Documentation Index
Fetch the complete documentation index at: https://verdictweight.dev/llms.txt
Use this file to discover all available pages before exploring further.
What gets logged
Every scoring event — includingscore, abstain, and abort outcomes — is recorded in the audit chain. The recorded payload includes:
- The framework version and registry hash at scoring time.
- The canonicalized evidence payload.
- The per-stream contributions (confidence, weight, abstention indicator).
- The composed and calibrated confidence values.
- The outcome and any reason string.
- A timestamp and the previous record’s hash.
Configuring the audit log
| Setting | Purpose |
|---|---|
log_path | Where the chain is persisted. Should be on durable, append-friendly storage. |
signing_key_id | Identifier for the operator-controlled signing key. Recorded in checkpoint records. |
signing_key_path | Path to the signing key file. Optional but strongly recommended. |
checkpoint_every | How often to cut a new chain rooted in a signed checkpoint of the prior one. |
Verifying the chain
chain.verify() returns False if any record’s hash does not match its successor’s predecessor hash, or if any signed checkpoint fails signature verification. A False return triggers the kill switch on the next scoring call against this chain.
Checkpoint rotation
For long-running deployments, the audit chain is checkpointed periodically:- The current chain head is signed with the operator’s key.
- A new chain is started, with its first record containing the signed checkpoint.
- The previous chain is closed for further appends but remains available for verification.
Storage recommendations
| Deployment type | Recommended storage |
|---|---|
| Defense / classified | Air-gapped, write-once media; rotated to long-term archive. |
| Regulated industry | Replicated append-only filesystem with documented retention. |
| Internal tooling | Standard durable storage; daily backup. |
| Research | Local filesystem; reproducibility takes priority over durability. |
Recovery procedures
If the active chain becomes corrupted (storage failure, partial write, accidental modification), recovery follows a documented procedure:Investigate
Determine whether the corruption was due to operational error or to active tampering. The two cases warrant different responses.
Re-anchor
Start a new chain rooted in a signed checkpoint that explicitly references the corrupted chain’s last known good state.
Privacy considerations
The audit chain records the canonicalized evidence payload. If that payload contains personal or sensitive data, the chain inherits the same sensitivity. Operators have two options:- Pre-redact sensitive fields before passing them to the scorer.
- Use the field-hashing mode, which records salted hashes of designated fields rather than their plaintext values. This preserves audit reproducibility (a future record can be matched to its original evidence) while keeping plaintext out of the log.