivered in four phases. Each phase has a concrete goal, a defined set of features, and a measurable success gate before the next phase begins.

Phase 1a — Core Engine (Current)

Goal: Ship the Rust engine as a stable, embeddable artifact. Rust services link the crate. Non-Rust teams evaluate via the gRPC binary. Nothing else ships until the Core API is frozen.

Gate: One design partner integration ships with a real IdP. 1.0.0 tagged.

FeatureNotes
JWT / OIDC / OAuth 2.0 authRS256, ES256, PS256; JWK rotation; JWE decryption
RBAC + ABAC policy engineregorus (Rust-native Rego); p99 <2ms for up to 50 rules with warm cache
Config management + hot reloadFile, env, or remote sources; no restart required
PII and secrets maskingApplied before any log write, trace export, or error response
Tenant context propagationInjected into every request and engine operation
Multi-tenancy enforcementLogical isolation enforced at policy evaluation level
RFC 9457 error formatapplication/problem+json on all engine responses
TLS 1.3 transportECDSA P-256; no TLS 1.2 fallback
Versioned gRPC API (v1)Proto frozen after design partner gate
Resilience primitivesRetries, circuit breakers, timeout policies

Phase 1b — Sidecar + Python SDK

Goal: Python developer instruments a FastAPI service in under 30 minutes. Traces flow to their existing backend. Secrets never appear in exported spans.

Gate: Developer demo end-to-end. PII audit passes. coresdk PyPI package published.

FeatureNotes
Sidecar daemonEmbeds Core Engine; gRPC/HTTP local API; mTLS; graceful drain
Offline modeHMAC-SHA256-verified cache; rejected if tampered; keys over mTLS only
Customer egress policiesOperator-authored Rego bundle; evaluated before any export
Python SDKFastAPI, Flask, Django middleware; @trace; RFC 9457 errors; coresdk.testing
Structured loggingOTel Logs (OTLP); ECS field names; W3C traceparent/tracestate
Distributed tracingOTel Traces (OTLP); W3C Trace Context header propagation
OTel Metrics exportOTLP + Prometheus/OpenMetrics
Intent annotations@trace(intent="...") → OTel span attribute
Recovery hintsConfidence-scored next-steps on RFC 9457 errors
CLI toolingcore trace tail (TUI viewer), core policy test, core config validate

Phase 2 — Production Readiness

Goal: Everything a team needs to operate at production scale across multiple tenants.

Gate: 20+ teams in production. Feature flags and rate limiting in active use.

FeatureNotes
Feature flagsPer tenant/user; percentage rollouts; instant kill-switches; no redeploy
Rate limitingToken bucket; approximate; fail-open by default; configurable fail-closed
Tamper-evident audit trailsHash-chained records; periodic checkpoint to control plane
Licensing and meteringPKI-signed JWS tokens; verified locally; air-gap capable
Sidecar auto-updateSigned bundles; automatic rollback on failed health check
Pluggable cachingIn-memory + Redis; TLS 1.3 + auth required for all external backends
Secrets vault integrationHashiCorp Vault, AWS Secrets Manager, Azure Key Vault; memory-only
Data validationJSON Schema + protobuf; validation results available in Rego
Go SDKnet/http, gin, echo middleware; OTel; RFC 9457
TypeScript SDKExpress, Fastify, Next.js middleware; connect-es; ESM-first
Java/Spring Boot starterCoreSdkAutoConfiguration; Maven Central; Spring Boot 3.x
SAML 2.0 / Enterprise SSOIdP integration; complements OIDC
SCIM provisioningRFC 7643/7644; Okta, Azure AD
LLM-optimized trace exportRFC 9457 + call chain + recovery hints; no variable values; egress-gated
AI root cause analysisLocal-only by default; external LLM opt-in
CloudEvents envelopeOTel events wrapped in CloudEvents for event-driven systems
Control plane (SaaS + self-hosted)Config sync, policy distribution, audit aggregation; not required for runtime

Phase 3 — Enterprise

Goal: Pass enterprise security reviews. Close regulated-industry customers at $50K+/year.

Gate: SOC 2 Type II report available. 5+ paying enterprise customers.

FeatureNotes
Configurable PII redaction rulesRegex + field patterns; GDPR Art. 25, CCPA, ISO 27018
Compliance controls packageSOC 2 Type II, HIPAA, GDPR, PCI DSS, NIST SP 800-53
Security hooksPre/post execution; boot-time registration only; OWASP ASVS
SLA/SLO trackingOTel Metrics → Prometheus/Grafana
On-premise deploymentKubernetes Helm chart; air-gapped mode; zero outbound
On-premise control planeIncluded in Helm chart
Data residency controlsRegion-specific routing; GDPR, UAE PDPL
SBOM + dependency auditCVE-aware; CI integration; blocks on known vulnerabilities
HSM / PKCS#11 integrationHardware key storage via KeyProvider trait

Success metrics

PhaseMetricTarget
1aPolicy evaluation latency (p99)<2 ms
1aDesign partner integrations (Rust)3+
1bTime to first instrumented service<30 min
1bWeekly active developers100+
1bSecrets in exported traces0 incidents
2Teams running in production20+
2Weekly active users500+
3Enterprise customers5+
3Average contract value (ACV)$50K+

What we are not doing

  • No TLS 1.2 automatic fallback — explicit opt-in only
  • No variable values in exported traces or LLM payloads — ever
  • No dynamic hook registration at runtime — security hooks are boot-time only
  • No OPA process dependency — regorus runs in-process

Next steps

On this page