Overview
This section covers the primary analysis surface that turns a staged input bundle into a run-scoped risk artifact, report package, thresholds, provenance records, and reproducibility materials.
What the example output demonstrates
The example_output/ bundle shows the major artifact families produced by the computational safety diligence pipeline:
run_manifest.jsonfor run identity and execution metadataplans/for plan resolution and tier complianceraw/for module-native outputsresults/for the report-oriented and decision-oriented outputsthresholds/for category-aware scoring and measurement policyinputs/for input hashingseal/for sealing staterepro_pack/for rebuild and verification materials
This section explains how to read those outputs as one coherent system rather than as an unrelated file dump.
What you can do here
- How a run is configured and categorized
- How outputs are grouped and interpreted
- How evidence state, failure modes, and risk channels are represented
- How plan resolution and missing-proof handling affect claim strength
- How reproducibility and verification artifacts fit into the final package
Related sections
- Use PreFlight UI for input validation and submission readiness.
- Use Deployment and Operations for packaging, deployment, and runtime administration.
- Use Modules for optional extension workflows.