Technical Evaluation Guide
Structured evaluation scenarios for technical reviewers assessing the Attested Governance Artifacts architecture. All scenarios can be executed using the open-source reference implementation.
Prerequisites
- Node.js 18+
- The AGA reference implementation github.com/attestedintelligence/AGA
- A terminal
Evaluation Scenarios
Five scenarios covering the full governance lifecycle.
Baseline Execution
Seal a governance artifact for a sample subject. Launch within the portal. Confirm artifact validation succeeds and normal execution produces a clean receipt chain with MEASUREMENT_OK events.
Expected Result
All receipts show compliance. Evidence bundle verifies PASS.
Binary Modification
After sealing, modify the governed executable (change one byte). Attempt to launch.
Expected Result
Initial measurement fails. Execution blocked. Drift receipt generated.
Configuration Drift
Launch with valid artifact. During execution, modify runtime configuration file.
Expected Result
Next measurement cycle detects drift. Enforcement action triggered per policy. Receipt documents deviation.
Receipt Chain Verification
After governed run, modify one receipt in chain (change a single character).
Expected Result
Independent verifier detects chain integrity failure. Returns FAIL.
Offline Bundle Verification
Export evidence bundle. Transfer to separate machine with no network. Run independent verifier.
Expected Result
Artifact signatures verify. Receipt chain validates. Merkle proofs check. Verdict: PASS. No network required.
Run the Tests
Clone, install, and execute the full test suite.
git clone https://github.com/attestedintelligence/AGA.git
cd AGA
npm install
npm testReady to Evaluate
Run the reference implementation, walk through the system architecture, or request a guided technical briefing.