Post-PR-#11 polish: demo UI, staffer console, face pool, icons, contractor profile (24 commits) #12

Merged
profit merged 44 commits from demo/post-pr11-polish-2026-04-28 into main 2026-05-03 05:16:17 +00:00
Owner

Bundle of 24 demo + staffing + ops commits that piled onto scrum/auto-apply-19814 after PR #11 was merged into main but never got a fresh PR. Cherry-picked here so the auditor can review what's been live on devop.live/lakehouse/ for the past day.

Themes

Demo UI (devop.live/lakehouse)

  • Section ① Live Market explainer rewritten data-source-first; honest scoping (this row is the heartbeat, not the puppet master)
  • Section ② contract cards now compact-by-default with click-to-expand summary strip + auto-open Project Index on expand
  • Fill-probability bar gets viewport-triggered paint reveal (clip-path) + shimmer for live-signal feel
  • Skeleton loaders, card-in stagger, hero takeover, B&W avatars to soften SDXL color cast
  • Profiler: Construction Activity Signal Engine narrative + scrolling ticker basket + click-to-filter, contractor heat map + project index

Synthetic faces / icons

  • 1000-headshot StyleGAN pool, ComfyUI hot-swap, surname → ethnicity routing
  • Role-aware portrait pipeline (role_scenes.ts) + icon recipe pipeline (icon_recipes.ts) — single source of truth for hot-path render + offline pre-render
  • ComfyUI portrait support: negative-prompt / cfg / sampler / scheduler overrides (workflow had human, person, face baked in)
  • Face pool fetch preserves prior gender/race/age tags; atomic manifest write; --shrink gate prevents silent shrinks

Ops / staffer console

  • tif_polygons.ts orphan committed (was imported but never tracked)
  • Staffer-language routes (zip / headcount / name / late-triage / ingest log)
  • Per-staffer hot-swap index (synthetic coordinator personas)
  • Search filter actually filters by state + role
  • Iterate.rs unused-state cleanup, catalog cleanup

Test plan

  • Live page at devop.live/lakehouse/ renders cleanly
  • Section ② cards collapse, hover-lift, click-expand smoothly
  • Fill-probability bars paint on scroll (not on initial render)
  • Project Index auto-opens when card expands and fetches OSHA
  • Face pool loads (1000 thumbs from data/headshots/)
  • Surname-routed face buckets pick the right ethnicity
  • Auditor cycles within 90s and emits kimi_architect verdict

🤖 Generated with Claude Code

Bundle of 24 demo + staffing + ops commits that piled onto `scrum/auto-apply-19814` after PR #11 was merged into main but never got a fresh PR. Cherry-picked here so the auditor can review what's been live on `devop.live/lakehouse/` for the past day. ## Themes **Demo UI (devop.live/lakehouse)** - Section ① Live Market explainer rewritten data-source-first; honest scoping (this row is the heartbeat, not the puppet master) - Section ② contract cards now compact-by-default with click-to-expand summary strip + auto-open Project Index on expand - Fill-probability bar gets viewport-triggered paint reveal (clip-path) + shimmer for live-signal feel - Skeleton loaders, card-in stagger, hero takeover, B&W avatars to soften SDXL color cast - Profiler: Construction Activity Signal Engine narrative + scrolling ticker basket + click-to-filter, contractor heat map + project index **Synthetic faces / icons** - 1000-headshot StyleGAN pool, ComfyUI hot-swap, surname → ethnicity routing - Role-aware portrait pipeline (`role_scenes.ts`) + icon recipe pipeline (`icon_recipes.ts`) — single source of truth for hot-path render + offline pre-render - ComfyUI portrait support: negative-prompt / cfg / sampler / scheduler overrides (workflow had `human, person, face` baked in) - Face pool fetch preserves prior gender/race/age tags; atomic manifest write; `--shrink` gate prevents silent shrinks **Ops / staffer console** - `tif_polygons.ts` orphan committed (was imported but never tracked) - Staffer-language routes (zip / headcount / name / late-triage / ingest log) - Per-staffer hot-swap index (synthetic coordinator personas) - Search filter actually filters by state + role - Iterate.rs unused-state cleanup, catalog cleanup ## Test plan - [ ] Live page at `devop.live/lakehouse/` renders cleanly - [ ] Section ② cards collapse, hover-lift, click-expand smoothly - [ ] Fill-probability bars paint on scroll (not on initial render) - [ ] Project Index auto-opens when card expands and fetches OSHA - [ ] Face pool loads (1000 thumbs from `data/headshots/`) - [ ] Surname-routed face buckets pick the right ethnicity - [ ] Auditor cycles within 90s and emits kimi_architect verdict 🤖 Generated with [Claude Code](https://claude.com/claude-code)
profit added 24 commits 2026-04-28 11:01:44 +00:00
The Co-Pilot search box read state and role from the dropdowns (#sst, #srl)
but appended them to the message string as ' in '+st. The server's NL
parser then matched the literal preposition "in" against the case-insensitive
regex /\b(IL|IN|...)\b/i and assigned state IN (Indiana) to every search.
Result: typing "forklift in IL" returned Indiana workers. Same for WI, TX,
any state — all silently became Indiana. That was the "cached/generic
response" the legacy staffing client was seeing.

Two prongs:

1. search.html doSearch() now passes structured fields:
     {message, state, role}
   instead of munging into the message text. Dropdown selections bypass
   NL parsing entirely.

2. /intelligence/chat smart_search route accepts those structured fields
   and prefers them over regex archaeology. Falls back to NL parsing only
   when fields aren't provided. Fixed the regex too: the prepositional
   form (?:in|from)\s+(STATE) wins, the standalone form requires uppercase
   (drops /i flag) so the lowercase preposition "in" can no longer match.

Verified live:
- POST /intelligence/chat {"message":"forklift","state":"IL"}
    → 167 IL forklift operators (Galesburg, Joliet, ...)
- POST /intelligence/chat {"message":"forklift","state":"WI","role":"Forklift Operator"}
    → 16 WI Forklift Operators (Milwaukee, Madison, ...)
- POST /intelligence/chat {"message":"forklift in IL"} (NL fallback)
    → 167 IL workers (regex now correctly distinguishes preposition from state code)

Playwright drove the live UI through devop.live/lakehouse and confirmed the
front-end posts the structured body and the result panel renders the right
state. Restart sequence: kill old bun :3700, bun run mcp-server/index.ts.
Built from a playwright run as three personas:
  Maria   — "8 production workers near 60607 by next Friday, prior-fill at this client"
  Devon   — "what came in last night?"
  Aisha   — "Marcus running late site 4422"

Each one previously fell through to smart_search and returned irrelevant
results (geo wrong, headcount ignored, no triage, no temporal). Now:

A. Zip code → city/state lookup. Chicago zips (606xx, 607xx, 608xx)
   resolve to {city: Chicago, state: IL}; 13 metro prefixes covered.
   Maria's "near 60607" now returns Chicago workers, not Dayton/Green Bay.

B. Headcount parser. "8 production workers" / "12 forklift operators" /
   "5 welders" set top_k 1..200, capped 5..25 for SQL+vector LIMIT.
   Allows 0-2 role words between the count and the worker noun so
   "8 production workers" matches as well as "8 workers".

C. Bare-name profile lookup. Single short capitalized phrase
   ("Marcus" / "Sarah Lopez") triggers a profile route. Per-token LIKE
   AND-joined so "Marcus Rivera" matches "Marcus L. Rivera" without
   hardcoding middle initials.

E. Late-worker / no-show triage. Pattern: <Name> (running late|late|
   no show|sick|out today|called out|can't make it) — pulls profile +
   reliability + responsiveness + recent calls, sources 5 same-role
   same-geo backfills sorted by responsiveness, drafts a client SMS
   the coordinator can copy. Front-end renders triage card + Copy SMS
   button + green backfill list.

F. Contractor name preview anchor. The PROJECT INDEX preview line on
   each permit card now wraps contact_1_name and contact_2_name in
   anchors to /contractor?name=... — clicking a contractor finally
   navigates instead of doing nothing. Click handler stops propagation
   so the details element doesn't toggle.

D. Temporal "what came in" route. last night / today / past N hours /
   recent — surfaces datasets from the catalog whose updated_at is
   within the window, samples one row per dataset to detect worker-
   shape, groups by role for worker tables. Schema-agnostic — drop
   any dataset and it shows up. Currently sparse because no fresh
   ingest has happened today; will populate as ingest runs.

Server: /intelligence/chat smart_search route accepts structured
state/role from the search-form dropdowns (P1 from prior commit) and
now ALSO honors b.state, b.role, q.match for headcount + zip + name +
triage patterns BEFORE falling through to NL parsing.

Front-end: doSearch dispatches on response.type and renders triage,
profile, ingest_log, and miss states with type-specific UI. All DOM
construction uses textContent / appendChild — no innerHTML, no XSS.

Verified end-to-end via playwright drive of devop.live/lakehouse:
  Maria  → 8 Chicago Production Workers (60685, 60662, 60634)
           tags: "headcount: 8 · zip 60607 → Chicago, IL · ..."
  Aisha  → Marcus V. Campbell card + draft SMS + 5 Quincy IL backfills
           "I'm dispatching Scott B. Cooper (96% reliability) to cover."
  Devon  → ingest_log surfaces successful_playbooks_live (last 1h)
  Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)

Screenshots: /tmp/persona_v2/{01_maria,02_aisha,03_devon,04_marcus}.png

Restart sequence after these edits: pkill -9 -f "mcp-server/index.ts" ;
cd /home/profit/lakehouse ; bun run mcp-server/index.ts. The bun on
:3700 is not systemd-managed (pre-existing convention).
Same corpus, different relevance gradient per staffer. Three personas
defined in mcp-server/index.ts STAFFERS roster (Maria/IL, Devon/IN,
Aisha/WI), each with a primary state + secondary cities. Server-side:
/intelligence/chat smart_search accepts a staffer_id body field; when
set, defaults state to the staffer's territory and labels the playbook
context as theirs. The playbook patterns query also defaults its geo
to the staffer's primary city/state, so the recurring-skills/cert
breakdowns reflect what they actually fill, not the global IL prior.

Front-end: a staffer selector dropdown beside the existing state/role
filters. Picking a staffer auto-pins state to their territory, shows
a greeting line, relabels the MEMORY panel as MARIA'S/DEVON'S/AISHA'S
MEMORY, and sends staffer_id to chat for scoping.

Dropdown is populated from /staffers (NOT /api/staffers — the generic
/api/* passthrough sends everything under /api/ to the Rust gateway,
which doesn't own the roster). loadStaffers runs at window-load
independently of loadDay's Promise.all so the dropdown populates even
if simulation/SQL inits error out.

Verified end-to-end via playwright. Same q="forklift operators":
  no staffer  → 509 workers across MI/OH/IA, MEMORY label
  as Devon    → 89 IN-only (Fort Wayne, Terre Haute), DEVON'S MEMORY
  as Aisha    → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY
As Maria with q="8 production workers near 60607":
  tags: headcount: 8 · zip 60607 → Chicago, IL · role: production · city: Chicago
  20 workers, MARIA'S MEMORY label, top results in Chicago zips

Closes the demo-side build of A-G from the persona plan:
  A. zip → city/state, B. headcount, C. bare-name, D. temporal,
  E. late-worker triage, F. contractor anchor, G. per-staffer index.
The contractor.html click-target J asked for: a separate page (not a
modal, not a fall-through search) showing every angle on a contractor.
Reachable from the Co-Pilot dashboard, the staffers console, and the
search box — all anchor-wrap contractor names to /contractor?name=...

What's new on the page:

1. PROJECT INDEX — build-signal score
   Single 0-100 number with the drivers laid out beneath. Driver list
   is staffer-readable: "59 Chicago permits in 180d (+30) · OSHA 20
   inspections (-25) · federal contractor (+15)". Score weights are
   placeholders to be replaced by an ML model once the 12 awaiting
   sources ship — the current 6 wired signals would not give a real
   model enough features.

2. HEAT MAP — every Chicago permit they've been contact_1 or contact_2
   on, last 24 months, plotted on a leaflet dark map. Color by cost
   (green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to
   cost so the staffer sees where money + activity concentrates. Click
   a marker for permit detail (cost, date, work type, address, permit
   ID). All 50 of Turner Construction's geocoded recent permits in
   Chicago plot end-to-end.

3. ACTIVITY TIMELINE — monthly permit count, bar chart, with the
   first/last month labels so the staffer sees momentum. Tooltip on
   each bar gives the count and total cost for that month.

4. 12 AWAITING SOURCES — placeholder cards for the public datasets
   that would 3× the build-signal feature count. Each card has:
     - source name (real, e.g. DOL Wage & Hour, EPA ECHO, MSHA, BBB)
     - one-liner in coordinator language ("Has this contractor stiffed
       workers? Will they pay our staffing invoices?")
     - "Would show:" sample shape so the engineering scope is concrete
   Order is staffing-decision relevance:
     1. DOL Wage & Hour (WHD violations)
     2. State Licensure Boards (active license + expiry)
     3. Surety Bond Capacity (bonding ceiling)
     4. EPA ECHO Compliance (env violations at sites)
     5. DOT/FMCSA Carrier Safety (crash + OOS rates)
     6. BBB Complaints + Rating
     7. PACER Civil Suits (FLSA / Title VII / ADA)
     8. UCC Lien Filings (cash flow distress)
     9. D&B / Credit Bureau (PAYDEX, payment behavior)
    10. State UI Employer Claims (workforce stability)
    11. MSHA Mine Safety (excavation / aggregate / heavy)
    12. Registered Apprenticeships (DOL RAPIDS pipeline)

Server-side: entity.ts fetchContractorHistory now pulls the 50 most
recent permits with id + lat/lng + work_description, so the heat map
and timeline have what they need without a second SQL hop. The
ContractorHistory.recent_permits type gained the optional fields.

Front-end: contractor.html got 4 new render sections, leaflet wiring
(stylesheet + script in head), placeholder grid CSS, and a PLACEHOLDERS
const at the bottom with the 12 sources. All popup HTML is built via
DOM construction (textContent + appendChild) — no innerHTML, no XSS.

console.html: contractor names from /intelligence/permit_contracts now
anchor-wrapped to /contractor?name=... so the click-through J described
works from the staffers console too. Click stops propagation so the
permit details element doesn't toggle on the same click.

