Technical Walkthrough
The architecture is a narrow verification pipeline.
OSCAL packages and typed evidence claims enter through deterministic ingestion. The classifier decides what may be proved, what must be attested, and what remains a human question. Lean 4 produces proof artifacts, not marketing prose.
10
core components in the current architecture slice
3
epistemic routes: proof, attestation, judgment
1
deterministic Verify surface for the user
0
room for hidden narrative overrides after the kernel
1
Control Spec Library
Versioned Lean 4 modules encode the in-scope control corridor together with proof boundaries and source mappings.
2
OSCAL Bridge
Normalizes catalogs, profiles, mappings, and assessment-result style packages into the internal representation while rejecting unresolved references.
3
Evidence Claim Registry
Stores typed claims with actor identity, actor type, scope, timestamp, source system, signature state, and control mappings.
4
Control Classifier
Routes controls into proof, attestation, or judgment queues. It is the anti-magic layer that prevents ambiguous obligations from being mislabeled as machine-proven.
5
Proof Kernel Runner
Executes Lean proof batches, extracts unresolved axioms, and emits the trust-surface artifact for the verification session.
6
Verification Session
Presents one Verify API that returns either a deterministic certificate or a typed punch-list. No prose layer is allowed to overrule the kernel verdict.
7
Transparency Ledger
Appends canonical digests for evidence claims, proof bundles, certificates, witness receipts, and revocations so later mutation is publicly detectable.
8
Reproducible Witness Verifier
Reruns published bundles under pinned environments and only issues a witness receipt when the resulting digests match exactly.
9
Certificate Lifecycle Manager
Tracks drift, revokes stale certificates, and composes child certificates into larger trust artifacts when scope boundaries allow it.
10
Public Docs and Artifact Publishing
Explains the system honestly, exposes limitations, and exports allow-listed public bundles for docs, open specs, and example fixtures.
Plain-English Example
A single verification run
A company requests verification for a scoped profile. OpenCompliance ingests the relevant OSCAL profile, imports typed evidence from systems and attestations, classifies the resulting obligations, sends only the decidable corridor to Lean, then packages the result into a certificate or punch-list with a trust-surface report.
From there, the output can be signed, logged, replayed by witnesses, and revoked later if drift is detected.
LLM Boundary
Where language models are allowed
LLMs may help with bounded normalization of messy attachments into candidate claims. They do not get to decide verdicts, proof status, or publication safety. Any LLM-assisted step still terminates in deterministic schema checks and rule validation.