Skip to main content
Evaluation Guide

Technical Evaluation Guide

Structured evaluation scenarios for technical reviewers assessing the Attested Governance Artifacts architecture. All scenarios can be executed using the open-source reference implementation.

Prerequisites

Evaluation Scenarios

Five scenarios covering the full governance lifecycle.

Scenario 01

Baseline Execution

Seal a governance artifact for a sample subject. Launch within the portal. Confirm artifact validation succeeds and normal execution produces a clean receipt chain with MEASUREMENT_OK events.

Expected Result

All receipts show compliance. Evidence bundle verifies PASS.

Scenario 02

Binary Modification

After sealing, modify the governed executable (change one byte). Attempt to launch.

Expected Result

Initial measurement fails. Execution blocked. Drift receipt generated.

Scenario 03

Configuration Drift

Launch with valid artifact. During execution, modify runtime configuration file.

Expected Result

Next measurement cycle detects drift. Enforcement action triggered per policy. Receipt documents deviation.

Scenario 04

Receipt Chain Verification

After governed run, modify one receipt in chain (change a single character).

Expected Result

Independent verifier detects chain integrity failure. Returns FAIL.

Scenario 05

Offline Bundle Verification

Export evidence bundle. Transfer to separate machine with no network. Run independent verifier.

Expected Result

Artifact signatures verify. Receipt chain validates. Merkle proofs check. Verdict: PASS. No network required.

Run the Tests

Clone, install, and execute the full test suite.

terminal
git clone https://github.com/attestedintelligence/AGA.git
cd AGA
npm install
npm test

Ready to Evaluate

Run the reference implementation, walk through the system architecture, or request a guided technical briefing.