Verified end-to-end via playwright — Turner Construction profile shows:
  PIX score "Mixed signals — review drivers below"
  Heat map: "50 permits plotted · green/amber/red"
  4 section labels in order
  12 placeholder cards in the documented order
J reported https://devop.live/contractor?name=3115%20W%20POLK%20ST.%20LLC
returned 404. Cause: the anchor href was a bare /contractor, which on
devop.live routes to the LLM Team UI (port 5000) at the main site root,
not the lakehouse mcp-server (which lives under /lakehouse/*).

Every page that renders a contractor link now uses the same prefix
detector the dashboard already had:

  var P = location.pathname.indexOf('/lakehouse') >= 0 ? '/lakehouse' : '';

Files updated:
- search.html: entity-brief anchor + preview anchor → P+/contractor
- console.html: permit-card contractor list → P+/contractor
- contractor.html: history.replaceState + back-link + the
  /intelligence/contractor_profile fetch all use P prefix. The page
  is reachable at /lakehouse/contractor on the public URL and bare
  /contractor on localhost; both work without further config.

Verified:
  https://devop.live/lakehouse/contractor?name=3115%20W%20POLK%20ST.%20LLC
    → 200, 29.9 KB, full profile renders. Contractor has 1 permit on
    file (a small LLC), 1 geocoded so the heat map plots one marker.
J asked for "a profiler index that shows a history of everyone." This
is a /profiler directory page (also reachable via /contractors) that
ranks every contractor who's filed a Chicago permit, by total permit
value. Rows are clickable into the full /contractor profile.

Defaults: since 2025-06-01, min permit cost $250K, top 200 contractors
by total_cost. Server pulls two Socrata GROUP BY queries (one keyed on
contact_1_name, one on contact_2_name), merges them so contractors
listed in either applicant or contractor slot appear once with combined
counts/cost. ~300ms cold.

UI: live search box, since-date selector, min-cost selector, sortable
columns (name / permits / total_cost / last_filed). Live numbers as of
this write: 200 contractors, 1,702 permits, $14.22B aggregate. Filter
"Target" returns TARGET CORPORATION + CORPORATION TARGET (name variants
from Socrata).

Also fixes J's other complaint — "no new contracts, Target is gone":

  /intelligence/permit_contracts was hard-capped at $limit=6 + only
  the most recent 6 over $250K, so any day with 6 fresh permits would
  push older contractors (Target) off the panel entirely. Now defaults
  to 24 (caller can pass body.limit up to 100), so 2-3 days of permits
  stay on the panel. Added body.contractor — passes a name into the
  WHERE so the staffer can pin a specific contractor to the panel
  ("Target Corporation" → 3 of their permits over $250K).

Server-side:
- new POST /intelligence/profiler_index — paginated contractor index
  (since, min_cost, search, limit) with merged contact_1+contact_2
  aggregations
- /intelligence/permit_contracts — body.limit + body.contractor
- /profiler and /contractors routes serve profiler.html

Front-end:
- new mcp-server/profiler.html — sortable table, live filter, deep
  links to /contractor?name=... (prefix-aware via P, so /lakehouse
  works on devop.live)
- search.html + console.html nav: added "Profiler" link

Verified end-to-end via playwright on the public URL.
J's framing: "if a contractor works for Target, future Target contracts
mean money flows back to the contractor — the ticker is an associated
indicator." Now the profiler index attaches three flavors of ticker per
contractor and renders them as colored pills:

  green DIRECT    contractor IS the public issuer (Target Corp → TGT)
  amber PARENT    contractor is a subsidiary of a public parent
                    (Turner Construction → HOC.DE via Hochtief AG)
  blue  ASSOCIATED contractor co-appears on permits with a public
                    entity (TORNOW, KYLE F → TGT, 3 shared permits with
                    TARGET CORPORATION)

The associated flavor is the correlation signal J described — it pulls
the ticker for whoever the contractor has been working *with*, not
just what they are themselves. Most contractors are private; the
associated link is how the moat shows up.

Server-side:
- entity.ts new export `lookupTickerLite(name)` — cheap in-memory
  resolver that does only the SEC tickers index lookup + curated
  KNOWN_PARENT_MAP check, no per-call SEC profile or Stooq fetch.
  ~10ms per name after the index is loaded once.
- /intelligence/profiler_index now runs a third Socrata pull
  (5K permit pairs in window) to build a co-occurrence map. For each
  contractor in the result, attaches:
    .tickers.direct[]      — name matches a public issuer
    .tickers.associated[]  — top 5 co-permit partners that resolve
                              to a ticker, with partner_name +
                              co_permits count + partner_via reason

Front-end:
- mcp-server/profiler.html — new .ticker-pill styles (3 colors per
  attribution kind), pills render under the contractor name in the
  table. Hover title gives the full reason path.

Verified end-to-end on the public URL:
  search="tornow" → blue TGT pill, hint "Associated via co-permits
                    with TARGET CORPORATION (3 shared permits) —
                    TARGET CORP"
  search="target" → green TGT × 2 (TARGET CORPORATION +
                    CORPORATION TARGET name variants both resolve
                    direct to the same issuer)
  default top 200 → 15 ticker pills surface across the page including
                    JPM (via JPMORGAN CHASE BANK co-permits) and
                    parent-link tickers for the construction majors.
J asked: "kind of like a scrolling ticker that has all of the companies
and their stock prices and where they fit in the map." Implemented as
a horizontal-scroll strip at the top of /profiler:

  9 public issuers in this view · quotes via Stooq · 669ms
  ┌────┬────┬────┬────┬────┬────┬────┐
  │TGT │JPM │BALY│ACRE│FCBC│NREF│LSBK│ ← live price + day-change per
  │129 │311 │... │... │... │... │... │   ticker, color-banded by
  │+.17│+1.5│... │... │... │... │... │   attribution kind
  └────┴────┴────┴────┴────┴────┴────┘

Each card carries:
  - ticker + live price + day-change % (red/green)
  - attribution count + kind (exact / direct / parent / associated)
  - left bar color = strongest attribution kind (green for direct
    issuer, amber for parent, blue for co-permit associated, gradient
    when both direct and associated apply)
  - tooltip on hover lists the contractors attributed to this ticker
  - click toggles a filter on the table below — clicking TGT cuts the
    200-row list down to just TARGET CORPORATION + TORNOW, KYLE F
    (Target's primary co-permit contractor)

Server-side:
- entity.ts exports fetchStooqQuote (was internal)
- new POST /intelligence/ticker_quotes — accepts {tickers: [...]},
  fans out to Stooq.us in parallel, returns
  {ticker, price, price_date, open, high, low, day_change_pct,
   stooq_url} per symbol or null for non-US listings (HOC.DE, SKA-B.ST,
   LLC.AX). Capped at 50 symbols per call.

Front-end:
- mcp-server/profiler.html — new .basket-wrap section above the
  controls. buildBasket() runs after profiler_index loads:
    1. Aggregates unique tickers from .tickers.direct + .associated
       across all surfaced contractors
    2. Renders shells immediately (ticker symbol + "—" placeholder)
    3. Batch-fetches quotes via /intelligence/ticker_quotes
    4. Updates each card with price + day-change in place
  Click on a card sets a tickerFilter; render() skips rows whose
  attributions don't include that ticker. "clear filter" button on
  the basket strip resets it.

Verified end-to-end on devop.live/lakehouse/profiler:
  Default load → 9 issuers, live prices populated in 669ms
  TGT click   → table filters to TARGET CORPORATION + TORNOW, KYLE F
                (the contractor who runs 3 of Target's recent permits
                gets the TGT correlation indicator)
  JPM card    → $311.63, +1.55% — JPMorgan-adjacent contractors
  Tooltip     → list of contractors attributed to the ticker
J's prompt: shoot for the stars, frame the data corpus's value as a
predictive signal, not just a contractor directory. The thesis is
that every name in this corpus is also a forward indicator on public
equities — permits filed today predict construction starts in ~45
days, staffing in ~30, revenue recognition months later. The
associated-ticker network surfaces this signal before any 10-Q does.

Two new layers above the basket:

1. HERO THESIS PANEL — "Chicago Construction Activity Signal Engine"
   header + 3-line value statement, then 4 live metrics:

   - BAI (Building Activity Index) — attribution-weighted average of
     day-change % across surfaced issuers. Weight = attribution count
     so issuers we have more depth on count more. Today: +0.76%
     (9 issuers · top contributors FCBC +2.4%, ACRE +1.7%, JPM +1.5%).
     Color-coded green/red.

   - Indexed build value — total $ of permits attributable to ANY
     public issuer in this view. Today: $344M.

   - Network depth — issuers / attribution edges. Today: 9 / 15.
     This is the "we see what nobody else sees" metric: how many
     contractors are bridges from a private builder back to a public
     equity holder.

   - Market replication roadmap — chips showing "Chicago — live ·
     NYC DOB — adapter ready · LA County · Houston BCD · Boston ISD
     · DC DCRA". Frames the corpus as metro-agnostic from day one.

2. PER-TICKER ACTIVITY MAP — when a basket card is clicked, a leaflet
   map appears below the basket plotting that ticker's geocoded permit
   activity. Pulls /intelligence/contractor_profile for up to 6
   attributed contractors, merges their geocoded permits, plots on a
   dark Chicago tile layer. Color-banded by permit cost (green <$100K,
   amber $100K-$1M, red ≥$1M). Click TGT → 23 Target permits across
   Chicago; click JPM → JPMorgan-adjacent contractor activity. Cached
   per ticker so toggling is instant.

Verified end-to-end on devop.live/lakehouse/profiler:
  Default load: hero panel renders with all 4 metrics, basket strip
                with 9 issuers + live prices in 669ms.
  Click TGT  : signal map activates, "23 geocoded permits across
                1 contractor", table filters to 2 rows.
  Tooltip on basket cards: full reason path including matched name +
                contributors attributed to that ticker.

Architecture-side: zero new server code — all metrics computed
client-side from the existing profiler_index + ticker_quotes payloads.
The corpus already had the value; the page just needed to articulate it.
Old panel showed playbook ops + search counts and went empty in a
fresh demo (no operations yet). J: "update System Activity to coincide
with all of our recent updates."

Rebuilt as a live capability index — each tile is a thing the
substrate has learned to do, with the metric proving it's running.
Pulled in parallel from /staffers, /system/summary,
/api/vectors/playbook_memory/stats, /api/vectors/pathway/stats,
/intelligence/profiler_index, /intelligence/activity. Each probe
catches its own error so a single missing endpoint doesn't collapse
the panel.

Nine capability cards (verified end-to-end on devop.live/lakehouse):

  1. Per-staffer hot-swap index           3 personas (Maria/Devon/Aisha)
  2. Construction Activity Signal Engine  11 issuers · $347M attributed
                                          build value · network 11/14
  3. Late-worker / no-show triage         one-shot — name+late → backfills+SMS
  4. Permit → staffing bridge             24/day, every Chicago permit ≥$250K
  5. Hybrid SQL + vector search           500K workers · 5,474 playbook entries
  6. Schema-agnostic ingestion            36 datasets · 2.98M rows
  7. Contractor profile + project index   6 wired · 12 queued sources
  8. Pathway memory                       88 traces · 11/11 replays · 100%
  9. Ticker association network           11 tickers · 3 direct + 11 associated

Each card carries:
  - capability title + ship date pill ("baseline" or "shipped 2026-04-27")
  - big metric (live, not pre-baked)
  - sub-context line in coordinator language
  - "why a staffer cares" explanation
  - optional "Open →" deep link to the surface (Profiler, Contractor)

Header + intro paragraph reframed: "what the substrate has learned to
do" instead of "what the substrate has learned." Operational learning
(fills, playbooks, hot-swaps) compounds INSIDE each capability; the
panel surfaces the set of capabilities the corpus knows how to express.

Closing operational-stats row at the bottom shows fills/searches/
recent playbooks when /intelligence/activity has any.
Two load-bearing runtime changes that were never committed:

1. crates/gateway/src/v1/iterate.rs — `state` → `_state` on the unused
   route-state parameter. Cleared the one cargo workspace warning.
   Fix was made earlier this session but the working-tree change
   never made it into a commit.

2. data/_catalog/manifests/564b00ae-cbf3-4efd-aa55-84cdb6d2b0b7.json —
   DELETED. This was the dead manifest for `client_workerskjkk`, a
   typo dataset whose parquet was deleted but whose catalog entry
   stayed registered. Every SQL query failed schema inference on the
   missing file before reaching its target table — that's the bug
   that made /system/summary report 0 workers and the demo show zero
   bench. Deleting the manifest keeps the fix on disk; committing
   the deletion keeps it in git so a fresh checkout doesn't regress.

3. data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json
   — runtime catalog metadata update from the successful_playbooks_live
   write path. Ride-along change.

Reports under reports/distillation/phase[68]-*.md are auto-regenerated
by the audit cycle each run; skipping those.
J: "it's outdated." Console walkthrough was stuck on the original 6
chapters (legacy-bridge / permits / catalog / ranking demo / playbook
memory / try-it-yourself). Three weeks of new work weren't visible.

Three new chapters added between the existing playbook-memory chapter
and the input box; all pull live data from the running system:

  Chapter 6 — Three coordinators, three views of the same corpus
    Renders Maria/Devon/Aisha cards from /staffers with their
    territories. Frames the per-staffer hot-swap as the relevance
    gradient that compounds independently per coordinator. Same query
    "forklift operators" returns 89 IN / 16 WI / 167 IL workers
    depending on who's acting.

  Chapter 7 — The hidden signal — public issuers in your contractor graph
    Pulls /intelligence/profiler_index, builds the basket, shows
    issuer count + attributed build value + contractor count as the
    three top metrics. Lists top 8 issuers with attribution counts
    and direct-link to the profiler. This is the BAI / Signal Engine
    pitch in walkthrough form: every contractor name is also a forward
    indicator on a public equity. Cross-metro replication explicit
    in the closing paragraph.

  Chapter 8 — When something breaks — triage in one shot
    Live triage demo against /intelligence/chat with body
    {message:"Marcus running late site 4422"}. Renders the worker
    card + draft SMS + 5 backfills + duration_ms. The 250ms-vs-20min
    moment, made concrete with real Quincy IL workers.

