Skip to main content

Proof Artifacts

Proof is maintained as a claim registry linked to source references and artifact records.

Claim Registry

Claims are versioned records with required mechanism, source reference, and artifact linkage.

claim/policy-outside-runtime

Policy enforcement happens in the control plane, not in model output parsing.

Runtime output is treated as untrusted proposal input; capability checks and policy evaluation gate side effects before tool execution.

Status:
partial
Evidence strength:
moderate
Last verified:
2026-03-19
Product version:
0.1.0
Source reference:
product-repo:internal/controlplane/server.go
Artifact references:
approval-binding-evidence

Assumptions

  • Tool execution requests pass through control-plane authorization.

Invalid when

  • Execution path bypasses policy evaluation before side effects.

Breakage signals

  • Tool invocation executes despite deny policy decision.

Challenge questions

  • If runtime output requests write access outside allowed scope, does control-plane policy deny execution before sandbox invocation?

claim/event-attribution-replayability

Execution events are attributable and replayable for incident analysis.

Event envelopes record actor, approval id, policy decision metadata, and run identifiers required for deterministic reconstruction.

Status:
planned
Evidence strength:
illustrative
Last verified:
2026-03-19
Product version:
0.1.0
Source reference:
product-repo:internal/audit/*
Artifact references:
event-replay-lineage

Assumptions

  • Event pipeline writes immutable sequence metadata.

Invalid when

  • Required attribution fields are omitted from event envelopes.

Breakage signals

  • Replay chain cannot resolve actor for an executed action event.

Challenge questions

  • When an event arrives without approval_id under replay conditions, does the event model mark lineage as incomplete instead of asserting full attribution?

claim/approval-argument-binding

Approvals bind to exact normalized action arguments.

Control plane computes a digest of normalized action payload and rejects execution when digest, scope, or expiry does not match approval state.

Status:
partial
Evidence strength:
moderate
Last verified:
2026-03-19
Product version:
0.1.0
Source reference:
product-repo:internal/controlplane/approvals/*
Artifact references:
approval-binding-evidence

Assumptions

  • Action normalization is deterministic for equivalent payloads.
  • Approval checks execute before side effects.

Invalid when

  • Normalized argument digest differs from stored approval digest.
  • Approval is expired, revoked, or scope-mismatched.

Breakage signals

  • Approval accepted when normalized_args_hash differs from approval_args_hash.
  • Execution event missing approval_id for approved action.

Challenge questions

  • If approval scope is narrowed after request creation, does the control plane reject execution under the new scope condition?
  • When normalized arguments change after approval issuance, does the approval validator deny execution before tool invocation?

Artifact Index

event-log

Approval hash binding

Approval records include normalized action hash and are checked at execution time.

Claim supported:
Approvals bind to exact normalized actions rather than broad prompts.
Status:
partial
Last verified:
2026-03-19
Provenance:
synthetic
Traceability:
partial
Artifact origin:
constructed
Product version:
0.1.0
Source of truth:
product-repo:internal/controlplane/approvals/*
Source system:
control-plane
Source path:
internal/controlplane/approvals
Source commit:
redacted
Capture hash:
sha256:example-approval-binding-record

This artifact is synthetic and should be read as illustrative, not as direct production output.

Source references

  • product-repo:internal/controlplane/handler_approvals.go
  • product-repo:internal/controlplane/server.go
Linkable artifact slug: approval-binding-evidence

policy-doc

Replayable event lineage

Event envelopes include run identifiers, actor, approval id, and policy decision metadata.

Claim supported:
Execution events are attributable and replayable for incident review.
Status:
pending
Last verified:
2026-03-19
Provenance:
conceptual
Traceability:
partial
Artifact origin:
constructed
Product version:
0.1.0
Source of truth:
product-repo:internal/audit/*
Source system:
control-plane
Source path:
internal/audit
Source commit:
redacted
Capture hash:
sha256:example-replay-lineage-record

This artifact is conceptual and should be read as illustrative, not as direct production output.

