Tamper-Evident Verification

Make it hard to cheat without pretending to be a blockchain.

The goal is not tokenized infrastructure or global consensus. The goal is to make the path from evidence to certificate signed, append-only, replayable, and independently inspectable so shortcuts become noisy and expensive.

Signed facts Append-only logs Witness reruns
Trust Surface

What the product should always disclose

  • Which controls were actually proved from inspectable system state.
  • Which controls were satisfied by signed attestations and who signed them.
  • Which controls remain judgment-dependent and therefore require human review.
  • Which assumptions, exclusions, or unresolved axioms still remain in the artifact set.
Shortcut-Proof

What that means here

Shortcut-proof does not mean impossible to attack. It means a vendor should not be able to leap from mutable internal state to a polished certificate while skipping the public, checkable intermediate trail.

The verification chain should be legible enough that missing steps break issuance instead of being smoothed over by prose.

The anti-shortcut design

1
Canonicalize before signing

Evidence claims, proof bundles, certificates, and revocations get canonical serialization before hashing or signing so identity is sharper than presentation.

2
Separate signer roles

Producers sign facts. Reviewers sign attestations. The verifier signs conclusions. Witnesses sign replay receipts. The current public pack now includes synthetic Ed25519 signature manifests so this is an executable example, not just a future design note.

3
Append-only transparency

Artifact digests go into a transparency ledger. Replacements require new append entries. Silent mutation should be structurally invalid.

4
Independent witness reruns

Published proof bundles can be replayed in clean environments. Witness receipts only exist on exact digest matches under the expected verifier version, and the bundle itself should say which proved claims really entered the public proof batch versus which were still outside that boundary.

5
Fail closed

No proof bundle, no certificate. No logged attestation digest, no certificate. Expired signer authority, no certificate. Missing steps are hard stops.

6
Revocation stays public

When drift breaks an issued result, the revocation is an artifact too. Certificates are revocable state, not static PDFs that quietly age in place.

Agentic AI data-protection boundary

Purpose And Basis

Agents should not inherit infinite permission

If an agent can initiate new work, the artifact set should say what purpose it is acting for, what lawful-basis context applies, and what kinds of scope expansion force a new review instead of quiet continuation.

Rights And Override

Human intervention must stay real

Meaningful human oversight means more than a policy statement. The trust surface should show approval, override, escalation, and blocked-action records wherever an agent could materially affect an individual.

Reconstruction

Explainability needs replayable traces

For agentic systems, explainability is partly an artifact problem. The useful question is whether the system can reconstruct what it saw, what it called, what it inferred, and which policy gate it crossed.

Retention And Supply Chain

Memory, vendors, and transfers need visible boundaries

Retention of prompts, agent memory, tool outputs, and inferred data needs explicit limits. So do controller, processor, recipient, and transfer boundaries when the agent crosses model vendors or external tools.

Why Not Blockchain

The trust problem here is not scarce digital assets or distributed consensus. It is auditability, mutation resistance, and reproducibility. Supply-chain security patterns fit better: signatures, transparency logs, provenance, reproducible environments, and public witnesses.

Current Public Signing Pack

The public examples now ship transparency logs and inclusion proofs for every ExampleCo corridor, plus a synthetic Ed25519 public key and signed-artifact manifests for the issued corridor and the lifecycle pack. That makes the canonical-digest story independently checkable even before a real release identity exists.

One trust chain

signed evidence claim
  -> canonical digest
  -> transparency entry
  -> proof bundle digest
  -> verification verdict
  -> certificate digest
  -> witness replay receipt
  -> drift detection
  -> revocation entry if state changes

Limitations stay first-class

OpenCompliance should be useful because it states its limits clearly, not because it pretends those limits are gone.