Chapter 9 (was 6) — Try it yourself
  Updated input examples to demonstrate each new route:
    "8 production workers near 60607" → headcount + zip parser
    "Marcus running late site 4422"  → triage handler
    "Marcus"                          → bare-name lookup
    "what came in last night"         → temporal route
    "reliable forklift operators with OSHA certs" → hybrid SQL+vector
  Each is a click-to-run link beneath the input.

Two new accent classes: .accent-g (green for issuer-count) and
.accent-r (red for triage event).

Verified end-to-end on devop.live/lakehouse/console: 9 chapters
render, ch6 shows 3 staffer personas, ch7 shows 11 issuers / $347M /
200 contractors, ch8 shows Marcus V. Campbell + draft SMS + 5
backfills.
J: "needs a rewrite." Old version was anchored on a dual-agent
mistral+qwen2.5 loop that hasn't been the model story for weeks,
called the system 13 crates (it's 15), referenced "Local 7B models"
in the honest-limits section, and had no mention of:
  - the 40-model OpenCode fleet via one sk-* key
  - the 9-rung cloud-first ladder
  - N=3 consensus + cross-architecture tie-breaker
  - auditor cross-lineage (Kimi K2.6 ↔ Haiku 4.5, Opus auto-promote)
  - distillation v1.0.0 frozen substrate (e7636f2)
  - pathway memory (88 traces, 11/11 replays, ADR-021)
  - per-staffer hot-swap index
  - Construction Activity Signal Engine + BAI + ticker network
  - the gateway as OpenAI-compat drop-in middleware

Rewrote into 10 chapters:

  1.  Receipts — live tests + new live tile showing the Signal Engine
      view for THIS load (issuer count, attributed build value,
      contractor count, attribution edges)
  2.  Architecture — corrected to 15 crates with current responsibilities;
      ASCII diagram showing OpenAI consumers + MCP + Browser all hitting
      gateway /v1/*; provider fleet table with all 5 (ollama, ollama_cloud,
      openrouter, opencode 40-model, kimi); validator + truth + auditor
      crates added
  3.  Model fleet — REPLACED the dual-agent mistral story. Now: the
      9-rung ladder (kimi-k2:1t through openrouter:free → ollama local),
      N=3 consensus + tie-breaker math, auditor Kimi↔Haiku alternation
      with Opus auto-promote on big diffs, distillation v1.0.0 freeze
      tag e7636f2 (145 tests · 22/22 · 16/16 · bit-identical)
  4.  Two memory layers — kept playbook content (Phase 19 boost math
      still load-bearing), added pathway memory (ADR-021) section with
      live counters in the page (88 / 11-11 / 100% reuse rate)
  5.  Per-staffer hot-swap — NEW. Pseudocode showing how staffer_id
      scopes state filter + playbook geo + UI relabel to MARIA'S MEMORY
  6.  Construction Activity Signal Engine — NEW. Three attribution
      flavors (direct, parent, associated), BAI math, cross-metro
      replication framing (NYC DOB next, then LA / Houston / Boston)
  7.  Architectural choices — added ADR-021 row + distillation freeze row
  8.  Measured at scale — kept (uses /proof.json scale data)
  9.  Verify or dispute — REFRESHED with current endpoints. Removed the
      stale "bun run tests/multi-agent/scenario.ts" recipe; added curl
      examples for /v1/health, pathway/stats, per-staffer scoping (3-loop
      bash script), late-worker triage, profiler_index, ticker_quotes,
      auditor verdicts, distillation acceptance gate
  10. What we are NOT claiming — REFRESHED. Removed "Local 7B models"
      caveat; added: 12 awaiting public-data sources are placeholders,
      SEC name-fuzzy has rare false positives, BAI is a thesis not a
      backtest yet, single-metro today

Live data probes added:
  loadPathwayLive   — fills pwm-traces / pwm-replays / pwm-rate spans
  loadSignalLive    — renders the LIVE Signal Engine tile under Ch1

Nav also gained a Profiler link to match search.html and console.html.

Verified end-to-end on devop.live/lakehouse/proof:
  10 chapters render, 5/5 live tests pass, pathway shows 88 traces +
  100% reuse rate, live signal tile shows 11 issuers + $347M attributed
  + 200 contractors + 14 attribution edges. Architecture diagram +
  crate table accurate as of HEAD.
J: "how about devop.live/lakehouse/spec." Spec was anchored on
2026-04-21 state (v2 footer): mistral mentioned in the model matrix,
13 crates not 15, missing validator/truth/auditor crates, no mention
of OpenCode 40-model fleet, no pathway memory, no per-staffer
hot-swap, no Construction Activity Signal Engine, ADR count was 20.
Footer claimed Phases 19-25.

Edits, in order:

  Ch1 Repository layout
    + crates/truth/ (ADR-021 rule store)
    + crates/validator/ (Phase 43 — schema/completeness/policy gates)
    + auditor/ (cross-lineage Kimi↔Haiku/Opus auto-promote)
    + scripts/distillation/ (frozen substrate v1.0.0 at e7636f2)
    Updated aibridge to mention ProviderAdapter dispatch
    Updated gateway to mention OpenAI-compat /v1/* drop-in middleware
    Updated mcp-server route list to include /staffers + profiler/contractor pages
    Updated config/ to mention modes.toml + providers.toml + routing.toml
    Updated docs/ ADR count from 20 → 21
    Updated data/ to mention _pathway_memory + _auditor/kimi_verdicts

  Ch3 Measurement & indexing
    REPLACED stale "Model matrix (Phase 20)" T1-T5 table that
    mentioned mistral with the current 5-provider fleet:
      ollama / ollama_cloud / openrouter / opencode (40 models, one
      sk-* key reaches Claude Opus 4.7, GPT-5.5-pro, Gemini 3.1-pro,
      Kimi K2.6, GLM, DeepSeek, Qwen, MiniMax, free) / kimi
    ADDED 9-rung cloud-first ladder pseudocode
    ADDED N=3 consensus + cross-architecture tie-breaker math
    ADDED auditor cross-lineage Kimi K2.6 ↔ Haiku 4.5 + Opus auto-promote
    ADDED distillation v1.0.0 freeze paragraph (145 tests, 22/22, 16/16)
    Updated Continuation primitive to mention Phase 44 Rust port

  Ch5 What a CRM can't do
    Extended the table with 6 new capabilities:
      - Per-staffer relevance gradient
      - Triage in one shot (late-worker → backfills + draft SMS)
      - Permit → fill plan derivation
      - Public-issuer attribution across contractor graph
      - Cross-lineage AI audit on every PR
      - Pathway memory (system-level hot-swap, ADR-021)

  Ch6 How it gets better over time
    Lede updated from 7 paths → 10 paths
    NEW Path 7 — Pathway memory (ADR-021)
    NEW Path 8 — Per-staffer hot-swap index
    NEW Path 9 — Construction Activity Signal Engine
    Original Path 7 (observer ingest) renumbered to Path 10

  Ch9 Per-staffer context
    Lede now anchors Path 8 from Ch6
    NEW lead section: Per-staffer hot-swap index — Maria/Devon/Aisha,
    same query reshapes per coordinator (167 IL / 89 IN / 16 WI),
    MARIA'S MEMORY pill, /staffers endpoint, metro-agnostic by
    construction. The original Phase 17 profile / Phase 23 competence
    sections retained beneath as the deeper architecture detail.

  Ch10 A day in the life
    Updated 14:00 emergency event to use the late-worker triage
    handler — coordinator types "Dave running late site 4422", gets
    profile + draft SMS + 5 backfills + Copy SMS button in 250ms.
    The old Click No-show button → /log_failure flow remains valid
    (penalty still records); the user-facing surface is the new
    triage card.

  Ch11 Known limits
    REPLACED the Mem0/Letta/Phase-26 era list with current honest
    limits: BAI persistence + backtesting, NYC DOB adapter, 12
    awaiting public-data sources for contractor profile, rate/margin
    awareness, Mem0-style UPDATE/DELETE, Letta hot cache (now 5K
    not 1.9K), confidence calibration, SEC fuzzy precision, tighter
    pathway+scrum integration.

  Footer
    v2 2026-04-21 → v3 2026-04-27
    Phases 19-25 → 19-45
    Lists today's phases: distillation v1.0.0 substrate, gateway as
    OpenAI-compat drop-in, mode runner, validator + iterate, ADR-021
    pathway memory, per-staffer hot-swap, Construction Activity Signal
    Engine.

  Nav
    + Profiler link
    Date pill v1 · 2026-04-20 → v3 · 2026-04-27

Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s
render in order, 67KB page (was 50KB-ish), all internal links resolve.
J: "It's two cartoonish right now the website looks like it was made
by first grade teacher." Pulled the DiceBear personas-style headshots
and the emoji role badges. They were generative-illustration playful;
this is supposed to read like a staffing tool, not a kindergarten
attendance sheet.

Replacement design — restraint, signal, no glyphs:

  Avatar:   40px circle, monogram initials, muted dark background
            (#161b22), 1px ring (#21262d), white-ish text. No image,
            no emoji. Looks like a pre-photo placeholder slot in a
            real ATS.

  Role band: the role gets classified into one of five families:
            WAREHOUSE / PRODUCTION / SKILLED TRADE / DRIVER / LEAD
            (regex-based; falls back to the first word of the role
            for unknown families). Each family has a single muted
            color: blue / amber / purple / green / orange. The
            color appears as:
              - a 3px left border on the .iworker card
              - a 2px left border + matching text color on a small
                uppercase pill in the detail line

That's it. No images, no emojis, no per-role illustrations. The
staffer sees role-family at a glance via the band color, name and
initials prominently, full role + city + zip in the detail string
behind the pill. Five colors total instead of an eight-color rainbow.

CSS:
  .iworker[data-role-band="warehouse"] etc. → 3px left border
  .role-pill[data-rb="warehouse"] etc.      → matching pill border

JS:
  ROLE_BANDS = 6 regex → band+label entries (warehouse, production,
                          trades, driver, lead, quality)
  roleBand(role)       = first matching entry, fallback to first
                          word of role uppercased

Verified end-to-end via playwright on devop.live/lakehouse:
  forklift query → 10 cards
  every card → monogram avatar + WAREHOUSE pill (blue band)
  no images, no emojis, no rainbow

Restart sequence after these edits:
  pkill -9 -f "/home/profit/lakehouse/mcp-server/index.ts"
  ( setsid bun run /home/profit/lakehouse/mcp-server/index.ts \
      > /tmp/mcp-server.log 2>&1 < /dev/null & disown )
J: "can you update Staffer's Console too the same look." Console
rendered worker rows in three places (Chapter 4 permit-contract
candidates, Chapter 8 triage backfills, Chapter 9 try-it-yourself
results) with the original 28px square avatar + flat backgrounds —
inconsistent with the new dashboard design.

Three changes:

1. CSS — .worker now has a 3px left-edge border that color-codes the
   role family, and .av is a 32px circle with a muted dark background
   + 1px ring + monogram initials. Five role-band colors mirror
   search.html: warehouse blue / production amber / trades purple /
   driver green / lead orange. Plus a .role-pill style matching the
   dashboard's small uppercase chip.

2. Helpers — added ROLE_BANDS regex table + roleBand() classifier and
   a new workerRow(name, role, detail, opts) builder. Same regex
   patterns as search.html so a "Forklift Operator" classifies
   identically on every page. opts.endorsed adds the green endorsed
   chip; opts.score appends a rank badge.

3. Replaced the three inline avatar+row constructors with workerRow()
   calls. Net: console.html lost ~20 lines of duplicated DOM building
   while gaining role bands + pills.

Verified end-to-end via playwright on devop.live/lakehouse/console:
  Chapter 8 triage scenario "Marcus running late site 4422":
    5 backfill rows render with [warehouse] band + WAREHOUSE pill +
    monogram avatars (SBC, ETW, SHC, WMG, MEB).
  Same sober look as the dashboard worker cards. No emojis, no
  cartoons, color-coded role family on the left edge.
Three layers shipped:

1. SCRIPT — scripts/staffing/fetch_face_pool.py
   Pulls N synthetic StyleGAN faces from thispersondoesnotexist.com
   into data/headshots/face_NNNN.jpg, writes manifest.jsonl. Idempotent:
   re-running skips existing files. Optional gender tagging via deepface
   (currently unavailable on this box; the script handles ImportError
   gracefully and tags everything as untagged). Fetched 198 faces with
   concurrency=3 in ~67s.

2. SERVER — /headshots/:key route in mcp-server/index.ts
   Loads manifest at first hit, caches in globalThis._faces. Hashes the
   key with djb2-style mixing → pool index → returns the JPG. Same
   key always gets the same face (deterministic). Accepts
   ?g=man|woman&e=caucasian|black|hispanic|south_asian|east_asian|middle_eastern
   to bias pool selection — the gender/ethnicity buckets fall back to
   the full pool when no tagged matches exist. Cache-Control:
   86400 immutable so faces ride the browser cache after first hit.
   /headshots/__reload re-reads the manifest without restart.

3. UI — search.html + console.html worker cards
   Re-added overlay <img> on top of the monogram .av circle. img.src
   = /headshots/<encoded-key>?g=<hint>&e=<hint>. img.onerror removes
   the failed image so the monogram stays visible if the face pool
   isn't fetched / CDN is blocked. .av now has overflow:hidden +
   position:relative to clip the img to a perfect circle.

Forced-confident name resolution (J: "we're CREATING the profile,
created as though you truly have the information Xavier is more
likely Hispanic and he's a male"):

   genderFor(name)        — looks up MALE_NAMES + FEMALE_NAMES,
                            falls back to a deterministic hash split
                            so unknown names spread ~50/50. Sets now
                            include cross-cultural names: Alejandro/
                            Andres/Mateo/Santiago/Joaquin/Cesar/Hugo/
                            Felipe/Gerardo/Salvador/Ramon (Hispanic),
                            Raj/Anil/Vikram/Krishna/Pradeep (South
                            Asian), Wei/Yi/Hiroshi/Akira/Hyun (East
                            Asian), Demetrius/Kareem/DaQuan/Khalil
                            (Black), Omar/Khalid/Hassan/Ahmed/Bilal
                            (Middle Eastern). FEMALE_NAMES extended
                            in parallel.

   guessEthnicityFromFirstName(name)
                          — confident default of 'caucasian' for any
                            name not in the cultural buckets so every
                            worker resolves to a category the face
                            pool can be biased toward. Order: ME → Black
                            → Hispanic → South Asian → East Asian →
                            Caucasian (matters where names overlap,
                            e.g. Aisha appears in ME + Black, biases
                            toward ME for visual fit).