Source references

  • product-repo:internal/audit/event_store.go
  • product-repo:migrations/*audit*
Linkable artifact slug: event-replay-lineage

Verification Records

Records capture concrete examples of system behavior with claim and source linkage.

policy-doc

Replay lineage envelope

Claim ref:
event-attribution-replayability
Status:
planned
Verification:
manual
Verification confidence:
low
Reproducible:
no
Verified at:
2026-03-19
Product version:
0.1.0
Verified by:
platform-engineering
Replay fidelity:
approximate
Source ref:
product-repo:internal/audit/*
Freshness:
unknown

Proof boundaries

Proves: Event envelope schema includes minimum required fields for replay, Field structure supports attribution workflow
Does not prove: All state transitions produce event envelopes, Event emission is complete for all significant transitions, Hash chain integrity can be verified, Production event samples match schema
Assumptions: Event types defined in event_types.go cover all significant transitions, Envelope schema is stable
Failure modes: Transition occurs without corresponding event type, Event recorded after state change rather than at transition point, Hash chain gaps prevent reconstruction

Break this claim

Conditions: State transition occurs without recorded event, Event recorded with incorrect actor attribution, Hash chain contains gaps or inconsistencies
Required evidence: Production trace showing gap in event sequence, Demonstration of state without corresponding event

Artifact refs: event-replay-lineage

View record

policy-doc

Policy gate before side effects

Claim ref:
policy-outside-runtime
Status:
partial
Verification:
manual
Verification confidence:
medium
Reproducible:
yes
Verified at:
2026-03-19
Product version:
0.1.0
Verified by:
controlplane
Replay fidelity:
approximate
Source ref:
product-repo:internal/controlplane/server.go
Freshness:
unknown

Proof boundaries

Proves: Policy evaluation occurs before tool execution in the traced code path, Deny decisions prevent tool execution completion
Does not prove: All code paths enforce policy before execution (only the traced path verified), Offline or degraded mode behavior, Subprocess spawn outside tool boundary enforcement
Assumptions: Trace represents typical production execution flow, No bypass paths exist in untraced code
Failure modes: Bypass path discovered in untraced code, Policy evaluation disabled in offline mode

Break this claim

Conditions: Tool executes after policy evaluation returns denied, Side effect occurs without prior policy evaluation, Offline mode disables policy gate
Required evidence: Policy trace showing denied action executing, Event log showing execution without prior policy decision

Artifact refs: approval-binding-evidence

View record

event-log

Approval argument match event

Claim ref:
approval-argument-binding
Status:
partial
Verification:
manual
Verification confidence:
medium
Reproducible:
yes
Verified at:
2026-03-19
Product version:
0.1.0
Verified by:
security-engineering
Replay fidelity:
approximate
Source ref:
product-repo:internal/controlplane/approvals/*
Freshness:
unknown

Verification command: node scripts/verify-proof.mjs approval-argument-match-event

Output validation: contains (lenient) | hash-match=true

Normalize: trim

Verification artifact: approval-binding-evidence

Verification artifact hash: sha256:example-approval-binding-record

Command type: deterministic

Determinism assumptions: Verification command reads static redacted fixture and does not call external services.

Proof boundaries

Proves: Approval record contains normalized_args_hash field, Hash matching logic exists in approval validation, Event envelope structure includes approval_id and decision
Does not prove: All approval requests use hash binding (only structural proof), Environment state captured in execution_context is complete, Digest computation is deterministic across all serialization paths, Production traffic confirms hash matching behavior
Assumptions: Redacted fixture represents actual production structure, Hash computation is deterministic for included fields
Failure modes: Digest computation misses relevant execution state, Normalization differs between proposal and execution time, Tool behavior differs despite identical normalized arguments

Break this claim

Conditions: Approved action executes with different effect than approved, Arguments normalized differently at proposal vs execution, Execution context differs despite hash match
Required evidence: Production trace showing hash match but unexpected execution, Demonstration of normalization inconsistency

Artifact refs: approval-binding-evidence

View record

Verification Contract

  • No fact claim is published without at least one artifact reference.
  • Artifact records must include source-of-truth pointer and verification status.
  • Planned and partial claims remain visibly labeled.