Failure Pattern
Insecure service workers continue running in the background and can manipulate cached content.
User Impact
The user returns to a website and sees modified or malicious data, believing it is from the real service.
Underlying Causes
Persistent offline caches
No cryptographic identity for workers
Websites controlling long-lived scripts in browsers
Trust-Native Resolution
Service workers must present their own workload TrustKey, making untrusted background workers impossible.
Broken Trust Assumption
Many of the most damaging breaches of the past decade occurred in environments that were fully authenticated, encrypted, and compliant.
Incidents including SolarWinds, NotPetya, Capital One, and MOVEit show a consistent pattern: attackers succeeded by inheriting trust, not by breaking it. Security controls validated access, but not intent.