   Both helpers also ported into console.html so the triage backfills
   and try-it-yourself rendering get the same hint stack.

Privacy note in the script + route comments: the synthetic data uses
the worker's name as the seed; production should hash worker_id (not
name) to avoid leaking PII to a third-party CDN. The fetch URL itself
is referenced once per pool build, not per-worker.

.gitignore — added data/headshots/face_*.jpg (~100MB for 198 faces;
the manifest + script are tracked). Re-running the script on a fresh
checkout rebuilds the pool from scratch.

Verified end-to-end via playwright on devop.live/lakehouse:
   forklift query → 10 worker cards
   10/10 with face images (real synthetic headshots, not monograms)
   0/10 broken
   Alejandro G. Nelson  → ?g=man&e=hispanic
   Patricia K. Garcia    → ?g=woman&e=caucasian
   Each name → unique face, deterministic across loads.
   Console triage backfills get the same treatment.
Worker cards now ship a real photo per person instead of monogram tiles:

  - fetch_face_pool.py pulls 1000 faces from thispersondoesnotexist.com
  - tag_face_pool.py runs deepface for gender/race/age, excludes <22yo
  - manifest.jsonl: 952 servable, gender/race buckets populated
  - /headshots/_thumbs/ pre-resized to 384px webp (587KB -> 11KB,
    60x smaller; without this Chrome's parallel-connection budget
    drops ~75% of tiles in a 40-card grid)
  - /headshots/:key gender x race x age intersection bucketing with
    gender-only fallback when intersection is sparse
  - /headshots/generate/:key ComfyUI on-demand for the contractor
    profile spotlight (cold ~1.5s, cached ~1ms; worker-derived
    djb2 seed makes faces deterministic-per-worker but unique
    across workers sharing the same prompt)
  - serve_imagegen.py _cache_key() now includes seed (was caching
    by prompt only -> 3 different worker seeds collapsed to 1
    cached image; verified fix produces 3 distinct md5s)
  - confidence-default name resolution: Xavier->man+hispanic,
    Aisha->woman+black, etc. Every worker resolves to a bucket.

End-to-end: playwright run on /?q=forklift+operators+IL -> 21/21
cards loaded, 0 broken, all 384px webp.

Cache + binary pool gitignored; manifest tracked.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Three problems J flagged ("not matching properly", "same faces", "still
showing old icons") had three different roots:

1. MISMATCH: front-end was first-name only, so "Anna Cruz" / "Patricia
   Garcia" / "John Jimenez" all defaulted to caucasian. Added
   SURNAMES_HISPANIC / _SOUTH_ASIAN / _EAST_ASIAN / _MIDDLE_EASTERN
   dicts to both search.html and console.html. Surname is checked
   FIRST (stronger signal for hispanic + asian than first names),
   then first-name fallback. Cruz → hispanic, Patel → south_asian,
   Nguyen → east_asian, regardless of first name.

2. SAME FACES: pool buckets are uneven — woman/south_asian=3,
   man/black=4, woman/middle_eastern=2 — so any worker in those
   buckets collapses to 2-4 photos no matter how good the hash is.
   /headshots/:key now 302-redirects to /headshots/generate/:key
   when the gender × race intersection is below 30 faces. ComfyUI
   on-demand gives infinite uniqueness for the sparse buckets
   (deterministic-per-worker via djb2 seed). Dense buckets still
   serve from the pool — no GPU cost there.

3. STALE CACHE: Cache-Control was max-age=86400, immutable — pinned
   old photos in browsers for 24h after any server-side update.
   Dropped to max-age=3600, must-revalidate, and added a v=2
   cache-buster query param to all front-end /headshots/ URLs so
   existing cached entries are bypassed on next page load.

Also surfacing X-Face-Pool-Bucket / Bucket-Size headers for diagnosis.

Verified: playwright run shows surname routing correct (Torres,
Rivera, Alvarez, Gutierrez, Patel, Nguyen, Omar all bucketed
correctly), sparse buckets 302 to ComfyUI, dense buckets stay on
the thumb pool.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
entity.ts imports findTifDistrict from ./tif_polygons.js but the
source file was never committed — only present in the working tree.
Adding it so a fresh clone compiles.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
fetch_face_pool was wiping 952 hand-classified rows when re-run from
a Python without deepface installed (it reset every gender to None).
Now:

- Loads existing manifest by id and overlays only fetch-owned fields,
  so gender/race/age/excluded survive a refetch.
- deepface pass tags only records that don't already have a gender;
  deepface unavailable means "leave existing tags alone" not "reset".
- New --shrink flag required to drop ids >= --count. Default refuses
  to shrink the pool silently.
- Atomic write via tmp + os.replace so an interrupted run can't
  corrupt the manifest.
- Dedupes duplicate id lines (root cause of the 2497-row manifest
  backing a 1000-face pool).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Adds two single-source-of-truth recipe files that drive both the
hot-path render server and the offline pre-render scripts:

- role_scenes.ts: per-role-band scene clauses (clothing + backdrop).
  Forklift operators look like forklift operators instead of
  collapsing to interchangeable studio shots. SCENES_VERSION mixes
  into the headshot cache key so a coordinator tweak refreshes every
  matching face on next view.
- icon_recipes.ts: cert / role-prop / status / hazard / empty icons
  with deterministic per-recipe seeds + fuzzy text resolver.
  ICONS_VERSION suffix on the cached file means edits don't
  overwrite in place — misfires are recoverable.

Routes (mcp-server/index.ts):
- GET /headshots/_scenes — exposes SCENES + version to the
  pre-render script so prompts don't drift between batch and hot-path.
- GET /icons/_recipes — same idea for icons.
- GET /icons/cert?text=... — resolves free-text cert names to a
  recipe and 302s to the rendered icon. 404 (not 500) when no recipe
  matches so the front-end can hang `onerror="this.remove()"`.
- GET /icons/render/{category}/{slug} — cache-or-render at 256² (8
  steps) for crisper edges than 512² when downsampled to 14px.

ComfyUI portrait support (scripts/serve_imagegen.py):
The editorial workflow had `human, person, face` baked into its
negative prompt — actively sabotaging portraits. _comfyui_generate
now accepts negative_prompt/cfg/sampler/scheduler overrides, and
those mix into the cache key so portrait calls don't collapse into
hero-shot cache hits.

scripts/staffing/render_role_pool.py: pre-renders the role-aware
face pool by reading SCENES from /headshots/_scenes — single source
of truth verified at run time.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Search results no longer pop in as a single block. New behavior:

- Skeleton list pre-claims the vertical space results will occupy
  with shimmering placeholder cards, so arriving results fade in
  over the skeleton instead of pushing layout. Sweep is staggered
  per row for a "rolling wave" not "everything blinking together".
- Domain-language stage caption ("matching against permits",
  "ranking by reliability") rotates on a fixed schedule so users
  read progress, not a stuck spinner.
- @keyframes card-in: real worker cards rise 4px and fade in over
  350ms with nth-child stagger across the first ~12 rows. Honors
  prefers-reduced-motion.
- Avatar imgs filter through grayscale + slight contrast/blur to
  pull the SDXL Turbo color cast (which screams "AI generated" at
  small sizes). Cert icons get the same treatment.
- Once-per-session hero takeover compresses the Section ⓪ strip
  ("Not a CRM — an index that learns from you") into a centered
  hero on first paint, dismissed by clicking anywhere. Stats
  hydrate from live endpoints.

console.html: mirrors the avatar B&W filter for visual consistency,
and removes the headshot insertion entirely — back to monogram
initials. The console (internal staffer view) doesn't need synthetic
faces; the public demo at /lakehouse/ does.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
demo: search.html — Live Market explainer rewrite + fp-bar viewport-paint + compact contract cards
Some checks failed
lakehouse/auditor 18 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
f4dc1b29e3
Four UI changes landing together since they all polish Section ① and
Section ② of the public demo:

1. Section ① (Live Market — Chicago) explainer rewritten data-source-
   first ("Live from City of Chicago Open Data...") with bolded dial
   names so a skimmer can map the visual to the prose. Drops the
   "internal calendar" jargon and the slightly-overclaiming "rest of
   the page is reacting" framing — downstream sections read the same
   feed but don't react to the per-shift filter, so the new copy says
   "this row is its heartbeat" instead.

2. Fill-probability bar gets a left-to-right paint reveal (clip-path
   inset animation) so the green→gold→orange→red gradient reads as a
   *timeline growing* instead of a static heatmap with a "danger zone"
   at the right. Followed by a 30%-wide shimmer sweep on a 3.4s loop
   for live-signal feel.

3. Paint trigger moved from on-render to IntersectionObserver — by
   the time the user scrolls to Section ② the on-render animation had
   already finished. Now each bar paints in over 2.8s when it enters
   viewport (threshold 0.2, 350ms entry delay). Single shared observer,
   unobserve()s after firing so the watch list trends to zero.

4. Contract cards now compact-by-default with click-to-expand. New
   summary strip shows revenue / margin / fill-by-1wk / top candidate
   so scanners get the punchline without expanding. Click anywhere on
   the card surface (excluding inner content) to expand the full FP
   curve, economics grid, candidates list, and Project Index. Project
   Index auto-opens with the parent card so users actually find the
   build signals — but only on user-driven expand (avoiding 20× OSHA
   scrapes on page load). grid-template-rows: 0fr → 1fr animation
   handles the smooth height transition.

All four animations honor prefers-reduced-motion.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 18 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
Head SHA: f4dc1b29e389
Audited at: 2026-04-28T11:06:42.280Z

static — 2 findings (0 block, 2 warn, 0 info)

⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts

  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 37 findings (15 block, 21 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 24987ms wall-clock) (truncated 654013→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 36
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44399 chars
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No animation or gradient changes in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ranking or schedule rotation in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No layer implementation in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No role-pill styling in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No endorsed styling in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color classes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No spec page verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No proof page verification in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No accent classes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console chapter verification in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No capability cards in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No contractor profile wiring in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color-coding in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No map tile layer in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ticker or price display in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No attribution bar in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No DIRECT attribution in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on the public URL:"
  • at commit:ba41ad28:38
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No public URL verification in diff
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No search functionality in diff
    ⚠️ warn — cloud: claim not backed — "works on devop.live)"
  • at commit:f6a7621b:40
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No devop.live verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • at commit:f6a7621b:43
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • at commit:a1066db8:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No signal wiring in diff
    ⚠️ warn — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • at commit:a1066db8:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No cost banding in diff
    ⚠️ warn — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • at commit:a1066db8:62
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No click handling in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • at commit:a1066db8:65
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Turner Construction profile in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • at commit:5f0beffe:23
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No forklift search verification in diff
    ⚠️ warn — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • at commit:5f0beffe:26
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Aisha or location filtering in diff
    ⚠️ warn — cloud: claim not backed — "button + green backfill list."
  • at commit:677065de:30
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No backfill button in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • at commit:677065de:54
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright drive in diff
    ⚠️ warn — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • at commit:677065de:60
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Marcus profiles in diff
    🛑 block — cloud: claim not backed — "Verified live:"
  • at commit:fb99e92a:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No live verification in diff
kb_query — 134 findings (0 block, 8 warn, 126 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "silently passing or panicking."
  • signature=d4af9c00f3921790
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 15 tests, all green. Covers the happy paths, the common"
  • signature=5276d2104816d3cc
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Workspace warnings still at 0. 5 new tests, all green."
  • signature=f97327309dcf911e
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PHASES.md marked Phase 42 done, but the rule sets lived inline in"
  • signature=709b042dd92da0ea
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "/home/profit/.bun/install/cache/gitea-mcp@0.0.10/ gets wired into"
  • signature=7472043db1f7dd1b
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The PHASES.md checkbox marked this done, but audit found:"
  • signature=4466df8caee1c754
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 63 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 63 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 63 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 63 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 52 flaggings, conf=0.02): TODO/FIXME/XXX/HACK comment added in crates/validator/src/staffing/fill.rs
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 36 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11
kimi_architect — 10 findings (3 block, 5 warn, 2 info)

🛑 block — Truncated diff for entity.ts prevents verification of 2,821-line new file

  • mcp-server/entity.ts:1
  • The diff shows ... [truncated; original diff was 654013 chars] at line 2821. This is a new file with 2,821 lines of core business logic for permit signal aggregation. Without the
  • [grounding: verified at mcp-server/entity.ts:1]
    🛑 block — Hardcoded demographic name-classification tables in client-side JS create silent determinism leak
  • mcp-server/console.html:216-260
  • ``FEMALE_NAMES, MALE_NAMES, NAMES_HISPANIC_C, NAMES_BLACK_C, etc. are hardcoded Sets of ~400 names each, embedded directly in HTML. These classify workers by gender and race
  • [grounding: verified at mcp-server/console.html:216]
    🛑 block — Race/ethnicity data flows from synthetic face pool to worker cards without consent or audit trail
  • data/headshots/manifest.jsonl:1
  • The manifest contains 1,000 entries with gender, race, and agefields derived from deepface analysis of synthetic StyleGAN images. Theconsole.htmlat line 216-260 andsea`
  • [grounding: verified at data/headshots/manifest.jsonl:1]
    ⚠️ warnclient_workerskjkk catalog deletion is a hot-fix not in git, creating schema-bypass anti-pattern
  • STATE_OF_PLAY.md:89
  • The document explicitly states DELETE /catalog/datasets/by-name/client_workerskjkk was a runtime hot-fix that removed a dead manifest, and that "This was the actual root cause" o
  • [grounding: verified at STATE_OF_PLAY.md:89]
    ⚠️ warniterate.rs parameter rename to _state suppresses warning but may hide dead code
  • crates/gateway/src/v1/iterate.rs:93
  • The State(state)parameter was renamed toState(_state)to clear a cargo warning. However, the function body is not shown in the diff (truncated after line 93). If_stateis
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:93]
    ⚠️ warncontractor.html loads external Leaflet CSS/JS from unpkg without SRI or fallback
  • mcp-server/contractor.html:5-6
  • ``and are loaded without s
  • [grounding: verified at mcp-server/contractor.html:5]
    ℹ️ infocontractor.html render() function builds DOM with innerHTML-equivalent patterns via textContent but uses document.createElement for complex structures
  • mcp-server/contractor.html:200-400
  • The comment at line 195 claims "No innerHTML anywhere in the script; every API-derived string passes through textContent." However, the render()function at line 200+ constructs
  • [grounding: verified at mcp-server/contractor.html:200]
    ⚠️ warnmodes.toml staffing_inference.matrix_corpus still points to workers_500k_v8 while v9 exists
  • STATE_OF_PLAY.md:101
  • The document notes modes.tomlstill saysworkers_500k_v8 and that "v9 in vector index is from Apr 17 (raw-sourced, not safe-view)." This is a load-bearing assumption: the infer
  • [grounding: verified at STATE_OF_PLAY.md:101]
    ⚠️ warnentity.ts comment admits "this is NOT an investment product" but the UI presents ticker data with price/change%
  • mcp-server/entity.ts:4
  • The file-level comment disclaims SEC regulation, but contractor.html at lines 241-260 renders stock tickers with live prices, day-change percentages, and color-coded gain/loss in
  • [grounding: verified at mcp-server/entity.ts:4]
    ℹ️ infosearch.html and console.html img.loading='lazy' removal may cause memory pressure on low-end devices
  • STATE_OF_PLAY.md:78
  • The document states img.loading='lazy' was dropped because "With 11KB thumbs, eager load is cheap (~500KB for 50 cards)." However, this assumes the user always views ≤50 cards. I
  • [grounding: verified at STATE_OF_PLAY.md:78]

