Request Assembly Threat Model (Author-Mapped): Reading the “ChatGPT Request Assembly Architecture” Diagram
Public overview. The full reviewer workflow, checkpoints, and audit-ready artifacts are available in the member version.
Public overview:
This page keeps the high-level framing public.
The full reviewer workflow, control checkpoints, and audit-ready artifact checklist are available in the member version.
Scope & provenance
This page explains an author-mapped reference model.
It is not a vendor-published internal architecture diagram.
It should be treated as a review map for security analysis.
Why this model exists
This model is a reviewer-oriented scaffold for assessing end-to-end request handling beyond the inference step. It focuses on where a system:
- selects and merges context,
- binds authorization to the request,
- routes tools and connectors,
- records telemetry and logs,
- persists state across time.
What the member version includes
- The full request path walkthrough
- The full R1–R8 checkpoint model
- A reviewer workflow
- Artifacts to request during review
- A minimal reviewer checklist