04 / cache poisoning

The alert hit every channel at once.

[ALERT] INC-0004 — Tenant isolation failure on edge cache layer
[ALERT] Company helios receiving orion dashboard widgets
[ALERT] API sessions returning mismatched tenant contexts
[ALERT] Invalid feature flags propagating globally
[CRITC] /session endpoint: poisoned data detected

Andy stared at the dashboard. Three different tenants were receiving each other’s configuration data. Sessions appeared swapped. Feature flags meant for one company were activating inside another.

Security posted within minutes: external intrusion. Cache poisoning. Credential compromise.

But Bob sent a direct message before the all-hands even started.

“Ignore Security’s thread. Look at which infrastructure routes are affected.”

Andy pulled the cache topology. The corruption wasn’t random. It followed specific routes — /config, /session, /feature — across specific edge nodes.

All of them had been maintained by someone named Rin.

Andy searched for Rin in the company directory. No results.

evidence retained
  1. The poisoned /session route did not originate from edge-01.
  2. atlas was not affected through /feature.
  3. A recovered fragment from Rin’s maintenance log: node=edge-03 route=/config — invalidated. Bob: “Funny how nobody can explain when exactly Rin left.”
  4. edge-03 only served corrupted data to helios.
  5. A partial audit fragment recovered from backup: tenant=orion route=/feature
  6. A malformed telemetry line appears in the edge-03 log: cache.invalidate("truth"). Bob dismisses it as junk data. Andy does not.
messages bob
Bob 11:42

Don't use internal search for Rin. Half the records are gone.

Bob 11:44

Someone is cleaning logs faster than Security can archive them.

Bob 11:47

If this were an external breach, they'd already have announced it.

table cache topology

fault

Tenant data cross-contamination

type

Cache isolation failure

severity

SEV-1

helios orion atlas /config /session /feature
edge-01
edge-02
edge-03
/config
/session
/feature
answer input incident response

Question: Which tenant received poisoned data, through which edge node, on which route?