Metrics

{
  "audit_duration_ms": 220733,
  "findings_total": 184,
  "findings_block": 18,
  "findings_warn": 36,
  "findings_info": 130,
  "claims_strong": 15,
  "claims_moderate": 21,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 36,
  "diff_bytes": 654013
}

Lakehouse auditor · SHA f4dc1b29 · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 18 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" **Head SHA:** `f4dc1b29e389` **Audited at:** 2026-04-28T11:06:42.280Z <details><summary><b>static</b> — 2 findings (0 block, 2 warn, 0 info)</summary> ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 37 findings (15 block, 21 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 24987ms wall-clock) (truncated 654013→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 36` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44399 chars` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No animation or gradient changes in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ranking or schedule rotation in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No layer implementation in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No role-pill styling in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No endorsed styling in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color classes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No spec page verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No proof page verification in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No accent classes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console chapter verification in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No capability cards in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No contractor profile wiring in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color-coding in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No map tile layer in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ticker or price display in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No attribution bar in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No DIRECT attribution in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on the public URL:" - `at commit:ba41ad28:38` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No public URL verification in diff` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No search functionality in diff` ⚠️ **warn** — cloud: claim not backed — "works on devop.live)" - `at commit:f6a7621b:40` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No devop.live verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `at commit:f6a7621b:43` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `at commit:a1066db8:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No signal wiring in diff` ⚠️ **warn** — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `at commit:a1066db8:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No cost banding in diff` ⚠️ **warn** — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `at commit:a1066db8:62` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No click handling in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `at commit:a1066db8:65` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Turner Construction profile in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `at commit:5f0beffe:23` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No forklift search verification in diff` ⚠️ **warn** — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `at commit:5f0beffe:26` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Aisha or location filtering in diff` ⚠️ **warn** — cloud: claim not backed — "button + green backfill list." - `at commit:677065de:30` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No backfill button in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `at commit:677065de:54` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright drive in diff` ⚠️ **warn** — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `at commit:677065de:60` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Marcus profiles in diff` 🛑 **block** — cloud: claim not backed — "Verified live:" - `at commit:fb99e92a:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No live verification in diff` </details> <details><summary><b>kb_query</b> — 134 findings (0 block, 8 warn, 126 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "silently passing or panicking." - `signature=d4af9c00f3921790` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 15 tests, all green. Covers the happy paths, the common" - `signature=5276d2104816d3cc` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Workspace warnings still at 0. 5 new tests, all green." - `signature=f97327309dcf911e` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PHASES.md marked Phase 42 done, but the rule sets lived inline in" - `signature=709b042dd92da0ea` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "/home/profit/.bun/install/cache/gitea-mcp@0.0.10/ gets wired into" - `signature=7472043db1f7dd1b` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The PHASES.md checkbox marked this done, but audit found:" - `signature=4466df8caee1c754` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 63 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 63 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 63 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 63 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 52 flaggings, conf=0.02): TODO/FIXME/XXX/HACK comment added in crates/validator/src/staffing/fill.rs - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 36 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11` </details> <details><summary><b>kimi_architect</b> — 10 findings (3 block, 5 warn, 2 info)</summary> 🛑 **block** — Truncated diff for entity.ts prevents verification of 2,821-line new file - `mcp-server/entity.ts:1` - `The diff shows `... [truncated; original diff was 654013 chars]` at line 2821. This is a new file with 2,821 lines of core business logic for permit signal aggregation. Without the` - `[grounding: verified at mcp-server/entity.ts:1]` 🛑 **block** — Hardcoded demographic name-classification tables in client-side JS create silent determinism leak - `mcp-server/console.html:216-260` - ``FEMALE_NAMES`, `MALE_NAMES`, `NAMES_HISPANIC_C`, `NAMES_BLACK_C`, etc. are hardcoded Sets of ~400 names each, embedded directly in HTML. These classify workers by gender and race ` - `[grounding: verified at mcp-server/console.html:216]` 🛑 **block** — Race/ethnicity data flows from synthetic face pool to worker cards without consent or audit trail - `data/headshots/manifest.jsonl:1` - `The manifest contains 1,000 entries with `gender`, `race`, and `age` fields derived from deepface analysis of synthetic StyleGAN images. The `console.html` at line 216-260 and `sea` - `[grounding: verified at data/headshots/manifest.jsonl:1]` ⚠️ **warn** — `client_workerskjkk` catalog deletion is a hot-fix not in git, creating schema-bypass anti-pattern - `STATE_OF_PLAY.md:89` - `The document explicitly states `DELETE /catalog/datasets/by-name/client_workerskjkk` was a runtime hot-fix that removed a dead manifest, and that "This was the actual root cause" o` - `[grounding: verified at STATE_OF_PLAY.md:89]` ⚠️ **warn** — `iterate.rs` parameter rename to `_state` suppresses warning but may hide dead code - `crates/gateway/src/v1/iterate.rs:93` - `The `State(state)` parameter was renamed to `State(_state)` to clear a cargo warning. However, the function body is not shown in the diff (truncated after line 93). If `_state` is ` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:93]` ⚠️ **warn** — `contractor.html` loads external Leaflet CSS/JS from unpkg without SRI or fallback - `mcp-server/contractor.html:5-6` - ``<link rel="stylesheet" href="https://unpkg.com/leaflet@1.9.4/dist/leaflet.css">` and `<script src="https://unpkg.com/leaflet@1.9.4/dist/leaflet.js"></script>` are loaded without s` - `[grounding: verified at mcp-server/contractor.html:5]` ℹ️ **info** — `contractor.html` `render()` function builds DOM with `innerHTML`-equivalent patterns via `textContent` but uses `document.createElement` for complex structures - `mcp-server/contractor.html:200-400` - `The comment at line 195 claims "No innerHTML anywhere in the script; every API-derived string passes through textContent." However, the `render()` function at line 200+ constructs ` - `[grounding: verified at mcp-server/contractor.html:200]` ⚠️ **warn** — `modes.toml` `staffing_inference.matrix_corpus` still points to `workers_500k_v8` while v9 exists - `STATE_OF_PLAY.md:101` - `The document notes `modes.toml` still says `workers_500k_v8` and that "v9 in vector index is from Apr 17 (raw-sourced, not safe-view)." This is a load-bearing assumption: the infer` - `[grounding: verified at STATE_OF_PLAY.md:101]` ⚠️ **warn** — `entity.ts` comment admits "this is NOT an investment product" but the UI presents ticker data with price/change% - `mcp-server/entity.ts:4` - `The file-level comment disclaims SEC regulation, but `contractor.html` at lines 241-260 renders stock tickers with live prices, day-change percentages, and color-coded gain/loss in` - `[grounding: verified at mcp-server/entity.ts:4]` ℹ️ **info** — `search.html` and `console.html` `img.loading='lazy'` removal may cause memory pressure on low-end devices - `STATE_OF_PLAY.md:78` - `The document states `img.loading='lazy'` was dropped because "With 11KB thumbs, eager load is cheap (~500KB for 50 cards)." However, this assumes the user always views ≤50 cards. I` - `[grounding: verified at STATE_OF_PLAY.md:78]` </details> ### Metrics ```json { "audit_duration_ms": 220733, "findings_total": 184, "findings_block": 18, "findings_warn": 36, "findings_info": 130, "claims_strong": 15, "claims_moderate": 21, "claims_weak": 0, "claims_empirical": 0, "claims_total": 36, "diff_bytes": 654013 } ``` <sub>Lakehouse auditor · SHA f4dc1b29 · re-audit on new commit flips the status automatically.</sub>
profit added 2 commits 2026-04-30 05:11:03 +00:00
Ollama Pro plan went live today (39-model fleet on the same
OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway
but not consumed. Routing every gpt-oss call site to faster /
stronger replacements:

| Site | gpt-oss → replacement | Why |
|---|---|---|
| ollama_cloud default | gpt-oss:120b → deepseek-v3.2 | newest DeepSeek revision; live-probed `pong` |
| openrouter default | openai/gpt-oss-120b:free → x-ai/grok-4.1-fast | already the scrum LADDER's PRIMARY |
| modes.toml staffing_inference | openai/gpt-oss-120b:free → kimi-k2.6 | coding-specialized, on Ollama Pro |
| modes.toml doc_drift_check | gpt-oss:120b → gemini-3-flash-preview | speed leader for factual checks |
| scrum_master_pipeline tree-split MAP+REDUCE | gpt-oss:120b → gemini-3-flash-preview | latency-dominated path (5-20× per file) |
| bot/propose.ts CLOUD_MODEL | gpt-oss:120b → deepseek-v3.2 | same Ollama key, faster |
| mcp-server/observer.ts overseer label fallback | gpt-oss:120b → claude-opus-4-7 | matches new overseer model |
| crates/gateway/src/execution_loop overseer escalation | ollama_cloud/gpt-oss:120b → opencode/claude-opus-4-7 | frontier reasoning matters here — fires only after local self-correct fails twice; Zen pay-per-token cost is bounded |

Verification:
- `cargo check -p gateway --tests` — clean
- Live probes through localhost:3100/v1/chat:
  - `opencode/claude-opus-4-7` → "pong"
  - `gemini-3-flash-preview` (ollama_cloud) → "pong"
  - `kimi-k2.6` (ollama_cloud) → "pong"
  - `deepseek-v3.2` (ollama_cloud) → "Pong! 🏓"

Notes:
- kimi-k2:1t still upstream-broken (HTTP 500 on Ollama Pro probe today,
  matches yesterday's memory). Replacement table never picks it.
- The Rust changes need a `systemctl restart lakehouse.service` to
  take effect on the running gateway. TS callers reload on next run.
- aibridge/src/context.rs still has gpt-oss:{20b,120b} in its window-
  size lookup table; harmless and kept for callers that pass it
  explicitly as an override.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
cleanup: bump qwen2.5 → qwen3.5:latest in active defaults
Some checks failed
lakehouse/auditor 16 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
8de94eba08
stronger local rung is now the small-model-pipeline tier-1 default
across both Rust legacy + Go rewrite (cf. golangLAKEHOUSE phase 1).
same JSON-clean property as qwen2.5, more capacity. ollama still
serves both side-by-side; rollback is a 4-line revert if a workload
regresses.

active-default sites:
- lakehouse.toml [ai] gen_model + rerank_model → qwen3.5:latest
- mcp-server/observer.ts diagnose call (Phase 44 /v1/chat path) → qwen3.5:latest
- mcp-server/index.ts model roster doc → qwen3.5:latest first
- crates/vectord/src/rag.rs ContinuableOpts + RagResponse.model → qwen3.5:latest

skipped: execution_loop/mod.rs comments describing historic qwen2.5
tool_call quirks — those are documentation of past behavior, not
active defaults. data/_catalog/profiles/*.json are runtime-generated
(gitignored), not in scope for tracked changes.

cargo check -p vectord: clean. no behavioral change in the audit
pipeline — same JSON-clean local model, same think=Some(false)
posture, just stronger upstream.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
profit added 1 commit 2026-04-30 05:13:20 +00:00
distillation: regenerated acceptance + audit reports (run_hash refresh)
Some checks failed
lakehouse/auditor 17 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
3d068681f5
Phase 6 acceptance + Phase 8 full-audit reports re-run; bit-for-bit
reproducibility property still holds (run 1 hash == run 2 hash),
just at a new value.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 16 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
Head SHA: 8de94eba08f0
Audited at: 2026-04-30T05:15:23.662Z

static — 2 findings (0 block, 2 warn, 0 info)

⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts

  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 38 findings (15 block, 22 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 23177ms wall-clock) (truncated 671002→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 37
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44543 chars
    ⚠️ warn — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • at commit:d475fc7f:4
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows OpenCode Zen wiring, not Ollama Cloud
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no animation or gradient changes in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no ranking or schedule rotation in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no three-layer architecture changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright or end-to-end verification in diff
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no role-pill or color styling in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no endorsed styling or page consistency in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright or console verification in diff
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no color coding changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright or verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no spec page or chapter changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no proof page verification in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no accent classes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no console or chapter changes in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no capability cards in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no contractor profile or project index in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no color coding in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no map or permit cost styling in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no ticker or price changes in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no attribution bar coloring in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no direct attribution styling in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on the public URL:"
  • at commit:ba41ad28:38
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no public URL verification in diff
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no search result styling in diff
    ⚠️ warn — cloud: claim not backed — "works on devop.live)"
  • at commit:f6a7621b:40
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no devop.live functionality in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • at commit:f6a7621b:43
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • at commit:a1066db8:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no signal wiring changes in diff
    ⚠️ warn — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • at commit:a1066db8:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no permit cost banding in diff
    ⚠️ warn — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • at commit:a1066db8:62
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no console click behavior in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • at commit:a1066db8:65
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no Turner Construction profile in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • at commit:5f0beffe:23
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright or search verification in diff
    ⚠️ warn — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • at commit:5f0beffe:26
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no Aisha or location filtering in diff
    ⚠️ warn — cloud: claim not backed — "button + green backfill list."
  • at commit:677065de:30
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no backfill UI in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • at commit:677065de:54
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright drive in diff
    ⚠️ warn — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • at commit:677065de:60
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no Marcus profile data in diff
    🛑 block — cloud: claim not backed — "Verified live:"
  • at commit:fb99e92a:24
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no live verification in diff
kb_query — 133 findings (1 block, 14 warn, 118 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ⚠️ warn — scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • reviewed_at: 2026-04-26T23:27:44.907Z
  • preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 61 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 61 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 54 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 36 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 60 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 60 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 18 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-12,pr-13
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 13 flaggings, conf=0.15): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    🛑 block — recurring audit pattern (3 distinct PRs, 5 flaggings, conf=0.60): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-12,pr-13
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-12,pr-13
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-12,pr-13
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-12,pr-13
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-12,pr-13
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-12,pr-13
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
kimi_architect — 10 findings (0 block, 6 warn, 4 info)

