Documentation Index
Fetch the complete documentation index at: https://verdictweight.dev/llms.txt
Use this file to discover all available pages before exploring further.
Why verify
VERDICT WEIGHT is intended for environments where the integrity of the decision-scoring layer itself is part of the threat model. A compromised build of the framework would silently undermine every downstream guarantee. Verification is therefore a first-class operational step, not an optional one.Three independent integrity sources
VERDICT WEIGHT is published in three independent locations:| Source | Purpose |
|---|---|
| PyPI | Standard distribution channel for end users. |
GitHub Odingard/verdict-weight | Source of truth for code, history, and signed tags. |
| Zenodo (DOI: 10.5281/zenodo.19447547) | Immutable archival snapshot for academic citation and audit. |
Cross-source hash check
Runtime self-check
After install, the package can verify its own structural integrity:False value on is_healthy should be treated as a deployment-blocking event.
Reproducible test run
The test suite is deterministic and should produce identical results on any machine running a verified build:673 passed in [time]. Any deviation — failed tests, missing tests, additional tests — warrants investigation before the build is promoted.
Provenance for regulated environments
For audit-bound deployments, the recommended provenance bundle consists of:- The exact PyPI version string (
verdict-weight==X.Y.Z). - The matching Git tag and commit SHA from
Odingard/verdict-weight. - The Zenodo archive DOI for that release.
- A locally-recorded
self_check()report at install time. - A locally-recorded
pytestlog showing 673/673 passing.