Documentation Index
Fetch the complete documentation index at: https://verdictweight.dev/llms.txt
Use this file to discover all available pages before exploring further.
Purpose
Every confidence score VERDICT WEIGHT produces is a decision about how much trust to place in an AI system’s output. In any deployment serious enough to need a confidence layer, those decisions themselves must be reviewable, reproducible, and tamper-evident. Stream 7 — CPS (Cryptographic Provenance Stream) — provides that property by construction. Every scoring event is hashed, chained to its predecessor, and signed. The audit log is structurally identical to a single-writer blockchain ledger: any modification to a historical record invalidates every record after it.What the stream does
Hash the scoring event
Each event — the input evidence, the per-stream contributions, the composed confidence, the timestamp — is canonicalized and hashed with a cryptographic hash function.
Chain the hash to the predecessor
The new record’s hash includes the predecessor record’s hash. This produces the chain property: tampering with any past record invalidates the chain from that point forward.
Sign the chain head
The current chain head can be signed with an operator-controlled key, anchoring the chain to an external trust root. Signing is optional but recommended for audit-bound deployments.
Verify on every load
When the audit log is loaded for review or for continuation, the entire chain is verified end-to-end. A verification failure raises the registry kill switch (Stream 8) on the next scoring call.
The blockchain analogy
The CPS chain is, in structure, a single-writer blockchain ledger. The same primitive that makes Bitcoin’s transaction history tamper-evident makes a VERDICT WEIGHT audit log tamper-evident: a Merkle-style hash chain where every record’s identity depends on every record before it. What Stream 7 does not do, and what distinguishes it from a blockchain in the popular sense:- There is no consensus protocol. The chain is single-writer. There is exactly one operator producing scoring events; no Byzantine agreement is required.
- There is no proof-of-work. The integrity property comes from cryptographic hashing, not from computational expense.
- There is no token or distributed ledger. The chain is local to the deployment; it can be replicated for backup, but is not a peer-to-peer object.
Operational properties
| Property | How it is achieved |
|---|---|
| Tamper evidence | Hash chain over canonicalized events. |
| Reproducibility | Canonical serialization; deterministic streams. |
| Sign-and-anchor | Optional operator signing of the chain head. |
| Long-horizon storage | Append-only log; no rewriting required. |
| Verification cost | Linear in chain length. Can be parallelized for offline audit. |
When verification fails
Verification failure is not a soft warning. The framework treats it as evidence that the scoring layer itself has been compromised — which is the threat model the chain exists to detect. On verification failure:- The audit chain reports the first invalid record and the affected range.
- The next call to the scorer raises Stream 8’s registry kill switch.
- The framework refuses to produce further scores until an operator-driven recovery procedure is run.