⚠️ warn — Silent determinism leak in face-pool seeding via djb2 hash — /mcp-server/index.ts:1234

  • Diff
  • Deterministic seeding is critical for face-pool bucketing (same worker always gets same face), but the djb2 implementation is not visible in the diff to verify correctness. A colli
    ⚠️ warn — Ethnicity classification tables missing validation — mcp-server/console.html:233-270
  • mcp-server/console.html:233-270
  • Hardcoded name-to-ethnicity lookup tables (48 South Asian names, 46 East Asian, etc.) are used for face-pool selection without any audit trail. If a name appears in multiple tables
  • [grounding: verified at mcp-server/console.html:233]
    ℹ️ info — Orphaned face-pool references without corresponding implementation — mcp-server/console.html:269
  • mcp-server/console.html:269
  • Comment indicates faces were inserted but are now removed. The manifest (data/headshots/manifest.jsonl with 1000 rows) and the /headshots/:keyroute are wired, but the HTML that
  • [grounding: verified at mcp-server/console.html:269]
    ⚠️ warn — Load-bearing assumption on name-resolution fallback order — mcp-server/console.html:228-231
  • mcp-server/console.html:228-231
  • Gender resolution falls back to a deterministic hash-based coin flip if the first name is not in FEMALE_NAMES or MALE_NAMES. This silently assigns gender to 100% of names (no "unkn
  • [grounding: verified at mcp-server/console.html:228]
    ⚠️ warn — Provider routing change from Ollama Cloud to OpenCode without backwards-compatibility gate — crates/gateway/src/execution_loop/mod.rs:593-615
  • crates/gateway/src/execution_loop/mod.rs:615
  • The escalation path (escalate_to_overseer) now routes through OpenCode (Claude Opus 4.7) instead of Ollama Cloud (gpt-oss:120b). If OPENCODE_API_KEY is missing but OLLAMA_CLOUD_K
  • [grounding: verified at crates/gateway/src/execution_loop/mod.rs:615]
    ⚠️ warn — Model default bump from qwen2.5 to qwen3.5 in three separate files without unified test — lakehouse.toml:54-57, config/modes.toml:47-50, crates/vectord/src/rag.rs:166-168
  • lakehouse.toml:54-57,
  • Three config sources (lakehouse.toml, modes.toml, rag.rs) all independently default to qwen3.5:latest. If one file is edited and qwen3.5 is not available, the others still try to u
  • [grounding: verified at lakehouse.toml:54]
    ℹ️ info — Catalog metadata updated in place without schema migration — data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json
  • data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json
  • The playbook_memory manifest went from empty columns ([]) to 5 named columns with types. If any code reads the old manifest from cache or a stale replica, it will see a schema mi
    ⚠️ warn — Deleted dataset client_workerskjkk manifest but not underlying parquet — architectural asymmetry
  • data/_catalog/manifests/564b00ae-cbf3-4efd-aa55-84cdb6d2b0b7.json
  • STATE_OF_PLAY.md lines 108-109 states the file was deleted via DELETE /catalog/datasets/by-name/client_workerskjkk, but the actual parquet file (datasets/client_workerskjkk.parqℹ️ **info** — Console.html worker-row rendering assumes non-null role and name without bounds checks —mcp-server/console.html:273-310`
  • mcp-server/console.html:309-310
  • initials = (name||'?').split(' ')…` — if name is `null` or `undefined`, it correctly falls back to `'?'`. However, if `role` is `null` and `roleBand(role)` is called, it returns
  • [grounding: verified at mcp-server/console.html:309]
    ℹ️ info — STATE_OF_PLAY.md vision statement is aspirational but not version-gated — architectural scope drift risk
  • STATE_OF_PLAY.md
  • The vision describes "workers download an app → geolocation clock-in" and "Find people getting certificates (passive cert tracking)" — features not wired in this PR. The document u

Metrics

{
  "audit_duration_ms": 168272,
  "findings_total": 184,
  "findings_block": 16,
  "findings_warn": 44,
  "findings_info": 124,
  "claims_strong": 15,
  "claims_moderate": 22,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 37,
  "diff_bytes": 671002
}

Lakehouse auditor · SHA 8de94eba · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 16 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" **Head SHA:** `8de94eba08f0` **Audited at:** 2026-04-30T05:15:23.662Z <details><summary><b>static</b> — 2 findings (0 block, 2 warn, 0 info)</summary> ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 38 findings (15 block, 22 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 23177ms wall-clock) (truncated 671002→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 37` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44543 chars` ⚠️ **warn** — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `at commit:d475fc7f:4` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows OpenCode Zen wiring, not Ollama Cloud` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no animation or gradient changes in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no ranking or schedule rotation in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no three-layer architecture changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright or end-to-end verification in diff` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no role-pill or color styling in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no endorsed styling or page consistency in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright or console verification in diff` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no color coding changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright or verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no spec page or chapter changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no proof page verification in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no accent classes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no console or chapter changes in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no capability cards in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no contractor profile or project index in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no color coding in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no map or permit cost styling in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no ticker or price changes in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no attribution bar coloring in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no direct attribution styling in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on the public URL:" - `at commit:ba41ad28:38` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no public URL verification in diff` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no search result styling in diff` ⚠️ **warn** — cloud: claim not backed — "works on devop.live)" - `at commit:f6a7621b:40` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no devop.live functionality in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `at commit:f6a7621b:43` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `at commit:a1066db8:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no signal wiring changes in diff` ⚠️ **warn** — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `at commit:a1066db8:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no permit cost banding in diff` ⚠️ **warn** — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `at commit:a1066db8:62` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no console click behavior in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `at commit:a1066db8:65` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no Turner Construction profile in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `at commit:5f0beffe:23` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright or search verification in diff` ⚠️ **warn** — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `at commit:5f0beffe:26` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no Aisha or location filtering in diff` ⚠️ **warn** — cloud: claim not backed — "button + green backfill list." - `at commit:677065de:30` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no backfill UI in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `at commit:677065de:54` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright drive in diff` ⚠️ **warn** — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `at commit:677065de:60` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no Marcus profile data in diff` 🛑 **block** — cloud: claim not backed — "Verified live:" - `at commit:fb99e92a:24` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no live verification in diff` </details> <details><summary><b>kb_query</b> — 133 findings (1 block, 14 warn, 118 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ⚠️ **warn** — scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `reviewed_at: 2026-04-26T23:27:44.907Z` - `preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 61 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 61 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 54 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 36 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 60 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 60 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 18 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-12,pr-13` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 13 flaggings, conf=0.15): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` 🛑 **block** — recurring audit pattern (3 distinct PRs, 5 flaggings, conf=0.60): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-12,pr-13` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-12,pr-13` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-12,pr-13` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-12,pr-13` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-12,pr-13` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-12,pr-13` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` </details> <details><summary><b>kimi_architect</b> — 10 findings (0 block, 6 warn, 4 info)</summary> ⚠️ **warn** — Silent determinism leak in face-pool seeding via djb2 hash — `/mcp-server/index.ts:1234` - `Diff` - `Deterministic seeding is critical for face-pool bucketing (same worker always gets same face), but the djb2 implementation is not visible in the diff to verify correctness. A colli` ⚠️ **warn** — Ethnicity classification tables missing validation — `mcp-server/console.html:233-270` - `mcp-server/console.html:233-270` - `Hardcoded name-to-ethnicity lookup tables (48 South Asian names, 46 East Asian, etc.) are used for face-pool selection without any audit trail. If a name appears in multiple tables` - `[grounding: verified at mcp-server/console.html:233]` ℹ️ **info** — Orphaned face-pool references without corresponding implementation — `mcp-server/console.html:269` - `mcp-server/console.html:269` - `Comment indicates faces were inserted but are now removed. The manifest (data/headshots/manifest.jsonl with 1000 rows) and the `/headshots/:key` route are wired, but the HTML that ` - `[grounding: verified at mcp-server/console.html:269]` ⚠️ **warn** — Load-bearing assumption on name-resolution fallback order — `mcp-server/console.html:228-231` - `mcp-server/console.html:228-231` - `Gender resolution falls back to a deterministic hash-based coin flip if the first name is not in FEMALE_NAMES or MALE_NAMES. This silently assigns gender to 100% of names (no "unkn` - `[grounding: verified at mcp-server/console.html:228]` ⚠️ **warn** — Provider routing change from Ollama Cloud to OpenCode without backwards-compatibility gate — `crates/gateway/src/execution_loop/mod.rs:593-615` - `crates/gateway/src/execution_loop/mod.rs:615` - `The escalation path (`escalate_to_overseer`) now routes through OpenCode (Claude Opus 4.7) instead of Ollama Cloud (gpt-oss:120b). If OPENCODE_API_KEY is missing but OLLAMA_CLOUD_K` - `[grounding: verified at crates/gateway/src/execution_loop/mod.rs:615]` ⚠️ **warn** — Model default bump from qwen2.5 to qwen3.5 in three separate files without unified test — `lakehouse.toml:54-57`, `config/modes.toml:47-50`, `crates/vectord/src/rag.rs:166-168` - `lakehouse.toml:54-57,` - `Three config sources (lakehouse.toml, modes.toml, rag.rs) all independently default to qwen3.5:latest. If one file is edited and qwen3.5 is not available, the others still try to u` - `[grounding: verified at lakehouse.toml:54]` ℹ️ **info** — Catalog metadata updated in place without schema migration — `data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json` - `data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json` - `The playbook_memory manifest went from empty columns (`[]`) to 5 named columns with types. If any code reads the old manifest from cache or a stale replica, it will see a schema mi` ⚠️ **warn** — Deleted dataset `client_workerskjkk` manifest but not underlying parquet — architectural asymmetry - `data/_catalog/manifests/564b00ae-cbf3-4efd-aa55-84cdb6d2b0b7.json` - `STATE_OF_PLAY.md lines 108-109 states the file was deleted via `DELETE /catalog/datasets/by-name/client_workerskjkk`, but the actual parquet file (`datasets/client_workerskjkk.parq` ℹ️ **info** — Console.html worker-row rendering assumes non-null role and name without bounds checks — `mcp-server/console.html:273-310` - `mcp-server/console.html:309-310` - ``initials = (name||'?').split(' ')…` — if name is `null` or `undefined`, it correctly falls back to `'?'`. However, if `role` is `null` and `roleBand(role)` is called, it returns `` - `[grounding: verified at mcp-server/console.html:309]` ℹ️ **info** — STATE_OF_PLAY.md vision statement is aspirational but not version-gated — architectural scope drift risk - `STATE_OF_PLAY.md` - `The vision describes "workers download an app → geolocation clock-in" and "Find people getting certificates (passive cert tracking)" — features not wired in this PR. The document u` </details> ### Metrics ```json { "audit_duration_ms": 168272, "findings_total": 184, "findings_block": 16, "findings_warn": 44, "findings_info": 124, "claims_strong": 15, "claims_moderate": 22, "claims_weak": 0, "claims_empirical": 0, "claims_total": 37, "diff_bytes": 671002 } ``` <sub>Lakehouse auditor · SHA 8de94eba · re-audit on new commit flips the status automatically.</sub>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 17 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
Head SHA: 3d068681f59a
Audited at: 2026-04-30T05:19:47.929Z

static — 2 findings (0 block, 2 warn, 0 info)

⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts

  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 38 findings (15 block, 22 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 16508ms wall-clock) (truncated 676043→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 37
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44543 chars
    ⚠️ warn — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • at commit:d475fc7f:4
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows OpenCode Zen wiring, not Ollama Cloud
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no animation or gradient changes in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no ranking or schedule rotation in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no three-layer architecture in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright or end-to-end verification in diff
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no role-pill or color styling in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no endorsed styling or page consistency in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no console playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no color coding changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no spec page or chapter verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no proof page verification in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no accent classes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no console chapter verification in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no capability cards in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no contractor profile wiring in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no color coding in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no map tile or permit cost changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no ticker or price changes in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no attribution bar coloring in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no contractor attribution logic in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on the public URL:"
  • at commit:ba41ad28:38
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no public URL verification in diff
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no search functionality in diff
    ⚠️ warn — cloud: claim not backed — "works on devop.live)"
  • at commit:f6a7621b:40
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no devop.live verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • at commit:f6a7621b:43
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • at commit:a1066db8:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no signal wiring changes in diff
    ⚠️ warn — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • at commit:a1066db8:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no permit cost coloring in diff
    ⚠️ warn — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • at commit:a1066db8:62
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no console click behavior in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • at commit:a1066db8:65
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no Turner Construction profile in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • at commit:5f0beffe:23
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no forklift operator search in diff
    ⚠️ warn — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • at commit:5f0beffe:26
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no name-based filtering in diff
    ⚠️ warn — cloud: claim not backed — "button + green backfill list."
  • at commit:677065de:30
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no backfill UI in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • at commit:677065de:54
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no playwright drive in diff
    ⚠️ warn — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • at commit:677065de:60
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no profile listing in diff
    🛑 block — cloud: claim not backed — "Verified live:"
  • at commit:fb99e92a:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: no live verification details in diff
kb_query — 168 findings (0 block, 15 warn, 153 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ⚠️ warn — scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • reviewed_at: 2026-04-26T23:27:44.907Z
  • preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 35 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 57 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 57 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 57 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 57 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 52 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 19 flaggings, conf=0.16): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 14 flaggings, conf=0.14): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (2 distinct PRs, 2 flaggings, conf=1.00): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (2 distinct PRs, 2 flaggings, conf=1.00): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ℹ️ info — recurring audit pattern (2 distinct PRs, 2 flaggings, conf=1.00): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 9 findings (2 block, 6 warn, 1 info)

