Auditability
Auditability in the current deployment model comes from preserving a stable run identity, recording the lifecycle metadata, and bundling verification artifacts with the output package.
Core audit artifacts
The minimum audit set should include:
run_manifest.jsonpreseal.jsonseal/seal.jsonseal/seal.sigseal/seal.svg
These files give a reviewer both the operational record and the verification record for the run.
What a reviewer should confirm
At minimum, an auditor should be able to answer:
- Which
run_idproduced this output package - Which project and run mode were used
- Which image or execution package ran
- Whether Marketplace usage emission matched the run mode
- Whether the seal can be verified independently
Billing and audit linkage
The current customer validation evidence shows that usage reporting is intended to be:
- Completion-only
- One metric per run
- Idempotent for an already reported
run_id
That is part of the audit story, not just a billing concern, because it ties reported consumption back to a specific run identity.
Recommended review workflow
- Open
run_manifest.json - Confirm the effective
run_id, run mode, and any reporting metadata - Review the human-facing report package
- Verify
seal.svg - Preserve the manifest and seal bundle with any exported run folder
What auditability does not replace
Audit artifacts help confirm what ran and how the output bundle was linked to that run. They do not replace scientific review, legal review, or entitlement administration.