Workflow 01
Code patch
A fix, pull request, dependency risk, auth boundary, or remediation lane that needs reviewable evidence.
Describe the patch (new tab)Bounded proof packs for technical trust
Bring one workflow, patch, finding, access change, or approval-gated action for review. WitnessOps packages the boundary, available evidence, receipt artifacts, named limits, and inspection path when the scope supports it.
We name the scope, package available evidence references, record what changed, and show what is still outside scope.
If evidence is incomplete, the package says so.
Not ready to submit work? Inspect the public sample first.
How a proof-backed run works
Scope it. Review available evidence. Package only what can be named. Make the limits inspectable.
Pick one action. Name what is in and out.
Separate evidence from assumptions.
Return evidence references, receipt artifacts where produced, limits, and next step.
Make the result easy to inspect, reject, or strengthen.
The output says what changed, what supports it, and what remains unproven or outside scope.
REPRESENTATIVE WORKFLOWS
Start with work you already need to explain or hand off.
Workflow 01
A fix, pull request, dependency risk, auth boundary, or remediation lane that needs reviewable evidence.
Describe the patch (new tab)Workflow 02
A finding, AI-assisted review, tool output, or agent action that needs claim control.
Describe the finding (new tab)Workflow 03
An access decision, incident step, offsec handoff, or workflow where evidence must outlive the run.
Describe the action (new tab)How workflows are run and inspected
Some operational surfaces remain internal, including policy authoring, receipt query, and operator administration.
WHAT IS VERIFIABLE TODAY
The page is not the proof. A scoped package points to the evidence references and limits.
The named action, system, and boundary.
The receipts, manifests, commands, artifacts, or review records referenced by the package.
The limits, assumptions, and decisions still outside the package.
The public sample demonstrates receipt shape and verifier path only. It does not claim production deployment. It is not a legal compliance claim or complete AI governance program.
WHERE TRUST ASSUMPTIONS REMAIN
Proof packs reduce trust assumptions. They do not erase them.
ASSUMPTION
Runtime integrity
The execution environment must be operated correctly. A compromised runtime could produce bad records.
ASSUMPTION
Key management
Receipt signatures depend on key custody, rotation, and revocation discipline.
ASSUMPTION
Schema continuity
Historical verification depends on stable, versioned receipt schemas.
ASSUMPTION
Policy enforcement
Policy gates can record that evaluation happened. They do not prove every policy is perfect.
Trust should be named, bounded, and kept as small as possible.
Bring one workflow, patch, finding, or access change for review. If scope and evidence support it, get a proof pack naming boundary, evidence references, receipt artifacts, limits, and inspection path.