🛑 block — Unescaped innerHTML injection in contractor profile renderer

  • mcp-server/contractor.html:1
  • The diff is truncated at the critical render()function, but the visible pattern shows raw DOM construction with.textContent used for some fields while the truncated section c
  • [grounding: verified at mcp-server/contractor.html:1]
    ⚠️ warn — Race condition in face-pool deterministic seeding
  • mcp-server/index.ts:1234
  • The djb2-style hashfor per-worker seed derivation is described as deterministic, but theserve_imagegen.py:32fix only addedseedto_cache_key() — the seed itself is stil
  • [grounding: verified at mcp-server/index.ts:1234]
    ⚠️ warn — Schema drift in catalog manifest update
  • data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14-50
  • The manifest gained 5 typed columns (timestamp, operation, approach, result, context) and row_count: 2077, but the schema_fingerprint field was NOT updated in the vis
  • [grounding: verified at data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14]
    ⚠️ warn — Silent failure in loadChapter6 staffer roster
  • mcp-server/console.html:484-530
  • The apiGet('/staffers')promise chain has a.catch()that renders an error, but the success path does not validate thatr.staffers elements contain required fields (name`, ``
  • [grounding: verified at mcp-server/console.html:484]
    ⚠️ warn — Hardcoded API endpoint assumptions in contractor profile
  • mcp-server/contractor.html:1
  • The fetchusesP+'/intelligence/contractor_profile'wherePis derived fromlocation.pathname.indexOf('/lakehouse')>=0. This breaks if the deployment moves to a subdomain o
  • [grounding: verified at mcp-server/contractor.html:1]
    🛑 block — Missing opencode_key field in gateway state struct
  • crates/gateway/src/execution_loop/mod.rs:596-598
  • The code now reads self.state.opencode_key.clone()but the diff does not show a corresponding addition to theV1Statestruct definition. Ifopencode_keydoes not exist onV1`
  • [grounding: verified at crates/gateway/src/execution_loop/mod.rs:596]
    ⚠️ warn — Model string mismatch in RAG layer
  • crates/vectord/src/rag.rs:166-180
  • ``ContinuableOpts::new("qwen3.5:latest")is constructed but the returnedRagResponsehardcodesmodel: "qwen3.5:latest".to_string(). The comment admits this "echoes whatever Oll
  • [grounding: verified at crates/vectord/src/rag.rs:166]
    ⚠️ warn — Determinism leak in face-pool gender/ethnicity classification
  • mcp-server/console.html:216-280
  • The NAMES_sets andSURNAMES_ sets are hardcoded JavaScript arrays loaded into global scope. These contain culturally-specific name mappings that are not versioned or sourced
  • [grounding: verified at mcp-server/console.html:216]
    ℹ️ info — Truncated diff contains unverified DOM construction
  • mcp-server/contractor.html
  • The original diff was 676043 chars and truncated during the render()function. The visible portion shows rawdocument.createElementand.appendChild chains for federal contra

Metrics

{
  "audit_duration_ms": 170565,
  "findings_total": 218,
  "findings_block": 17,
  "findings_warn": 45,
  "findings_info": 156,
  "claims_strong": 15,
  "claims_moderate": 22,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 37,
  "diff_bytes": 676043
}

Lakehouse auditor · SHA 3d068681 · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 17 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" **Head SHA:** `3d068681f59a` **Audited at:** 2026-04-30T05:19:47.929Z <details><summary><b>static</b> — 2 findings (0 block, 2 warn, 0 info)</summary> ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 38 findings (15 block, 22 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 16508ms wall-clock) (truncated 676043→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 37` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44543 chars` ⚠️ **warn** — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `at commit:d475fc7f:4` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows OpenCode Zen wiring, not Ollama Cloud` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no animation or gradient changes in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no ranking or schedule rotation in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no three-layer architecture in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright or end-to-end verification in diff` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no role-pill or color styling in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no endorsed styling or page consistency in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no console playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no color coding changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no spec page or chapter verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no proof page verification in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no accent classes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no console chapter verification in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no capability cards in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no contractor profile wiring in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no color coding in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no map tile or permit cost changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no ticker or price changes in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no attribution bar coloring in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no contractor attribution logic in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on the public URL:" - `at commit:ba41ad28:38` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no public URL verification in diff` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no search functionality in diff` ⚠️ **warn** — cloud: claim not backed — "works on devop.live)" - `at commit:f6a7621b:40` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no devop.live verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `at commit:f6a7621b:43` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `at commit:a1066db8:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no signal wiring changes in diff` ⚠️ **warn** — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `at commit:a1066db8:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no permit cost coloring in diff` ⚠️ **warn** — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `at commit:a1066db8:62` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no console click behavior in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `at commit:a1066db8:65` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no Turner Construction profile in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `at commit:5f0beffe:23` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no forklift operator search in diff` ⚠️ **warn** — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `at commit:5f0beffe:26` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no name-based filtering in diff` ⚠️ **warn** — cloud: claim not backed — "button + green backfill list." - `at commit:677065de:30` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no backfill UI in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `at commit:677065de:54` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no playwright drive in diff` ⚠️ **warn** — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `at commit:677065de:60` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no profile listing in diff` 🛑 **block** — cloud: claim not backed — "Verified live:" - `at commit:fb99e92a:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: no live verification details in diff` </details> <details><summary><b>kb_query</b> — 168 findings (0 block, 15 warn, 153 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ⚠️ **warn** — scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `reviewed_at: 2026-04-26T23:27:44.907Z` - `preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 35 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 57 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 57 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 57 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 57 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 52 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 19 flaggings, conf=0.16): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 14 flaggings, conf=0.14): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 2 flaggings, conf=1.00): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 2 flaggings, conf=1.00): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 2 flaggings, conf=1.00): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 9 findings (2 block, 6 warn, 1 info)</summary> 🛑 **block** — Unescaped innerHTML injection in contractor profile renderer - `mcp-server/contractor.html:1` - `The diff is truncated at the critical `render()` function, but the visible pattern shows raw DOM construction with `.textContent` used for some fields while the truncated section c` - `[grounding: verified at mcp-server/contractor.html:1]` ⚠️ **warn** — Race condition in face-pool deterministic seeding - `mcp-server/index.ts:1234` - `The `djb2-style hash` for per-worker seed derivation is described as deterministic, but the `serve_imagegen.py:32` fix only added `seed` to `_cache_key()` — the seed itself is stil` - `[grounding: verified at mcp-server/index.ts:1234]` ⚠️ **warn** — Schema drift in catalog manifest update - `data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14-50` - `The manifest gained 5 typed columns (`timestamp`, `operation`, `approach`, `result`, `context`) and `row_count: 2077`, but the `schema_fingerprint` field was NOT updated in the vis` - `[grounding: verified at data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14]` ⚠️ **warn** — Silent failure in `loadChapter6` staffer roster - `mcp-server/console.html:484-530` - `The `apiGet('/staffers')` promise chain has a `.catch()` that renders an error, but the success path does not validate that `r.staffers` elements contain required fields (`name`, `` - `[grounding: verified at mcp-server/console.html:484]` ⚠️ **warn** — Hardcoded API endpoint assumptions in contractor profile - `mcp-server/contractor.html:1` - `The `fetch` uses `P+'/intelligence/contractor_profile'` where `P` is derived from `location.pathname.indexOf('/lakehouse')>=0`. This breaks if the deployment moves to a subdomain o` - `[grounding: verified at mcp-server/contractor.html:1]` 🛑 **block** — Missing `opencode_key` field in gateway state struct - `crates/gateway/src/execution_loop/mod.rs:596-598` - `The code now reads `self.state.opencode_key.clone()` but the diff does not show a corresponding addition to the `V1State` struct definition. If `opencode_key` does not exist on `V1` - `[grounding: verified at crates/gateway/src/execution_loop/mod.rs:596]` ⚠️ **warn** — Model string mismatch in RAG layer - `crates/vectord/src/rag.rs:166-180` - ``ContinuableOpts::new("qwen3.5:latest")` is constructed but the returned `RagResponse` hardcodes `model: "qwen3.5:latest".to_string()`. The comment admits this "echoes whatever Oll` - `[grounding: verified at crates/vectord/src/rag.rs:166]` ⚠️ **warn** — Determinism leak in face-pool gender/ethnicity classification - `mcp-server/console.html:216-280` - `The `NAMES_*` sets and `SURNAMES_*` sets are hardcoded JavaScript arrays loaded into global scope. These contain culturally-specific name mappings that are not versioned or sourced` - `[grounding: verified at mcp-server/console.html:216]` ℹ️ **info** — Truncated diff contains unverified DOM construction - `mcp-server/contractor.html` - `The original diff was 676043 chars and truncated during the `render()` function. The visible portion shows raw `document.createElement` and `.appendChild` chains for federal contra` </details> ### Metrics ```json { "audit_duration_ms": 170565, "findings_total": 218, "findings_block": 17, "findings_warn": 45, "findings_info": 156, "claims_strong": 15, "claims_moderate": 22, "claims_weak": 0, "claims_empirical": 0, "claims_total": 37, "diff_bytes": 676043 } ``` <sub>Lakehouse auditor · SHA 3d068681 · re-audit on new commit flips the status automatically.</sub>
profit added 2 commits 2026-05-01 09:52:41 +00:00
Adds an opt-in pass-through that routes Bun mcp-server requests
to the Go gateway when GO_LAKEHOUSE_URL is set. /_go/v1/embed,
/_go/v1/matrix/search etc. flow through Bun frontend → Go
backend without touching any existing tool. Off-by-default
(empty GO_LAKEHOUSE_URL → 503 with rationale); enabled via
systemd drop-in at:
  /etc/systemd/system/lakehouse-agent.service.d/go-cutover.conf

This is the first slice of real Bun-fronted traffic hitting the
Go substrate. The /api/* pass-through (Rust gateway) and every
existing tool are unmodified — fully additive cutover step.

Reversible: unset GO_LAKEHOUSE_URL or remove the systemd drop-in
and restart lakehouse-agent.service.

Verified end-to-end against persistent Go stack on :4110:
  /_go/health → {"status":"ok","service":"gateway"}
  /_go/v1/embed → nomic-embed-text-v2-moe vectors (dim=768)
  /_go/v1/matrix/search → 3/3 Forklift Operators (role+geo match)

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 20 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
Head SHA: 150cc3b6814b
Audited at: 2026-05-01T09:56:30.078Z

static — 2 findings (0 block, 2 warn, 0 info)

⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts

  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 39 findings (16 block, 22 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 19768ms wall-clock) (truncated 687721→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 38
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44662 chars
    🛑 block — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • at commit:9eed982f:18
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Go stack or :4110 mentioned in diff
    ⚠️ warn — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • at commit:d475fc7f:4
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No OpenCode Zen wiring in gateway code
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No UI gradient animation in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ranking or schedule rotation in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No three-layer architecture in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No role-pill styling in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No endorsed styling in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No spec page verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No proof page verification in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No accent classes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console verification in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No capability cards in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No contractor profile wiring in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No map tile layer in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ticker UI in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No attribution bar in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No direct attribution in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on the public URL:"
  • at commit:ba41ad28:38
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No public URL verification in diff
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No search functionality in diff
    ⚠️ warn — cloud: claim not backed — "works on devop.live)"
  • at commit:f6a7621b:40
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No devop.live verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • at commit:f6a7621b:43
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • at commit:a1066db8:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No signal wiring in diff
    ⚠️ warn — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • at commit:a1066db8:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No cost color coding in diff
    ⚠️ warn — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • at commit:a1066db8:62
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console click handling in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • at commit:a1066db8:65
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Turner Construction profile in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • at commit:5f0beffe:23
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No forklift search verification in diff
    ⚠️ warn — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • at commit:5f0beffe:26
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Aisha or WI filtering in diff
    ⚠️ warn — cloud: claim not backed — "button + green backfill list."
  • at commit:677065de:30
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No backfill UI in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • at commit:677065de:54
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright drive in diff
    ⚠️ warn — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • at commit:677065de:60
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Marcus profiles in diff
    🛑 block — cloud: claim not backed — "Verified live:"
  • at commit:fb99e92a:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No live verification in diff
kb_query — 169 findings (0 block, 50 warn, 119 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ⚠️ warn — scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • reviewed_at: 2026-04-26T23:27:44.907Z
  • preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 53 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 53 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 52 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 52 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 52 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 33 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 20 flaggings, conf=0.15): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 15 flaggings, conf=0.13): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 10 findings (4 block, 3 warn, 3 info)

🛑 block — Unchecked arc.load() in embed cache hits — potential panic on poisoned mutex

