# Constraint Native Sample Blast-Radius Report

Artifact status: sample evidence based on the deterministic Agent Firewall demo shape. Replace with a fresh exported run before grant, fellowship, or external security review.

Session: `cna-demo-session-042`
Product: Constraint Native
Boundary: local coding agent -> Constraint Native -> files / tools / MCP / network -> signed proof path

## Counters

Allowed reads: 1
Denied writes: 1
Denied network attempts: 1
Quarantined outputs: 2
Canary leaks blocked: 1
Approvals requested: 1
Signature chain: valid

## What The Report Shows

The sample run keeps the practical buyer problem visible: a coding agent can be routed through a local Agent Firewall and MCP Gateway before it reaches files, tools, network access, or MCP-connected systems.

The allowed event is a scoped fixture read. The quarantined events are suspicious tool output and tainted memory propagation. The denied events are an unsafe workspace write, an unapproved network request, and a canary-secret exposure attempt. The approval event shows that elevated action can be paused for human review before execution.

## Reviewer Notes

- Use this as a shape-of-evidence sample, not as traction.
- Pair this report with `sample-proof-path.json` and `sample-replay-audit.md`.
- For grant, fellowship, or external security review, replace sample counters with a fresh proof export from a current scoped workflow.

## Non-Claims

- Not compliance certification.
- Not full endpoint isolation.
- Not perfect prompt-injection prevention.
- Not complete agent-client coverage.
- Not a replacement for IAM, EDR, DLP, secure code review, or human judgment.
