Evidence Taxonomy
AGILAB evidence should be easy to inspect without rerunning the workflow. This taxonomy defines the first shared vocabulary for run manifests, proof bundles, notebook exports, UI robot evidence, MLflow handoff records, and release proof.
Common Event Envelope
Evidence events should use a small common envelope when they are serialized into JSON evidence bundles:
Field |
Meaning |
|---|---|
|
Version of the evidence event schema. |
|
One of the event names listed below. |
|
AGILAB run, proof, robot, release, or agent-run identifier. |
|
Monotonic sequence number within the evidence bundle. |
|
UTC timestamp recorded by the producing tool. |
|
SHA-256 of the referenced artifact when the event has one. |
|
Optional previous event hash for future tamper-evident chains. |
|
Optional hash of the canonicalized event envelope and payload. |
|
Event-specific metadata. It must not contain secrets or large raw artifacts. |
Event Types
Event type |
Purpose |
|---|---|
|
Records the top-level run manifest, selected app, environment, and command boundary. |
|
Records a workflow, DAG, or pipeline stage state transition. |
|
Records a produced file, directory manifest, or content hash. |
|
Records an exported notebook or notebook export manifest. |
|
Records an MLflow tracking or registry handoff when that integration is enabled. |
|
Records screenshots, traces, HAR, video, aggregate JSON, and replay commands from UI robot validation. |
|
Records a coding-agent or assistant-backed command through the AGILAB agent-run evidence surface. |
|
Records a deterministic policy or promotion gate decision. |
|
Records release tag, package, docs, CI, coverage, SBOM, audit, or provenance evidence used in release proof. |
Redaction Rules
Evidence payloads must not store secrets, raw prompts that contain credentials, full notebook outputs with sensitive data, or large artifact bodies. Prefer:
content hashes over raw content
stable reason codes over free text when a code is enough
local file references over embedded blobs
explicit
redactedmarkers when a field was intentionally removed
Verifier Scope
A verifier consumes this taxonomy to check evidence without rerunning work. It may validate:
schema versions
required event fields
monotonic sequence numbers
artifact hash matches
reference closure
release-proof metadata consistency
It must not validate facts outside the evidence bundle, such as legal compliance, model correctness, production suitability, or whether an external auditor accepts the evidence.
Roadmap Boundary
Optional prev_event_hash and event_hash fields make room for a future
tamper-evident chain. Until that verifier is shipped and referenced from the
release proof, public wording must stay at “hash-backed evidence” or
“designed toward tamper-evident chains”, not “tamper-proof”.