Proof Artifacts
Proof is maintained as a claim registry linked to source references and artifact records.
Claim Registry
Claims are versioned records with required mechanism, source reference, and artifact linkage.
claim/policy-outside-runtime
Policy enforcement happens in the control plane, not in model output parsing.
Runtime output is treated as untrusted proposal input; capability checks and policy evaluation gate side effects before tool execution.
- Status:
- partial
- Evidence strength:
- moderate
- Last verified:
- 2026-03-19
- Product version:
- 0.1.0
- Source reference:
- product-repo:internal/controlplane/server.go
- Artifact references:
- approval-binding-evidence
Assumptions
- Tool execution requests pass through control-plane authorization.
Invalid when
- Execution path bypasses policy evaluation before side effects.
Breakage signals
- Tool invocation executes despite deny policy decision.
Challenge questions
- If runtime output requests write access outside allowed scope, does control-plane policy deny execution before sandbox invocation?
claim/event-attribution-replayability
Execution events are attributable and replayable for incident analysis.
Event envelopes record actor, approval id, policy decision metadata, and run identifiers required for deterministic reconstruction.
- Status:
- planned
- Evidence strength:
- illustrative
- Last verified:
- 2026-03-19
- Product version:
- 0.1.0
- Source reference:
- product-repo:internal/audit/*
- Artifact references:
- event-replay-lineage
Assumptions
- Event pipeline writes immutable sequence metadata.
Invalid when
- Required attribution fields are omitted from event envelopes.
Breakage signals
- Replay chain cannot resolve actor for an executed action event.
Challenge questions
- When an event arrives without approval_id under replay conditions, does the event model mark lineage as incomplete instead of asserting full attribution?
claim/approval-argument-binding
Approvals bind to exact normalized action arguments.
Control plane computes a digest of normalized action payload and rejects execution when digest, scope, or expiry does not match approval state.
- Status:
- partial
- Evidence strength:
- moderate
- Last verified:
- 2026-03-19
- Product version:
- 0.1.0
- Source reference:
- product-repo:internal/controlplane/approvals/*
- Artifact references:
- approval-binding-evidence
Assumptions
- Action normalization is deterministic for equivalent payloads.
- Approval checks execute before side effects.
Invalid when
- Normalized argument digest differs from stored approval digest.
- Approval is expired, revoked, or scope-mismatched.
Breakage signals
- Approval accepted when normalized_args_hash differs from approval_args_hash.
- Execution event missing approval_id for approved action.
Challenge questions
- If approval scope is narrowed after request creation, does the control plane reject execution under the new scope condition?
- When normalized arguments change after approval issuance, does the approval validator deny execution before tool invocation?
Artifact Index
event-log
Approval hash binding
Approval records include normalized action hash and are checked at execution time.
- Claim supported:
- Approvals bind to exact normalized actions rather than broad prompts.
- Status:
- partial
- Last verified:
- 2026-03-19
- Provenance:
- synthetic
- Traceability:
- partial
- Artifact origin:
- constructed
- Product version:
- 0.1.0
- Source of truth:
- product-repo:internal/controlplane/approvals/*
- Source system:
- control-plane
- Source path:
- internal/controlplane/approvals
- Source commit:
- redacted
- Capture hash:
- sha256:example-approval-binding-record
This artifact is synthetic and should be read as illustrative, not as direct production output.
Source references
- product-repo:internal/controlplane/handler_approvals.go
- product-repo:internal/controlplane/server.go
policy-doc
Replayable event lineage
Event envelopes include run identifiers, actor, approval id, and policy decision metadata.
- Claim supported:
- Execution events are attributable and replayable for incident review.
- Status:
- pending
- Last verified:
- 2026-03-19
- Provenance:
- conceptual
- Traceability:
- partial
- Artifact origin:
- constructed
- Product version:
- 0.1.0
- Source of truth:
- product-repo:internal/audit/*
- Source system:
- control-plane
- Source path:
- internal/audit
- Source commit:
- redacted
- Capture hash:
- sha256:example-replay-lineage-record
This artifact is conceptual and should be read as illustrative, not as direct production output.
Source references
- product-repo:internal/audit/event_store.go
- product-repo:migrations/*audit*
Verification Records
Records capture concrete examples of system behavior with claim and source linkage.
policy-doc
Replay lineage envelope
- Claim ref:
- event-attribution-replayability
- Status:
- planned
- Verification:
- manual
- Verification confidence:
- low
- Reproducible:
- no
- Verified at:
- 2026-03-19
- Product version:
- 0.1.0
- Verified by:
- platform-engineering
- Replay fidelity:
- approximate
- Source ref:
- product-repo:internal/audit/*
- Freshness:
- unknown
Proof boundaries
Break this claim
Artifact refs: event-replay-lineage
View recordpolicy-doc
Policy gate before side effects
- Claim ref:
- policy-outside-runtime
- Status:
- partial
- Verification:
- manual
- Verification confidence:
- medium
- Reproducible:
- yes
- Verified at:
- 2026-03-19
- Product version:
- 0.1.0
- Verified by:
- controlplane
- Replay fidelity:
- approximate
- Source ref:
- product-repo:internal/controlplane/server.go
- Freshness:
- unknown
Proof boundaries
Break this claim
Artifact refs: approval-binding-evidence
View recordevent-log
Approval argument match event
- Claim ref:
- approval-argument-binding
- Status:
- partial
- Verification:
- manual
- Verification confidence:
- medium
- Reproducible:
- yes
- Verified at:
- 2026-03-19
- Product version:
- 0.1.0
- Verified by:
- security-engineering
- Replay fidelity:
- approximate
- Source ref:
- product-repo:internal/controlplane/approvals/*
- Freshness:
- unknown
Verification command: node scripts/verify-proof.mjs approval-argument-match-event
Output validation: contains (lenient) | hash-match=true
Normalize: trim
Verification artifact: approval-binding-evidence
Verification artifact hash: sha256:example-approval-binding-record
Command type: deterministic
Determinism assumptions: Verification command reads static redacted fixture and does not call external services.
Proof boundaries
Break this claim
Artifact refs: approval-binding-evidence
View recordVerification Contract
- No fact claim is published without at least one artifact reference.
- Artifact records must include source-of-truth pointer and verification status.
- Planned and partial claims remain visibly labeled.