Documentation Index
Fetch the complete documentation index at: https://verdictweight.dev/llms.txt
Use this file to discover all available pages before exploring further.
The compliance problem
Every regulated deployment of AI eventually faces the same set of questions:- Why did the system make this decision?
- What evidence supported it?
- What was the system’s confidence and what did that confidence mean?
- Can you reproduce this decision from the recorded inputs?
- Can you prove the record has not been altered?
What the audit chain records
Every scoring event — including outcomes that abstain or abort — is recorded in the cryptographic audit chain. The recorded payload includes:| Field | Purpose |
|---|---|
| Framework version and registry hash | Reproduces the exact configuration in effect at scoring time. |
| Canonicalized evidence payload | Reproduces the inputs to the scoring call. |
| Per-stream contributions | Reproduces the intermediate signals each stream produced. |
| Composed and calibrated confidence | Reproduces the final reported confidence. |
Outcome (score, abstain, abort) and reason | Documents what the framework decided to do and why. |
| Timestamp | Establishes ordering for after-action review. |
| Predecessor hash | Establishes the chain integrity property. |
What integrity means here
Integrity in VERDICT WEIGHT is not a process; it is a property of the data structure. The hash chain (Stream 7) makes any modification to any past record detectable on the next verification pass. There is no procedural step the operator can forget that would silently undermine the integrity guarantee. This matters for two compliance scenarios in particular:- Regulatory inspection. An external auditor verifies the chain end-to-end. A pass is evidence that no records have been altered; a fail is evidence that the chain has been tampered with or has experienced operational corruption (which is itself a finding).
- Legal discovery. A signed, hash-chained log is more defensible in legal proceedings than a flat log file or a database row. The chain provides cryptographic evidence that the record is what it claims to be.
Mapping to common compliance frameworks
The framework does not certify against any specific regulatory regime — certifications are applied to deployments, not to building blocks — but the audit primitive is designed to support the controls common to most frameworks:| Compliance requirement | How the framework supports it |
|---|---|
| Reproducibility of automated decisions | Canonicalized evidence record + deterministic scoring |
| Tamper-evident logging | Hash chain (Stream 7) |
| Operator authorization for sensitive actions | Registry kill switch + explicit lower commands (Stream 8) |
| Evidence of model-decision review | Stream contributions recorded; per-stream review possible |
| Right to explanation | Decomposed evidence trail surfaced in stream_breakdown |
| Long-term record retention | Append-only chain with checkpoint rotation |
After-action review
The audit chain enables a class of after-action review that is not possible without it:Pull the audit ID for the decision in question
Every scoring event returns an
audit_id to the caller. Production logs should retain this ID alongside the action that was taken.Replay the scoring call
Pass the recorded evidence and configuration to a fresh scorer. Verify that the result matches the recorded outcome.
Inspect the per-stream breakdown
Determine which streams agreed, which disagreed, which abstained. The breakdown answers “why did the system reach this confidence” in operational terms.
Operator responsibilities
The framework provides the audit substrate; the operator provides the operational discipline. Specifically:- Key custody. Audit-chain signing keys are operator-controlled. The framework verifies signatures; it does not protect keys at rest.
- Storage durability. The chain is only as durable as the storage it lives on. The framework writes records; the operator ensures the records survive.
- Retention policy. The framework supports indefinite retention but does not enforce it. Retention is a deployment-policy choice.
- Privacy controls. The framework supports field hashing for sensitive fields but does not classify data automatically. Operators decide which fields warrant hashing.
What to point an auditor at
If a regulatory or internal auditor asks for evidence of the framework’s audit capability, the canonical references are:- This page, summarizing the operational properties.
- Stream 7: hash-chain integrity for the cryptographic detail.
- Audit logging for the configuration surface and operational procedures.
- The published source code on GitHub for the implementation.
- The Zenodo archive (DOI: 10.5281/zenodo.19447547) for the immutable, citable snapshot of the framework as deployed.