Reference material for evaluation and verification.
Public resources show structure and boundaries. Controlled documents are available to qualified reviewers under appropriate confidentiality terms.
Library
Documents commonly requested during evaluation and institutional review.
Framing, boundaries, governance posture, roadmap state, and disclosure model.
Mechanics chain, canonicalization, sealing, disclosure tiers, verification procedure.
Integration patterns, chain-of-custody workflow posture, review board orientation.
What CEYO is and is not, non-interference affirmations, operator responsibility boundaries.
Build-ready requirements for Stages 1–3: intercept, canonicalize, seal, fail-open.
Canonicalize, recompute hash, validate signature, confirm policy alignment. PASS/FAIL states.
Inclusion/exclusion rules, masking behavior, disclosure tiers, and policy versioning.
Human rights and lawful use boundaries, operator obligations, prohibited deployments.
Reporting channel, safe harbor, scope, and coordinated disclosure expectations.
Public site collection, contact submissions, and boundary statements for deployment posture.
Informational purpose, IP, disclaimers, limitation of liability, governing law.
Public examples showing artifact structure and verification outcomes (PASS/FAIL).
Common questions from non-technical and institutional reviewers.
Sample artifacts & verification reports
Public examples with redacted fields.
Public artifact sample
Artifact
Disclosure tier: public
{
"artifact_id": "a1b2c3d4e5f6g7h8i9j0",
"timestamp": "2026-03-08T14:30:00Z",
"policy_id": "p_pub_v1",
"policy_version": "1.2",
"disclosure_tier": "public",
"input_hash": "<REDACTED>",
"output": {
"decision": "Approve",
"confidence": 0.95,
"factors": ["<REDACTED>", "<REDACTED>", "<REDACTED>"]
},
"model_id": "<REDACTED>",
"model_version": "<REDACTED>",
"environment": "<REDACTED>",
"hashing_algorithm": "SHA-256",
"signature_algorithm": "ECDSA",
"signature": "<REDACTED>"
}
Verification report (PASS)
Verify
Overall: PASS
{
"artifact_id": "a1b2c3d4e5f6g7h8i9j0",
"verification_timestamp": "2026-03-08T15:00:00Z",
"policy_id": "p_pub_v1",
"policy_version": "1.2",
"disclosure_tier": "public",
"hashing_algorithm": "SHA-256",
"signature_algorithm": "ECDSA",
"verification_steps": [
{ "step": "Canonicalization", "standard": "RFC 8785", "result": "PASS" },
{ "step": "Hash Recomputation", "computed_hash": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "result": "PASS" },
{ "step": "Signature Verification", "result": "PASS" },
{ "step": "Policy Alignment", "result": "PASS" }
],
"overall_result": "PASS - Artifact integrity confirmed"
}
Verification report (FAIL)
Verify
Overall: FAIL
{
"artifact_id": "z9y8x7w6v5u4t3s2r1q0",
"verification_timestamp": "2026-03-08T16:30:00Z",
"policy_id": "p_pub_v1",
"policy_version": "1.2",
"disclosure_tier": "public",
"hashing_algorithm": "SHA-256",
"signature_algorithm": "ECDSA",
"verification_steps": [
{ "step": "Canonicalization", "standard": "RFC 8785", "result": "PASS" },
{ "step": "Hash Recomputation", "computed_hash": "f6e0b1e2d3c4a5b6c7d8e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0", "result": "FAIL - Hash mismatch" },
{ "step": "Signature Verification", "result": "NOT ATTEMPTED" },
{ "step": "Policy Alignment", "result": "NOT ATTEMPTED" }
],
"overall_result": "FAIL - Artifact integrity compromised"
}
Glossary
Key terms used throughout CEYO.
A structured record generated at inference time under policy scope, intended for later verification.
Explicit inclusion/exclusion/masking rules defined before artifact generation.
Deterministic serialization (RFC 8785) so equivalent structures yield identical bytes for hashing.
Hashing and signatures applied to canonical bytes to enable tamper detection and provenance checks.
FAQ
Common questions for evaluators, operators, and institutional reviewers.