Skip to content

Launch Claim Audit

Every launch-facing claim should point at a runnable command, test, or committed artifact.

ClaimEvidence
Approval boundaries are compiler-visiblecorvid tour --topic approve-gates
Grounded values carry provenancecorvid tour --topic grounded-values; corvid trace dag <trace>
Replay is deterministiccorvid replay <trace> --source <file>
Project safety surface can be auditedcorvid audit <file>
Environment prerequisites are machine-checkablecorvid doctor
WASM build is shippedcorvid build <file> --target=wasm
Package metadata exposes semantic contractscorvid package metadata <file> --name @scope/name --version 1.0.0
Bundle verification is auditablecorvid bundle verify <bundle> and corvid bundle audit <bundle>
Signed cdylib claims are externally explainablecorvid claim --explain <cdylib> --key <pubkey> --source <file.cor>
Deploy packages include signed build attestationcorvid deploy package <app> --out <dir>
Release channels emit signed artifactscorvid release beta 1.0.0-beta.1 --out <dir>
Upgrade migrations are machine-checkablecorvid upgrade check <app> --json
Claim inventory is machine-auditablecorvid claim audit --json
External beta feedback is completeblocked: requires 20 real external developers and closed feedback issues

Claims that depend on benchmark numbers, external beta feedback, or launch media stay blocked until the corresponding artifact is checked in or published.