Sample proof run

AI Agent Action Proof Run

This sample shows how another party checks a proof bundle after an AI agent acts. Inspect the action boundary, evidence manifest, receipt, verifier result, challenge path, and digest manifest before packaging a security workflow for your own case.

Offer: AI Agent Action Proof Run
Artifact class: Public sample bundle
Status: Receipt shape and verifier path
Sample commit: 99741c8d50cd

Sample lineage

Sample commit

99741c8d50cd3adbfdc28bc317ac563a1e8dd1ef

Pinned artifact links

All GitHub artifact links on this page use the sample commit, not the mutable main branch.

Manifest anchor

ed4614932f1b96fa9cc082fb481239ac8655bd49596d846db4da5bf5eb6dca14 RECEIPT.json

Boundary

The commit pin and manifest line support replayable sample inspection only; they are not production custody proof.

Manifest provenance

Source repository

witnessops/witnessops-sample-cases

Manifest path

sample-cases/ai-agent-action-proof-run/MANIFEST.sha256

Manifest blob SHA

efa7181d7575e95cb63673442cfe48671a3bb8a8

Manifest text SHA-256

6c43e87534a4e445321c46d9765efa885d3df5aa8eb8110a214653b0f46d7447

Open pinned manifest

Manifest coverage

MANIFEST.sha256 is displayed as the digest-list artifact, but it is not self-listed inside MANIFEST.sha256. README.md is hashed in the pinned manifest, but it is not shown as a page inspection artifact.

Displayed artifacts

ACTION_BOUNDARY.json, AUTHORITY_MAP.json, EVIDENCE_MANIFEST.json, RECEIPT.json, VERIFY_RESULT.json, CHALLENGE_PATH.md, MANIFEST.sha256

Manifest-hashed artifacts

ACTION_BOUNDARY.json, AUTHORITY_MAP.json, CHALLENGE_PATH.md, EVIDENCE_MANIFEST.json, README.md, RECEIPT.json, VERIFY_RESULT.json

Displayed but not manifest-hashed

MANIFEST.sha256

Manifest-hashed but not displayed

README.md

Three-minute buyer walkthrough

Buyer question

Can another party inspect who approved the action, what ran, what evidence survived, and what the verifier checked?

Use this page when

A CISO, AI platform owner, GRC lead, or auditor needs to read the bundle without guessing what each file means.

Proof boundary

The sample demonstrates receipt shape and verifier path. It is not a production deployment, legal compliance claim, or whole-program assurance claim.

Open BUYER_WALKTHROUGH.md

Sample outcome

What this sample shows before you open the artifacts

Action

A sample AI agent performed one bounded code or configuration workflow after human approval.

Verifier result

VERIFY_RESULT.json reports pass_with_sample_limitations for the sample receipt shape, manifest checks, and declared evidence boundaries.

Limits

This sample does not prove production deployment, legal compliance, source-system truth, production signing-key custody, or complete AI governance.

Buyer takeaway

You can inspect how authority, action scope, evidence, receipt, verifier result, challenge path, and manifest fit together before packaging your own security workflow.

Read the buyer walkthrough first if you want the plain-English path. Open the artifacts when you want to inspect the bundle directly.

How to inspect this sample

The manifest is the sample drift check, not a production custody claim.

Workflow

AI agent proposes and performs a bounded code or configuration change after human approval.

Proof question

Can another party inspect who approved the action, what ran, what system it touched, what evidence survived, and what could not be verified?

Buyer path

Use the sample to inspect the proof shape, then submit one bounded agent-assisted workflow for your own package.

Artifact set

Proof-run shape

  • one workflow
  • one action path
  • one receipt
  • one verifier result
  • one challenge path

Boundary

This sample demonstrates the receipt shape and verifier path only. It does not claim production deployment, legal compliance, or complete AI governance coverage.

Ready to test your own workflow?

Use the sample to inspect the proof shape before submitting your own workflow. The request page asks for your name, work email, optional company or team, security workflow, workflow/tool path and touched system, scope and approval boundary, and evidence available.