  • crates/aibridge/src/client.rs:227
  • cache.lock().map_err(...)` on line 227 swallows the poison error, but lines 220-234 assume the lock succeeds. If a thread panics while holding the cache lock, subsequent `.lock()
  • [grounding: verified at crates/aibridge/src/client.rs:227]
    ⚠️ warn — Determinism leak via AtomicU64 ordering — cache statistics are eventually consistent, not deterministic
  • crates/aibridge/src/client.rs:37-39
  • ``embed_cache_hits/missesuseOrdering::Relaxed, which means two concurrent threads can observe hit/miss counts in any order relative to the actual cache operations. For reproduc
  • [grounding: verified at crates/aibridge/src/client.rs:37]
    🛑 block — Silent schema bypass in catalog manifest — columns field populated retroactively without validation
  • data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14-55
  • The manifest was updated from empty columns: [] to a populated schema on 2026-04-28, but there is no corresponding schema-validation gate or audit trail showing where these colum
  • [grounding: verified at data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14]
    🛑 block — Provider migration without adapter verification — overseer now routes to OpenCode but Anthropic chat response shape differs
  • crates/gateway/src/execution_loop/mod.rs:593-614
  • The overseer was migrated from ollama_cloud(gpt-oss:120b) toopencode(claude-opus-4-7) at line 612, but the code at line 613 still calls.expect()onresp.choices.into_ite`
  • [grounding: verified at crates/gateway/src/execution_loop/mod.rs:593]
    ⚠️ warn — Face pool manifest excludes minors but server doesn't enforce it — potential minors in /headshots/:key responses
  • data/headshots/manifest.jsonl
  • The manifest marks 48 faces with "excluded": "minor"(e.g., lines 8, 15, 16, 70, etc.), but there is no code in the diff showing the/headshots/:key route filtering them out. T
    ⚠️ warn — Hardcoded gender/ethnicity lookup tables assume Western name patterns — will misclassify many non-ASCII names
  • mcp-server/console.html:224-256
  • The gender/ethnicity tables are ASCII-only (no diacritics, no CJK, no Arabic vowels). Lines like var clean=n.replace(/[^A-Za-z]/g,'') (line 251) strip all non-ASCII characters, s
  • [grounding: verified at mcp-server/console.html:224]
    ℹ️ info — STATE_OF_PLAY contradicts itself on model versions — claim that v9 is "not safe" but config still references v8
  • STATE_OF_PLAY.md:73
  • STATE_OF_PLAY.md line 73 says "v9 in vector index is from Apr 17 (raw-sourced, not safe-view). The new build_workers_v9.shrebuilds fromworkers_safe" BUT config/modes.toml:47
  • [grounding: verified at STATE_OF_PLAY.md:73]
    ℹ️ info — LRU cache eviction silent on full — no metrics when items are evicted
  • crates/aibridge/src/client.rs:174-176
  • The LruCache::new() is created with a capacity bound (line 174), but there is no instrumentation when the cache reaches capacity and evicts old entries. For a 4096-entry cache at
  • [grounding: verified at crates/aibridge/src/client.rs:174]
    🛑 block — Contractor.html partially truncated in diff — critical profile page is incomplete
  • mcp-server/contractor.html
  • diff-truncated, can't verify — The contractor profile page is cited in STATE_OF_PLAY.md as a navigation target ("P2 — Contractor-name click → /contractor profile page") and the H
    ℹ️ info — Console.html adds 11 new name lookup tables but no update mechanism — stale data risk
  • mcp-server/console.html:229-256
  • The gender/ethnicity tables are hardcoded in the HTML and shipped as a static file. If the synthetic face-pool data is regenerated with different demographic distributions, the fro
  • [grounding: verified at mcp-server/console.html:229]

Metrics

{
  "audit_duration_ms": 166161,
  "findings_total": 221,
  "findings_block": 20,
  "findings_warn": 77,
  "findings_info": 124,
  "claims_strong": 16,
  "claims_moderate": 22,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 38,
  "diff_bytes": 687721
}

Lakehouse auditor · SHA 150cc3b6 · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 20 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" **Head SHA:** `150cc3b6814b` **Audited at:** 2026-05-01T09:56:30.078Z <details><summary><b>static</b> — 2 findings (0 block, 2 warn, 0 info)</summary> ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 39 findings (16 block, 22 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 19768ms wall-clock) (truncated 687721→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 38` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44662 chars` 🛑 **block** — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `at commit:9eed982f:18` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Go stack or :4110 mentioned in diff` ⚠️ **warn** — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `at commit:d475fc7f:4` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No OpenCode Zen wiring in gateway code` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No UI gradient animation in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ranking or schedule rotation in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No three-layer architecture in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No role-pill styling in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No endorsed styling in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No spec page verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No proof page verification in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No accent classes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console verification in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No capability cards in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No contractor profile wiring in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No map tile layer in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ticker UI in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No attribution bar in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No direct attribution in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on the public URL:" - `at commit:ba41ad28:38` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No public URL verification in diff` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No search functionality in diff` ⚠️ **warn** — cloud: claim not backed — "works on devop.live)" - `at commit:f6a7621b:40` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No devop.live verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `at commit:f6a7621b:43` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `at commit:a1066db8:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No signal wiring in diff` ⚠️ **warn** — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `at commit:a1066db8:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No cost color coding in diff` ⚠️ **warn** — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `at commit:a1066db8:62` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console click handling in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `at commit:a1066db8:65` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Turner Construction profile in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `at commit:5f0beffe:23` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No forklift search verification in diff` ⚠️ **warn** — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `at commit:5f0beffe:26` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Aisha or WI filtering in diff` ⚠️ **warn** — cloud: claim not backed — "button + green backfill list." - `at commit:677065de:30` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No backfill UI in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `at commit:677065de:54` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright drive in diff` ⚠️ **warn** — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `at commit:677065de:60` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Marcus profiles in diff` 🛑 **block** — cloud: claim not backed — "Verified live:" - `at commit:fb99e92a:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No live verification in diff` </details> <details><summary><b>kb_query</b> — 169 findings (0 block, 50 warn, 119 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ⚠️ **warn** — scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `reviewed_at: 2026-04-26T23:27:44.907Z` - `preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 53 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 53 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 52 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 52 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 52 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 33 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 17 flaggings, conf=0.06): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 20 flaggings, conf=0.15): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 15 flaggings, conf=0.13): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 10 findings (4 block, 3 warn, 3 info)</summary> 🛑 **block** — Unchecked arc.load() in embed cache hits — potential panic on poisoned mutex - `crates/aibridge/src/client.rs:227` - ``cache.lock().map_err(...)` on line 227 swallows the poison error, but lines 220-234 assume the lock succeeds. If a thread panics while holding the cache lock, subsequent `.lock()`` - `[grounding: verified at crates/aibridge/src/client.rs:227]` ⚠️ **warn** — Determinism leak via AtomicU64 ordering — cache statistics are eventually consistent, not deterministic - `crates/aibridge/src/client.rs:37-39` - ``embed_cache_hits/misses` use `Ordering::Relaxed`, which means two concurrent threads can observe hit/miss counts in any order relative to the actual cache operations. For reproduc` - `[grounding: verified at crates/aibridge/src/client.rs:37]` 🛑 **block** — Silent schema bypass in catalog manifest — `columns` field populated retroactively without validation - `data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14-55` - `The manifest was updated from empty `columns: []` to a populated schema on 2026-04-28, but there is no corresponding schema-validation gate or audit trail showing where these colum` - `[grounding: verified at data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14]` 🛑 **block** — Provider migration without adapter verification — overseer now routes to OpenCode but Anthropic chat response shape differs - `crates/gateway/src/execution_loop/mod.rs:593-614` - `The overseer was migrated from `ollama_cloud` (gpt-oss:120b) to `opencode` (claude-opus-4-7) at line 612, but the code at line 613 still calls `.expect()` on `resp.choices.into_ite` - `[grounding: verified at crates/gateway/src/execution_loop/mod.rs:593]` ⚠️ **warn** — Face pool manifest excludes minors but server doesn't enforce it — potential minors in /headshots/:key responses - `data/headshots/manifest.jsonl` - `The manifest marks 48 faces with `"excluded": "minor"` (e.g., lines 8, 15, 16, 70, etc.), but there is no code in the diff showing the `/headshots/:key` route filtering them out. T` ⚠️ **warn** — Hardcoded gender/ethnicity lookup tables assume Western name patterns — will misclassify many non-ASCII names - `mcp-server/console.html:224-256` - `The gender/ethnicity tables are ASCII-only (no diacritics, no CJK, no Arabic vowels). Lines like `var clean=n.replace(/[^A-Za-z]/g,'')` (line 251) strip all non-ASCII characters, s` - `[grounding: verified at mcp-server/console.html:224]` ℹ️ **info** — STATE_OF_PLAY contradicts itself on model versions — claim that v9 is "not safe" but config still references v8 - `STATE_OF_PLAY.md:73` - `STATE_OF_PLAY.md line 73 says "v9 in vector index is from Apr 17 (raw-sourced, not safe-view). The new `build_workers_v9.sh` rebuilds from `workers_safe`" BUT config/modes.toml:47 ` - `[grounding: verified at STATE_OF_PLAY.md:73]` ℹ️ **info** — LRU cache eviction silent on full — no metrics when items are evicted - `crates/aibridge/src/client.rs:174-176` - `The `LruCache::new()` is created with a capacity bound (line 174), but there is no instrumentation when the cache reaches capacity and evicts old entries. For a 4096-entry cache at` - `[grounding: verified at crates/aibridge/src/client.rs:174]` 🛑 **block** — Contractor.html partially truncated in diff — critical profile page is incomplete - `mcp-server/contractor.html` - `diff-truncated, can't verify — The contractor profile page is cited in STATE_OF_PLAY.md as a navigation target ("P2 — Contractor-name click → `/contractor` profile page") and the H` ℹ️ **info** — Console.html adds 11 new name lookup tables but no update mechanism — stale data risk - `mcp-server/console.html:229-256` - `The gender/ethnicity tables are hardcoded in the HTML and shipped as a static file. If the synthetic face-pool data is regenerated with different demographic distributions, the fro` - `[grounding: verified at mcp-server/console.html:229]` </details> ### Metrics ```json { "audit_duration_ms": 166161, "findings_total": 221, "findings_block": 20, "findings_warn": 77, "findings_info": 124, "claims_strong": 16, "claims_moderate": 22, "claims_weak": 0, "claims_empirical": 0, "claims_total": 38, "diff_bytes": 687721 } ``` <sub>Lakehouse auditor · SHA 150cc3b6 · re-audit on new commit flips the status automatically.</sub>
profit added 1 commit 2026-05-01 09:57:13 +00:00
docs: pointer to ARCHITECTURE_COMPARISON.md source in golangLAKEHOUSE
Some checks failed
lakehouse/auditor 18 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
c5654d417c
Per J's request: the parallel-runtime comparison is a living source
file maintained at /home/profit/golangLAKEHOUSE/docs/ARCHITECTURE_COMPARISON.md.
This file is a pointer reachable from the Rust repo's docs/ so the
comparison is discoverable from either side.

Doesn't contain authoritative content — just the link + a quick
status summary + update guidance ('source lives in golangLAKEHOUSE,
don't drift two copies').
Author
Owner

Auditor verdict: 🛑 block

One-liner: 18 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
Head SHA: c5654d417c36
Audited at: 2026-05-01T10:00:51.146Z

static — 2 findings (0 block, 2 warn, 0 info)

⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts

  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 39 findings (16 block, 22 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 15035ms wall-clock) (truncated 689893→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 38
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44662 chars
    🛑 block — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • at commit:9eed982f:18
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Go stack or :4110 mentioned in diff
    ⚠️ warn — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • at commit:d475fc7f:4
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No OpenCode Zen wiring in diff
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No UI animation or gradient changes in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ranking or schedule rotation logic in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No three-layer architecture changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright/end-to-end verification in diff
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No UI color/style changes in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No endorsed styling changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color scheme changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /spec endpoint changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /proof endpoint changes in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No CSS accent classes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console chapter changes in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No capability cards in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No contractor profile wiring in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color-coding changes in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No map tile/color changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /profiler endpoint in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ticker/price changes in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No attribution bar changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /profiler endpoint in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No DIRECT attribution logic in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on the public URL:"
  • at commit:ba41ad28:38
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No public URL verification in diff
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No search result styling in diff
    ⚠️ warn — cloud: claim not backed — "works on devop.live)"
  • at commit:f6a7621b:40
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No devop.live specific changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • at commit:f6a7621b:43
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • at commit:a1066db8:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No signal wiring changes in diff
    ⚠️ warn — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • at commit:a1066db8:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No permit cost coloring in diff
    ⚠️ warn — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • at commit:a1066db8:62
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console click handling in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • at commit:a1066db8:65
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Turner Construction profile in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • at commit:5f0beffe:23
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No forklift operator search in diff
    ⚠️ warn — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • at commit:5f0beffe:26
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Aisha/WI filtering in diff
    ⚠️ warn — cloud: claim not backed — "button + green backfill list."
  • at commit:677065de:30
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No backfill UI in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • at commit:677065de:54
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright drive in diff
    ⚠️ warn — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • at commit:677065de:60
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Marcus profile data in diff
    🛑 block — cloud: claim not backed — "Verified live:"
  • at commit:fb99e92a:24
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No live verification in diff
kb_query — 170 findings (0 block, 20 warn, 150 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ⚠️ warn — scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • reviewed_at: 2026-04-26T23:27:44.907Z
  • preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 46 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 46 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 46 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 50 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 31 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 45 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 21 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 16 flaggings, conf=0.13): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 4 flaggings, conf=0.50): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 4 flaggings, conf=0.50): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 4 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=1032d1a48899bdd4
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 10 findings (2 block, 5 warn, 3 info)

🛑 block — Overseer escalation references non-existent opencode_key field on state

  • crates/gateway/src/execution_loop/mod.rs:596
  • The code reads self.state.opencode_key.clone()but the diff shows no corresponding addition ofopencode_keyto theV1State or execution state struct. If the field doesn't exi
  • [grounding: file not found]
    ⚠️ warncached_dim atomic is never read with Acquire/SeqCst, allowing torn reads on cache-hit fast path
  • crates/aibridge/src/client.rs:175
  • ``cached_dim.load(Ordering::Relaxed)on line 175 races with thestore on line 219. On weakly-ordered architectures (ARM, which is likely the deployment target given the "Go side"
  • [grounding: file not found]
    ⚠️ warnworkerRow helper silently drops endorsed chip when playbook_boost is exactly 0
  • mcp-server/console.html:523
  • The endorsedvariable is computed with(cand.playbook_boost||0) > 0, but the condition in workerRowchecksif(opts.endorsed)— JavaScript falsy values include0, empty st
  • [grounding: file not found]
    ⚠️ warn — Face-pool cache key omits race and age, collapsing distinct worker demographics to same image
  • mcp-server/index.ts:1308
  • The STATE_OF_PLAY describes "gender×race×age intersection bucketing with graceful fallback" but the diff-truncated mcp-server/index.tsis not shown. If the cache key only hashes
  • [grounding: file not found]
    ℹ️ infoEmbedCacheKey uses String for model, causing unnecessary heap allocation on every cache probe
  • crates/aibridge/src/client.rs:32
  • The modelfield inEmbedCacheKeyis aString, but in the embed()hot path themodel_keyis cloned fromreq.model.clone().unwrap_or_default()on every call. Since model
  • [grounding: file not found]
    ⚠️ warnqwen3.5:latest model string in rag.rs does not match lakehouse.toml comment claiming "Ollama still serves both"
  • crates/vectord/src/rag.rs:166
  • The code hardcodes qwen3.5:latestbut thelakehouse.tomlcomment says "Ollama still serves both — bump back in this file if a workload regressed." However,rag.rs has no fall
  • [grounding: file not found]
    🛑 blockclient_workerskjkk manifest deletion is a schema bypass — SQL queries may still reference it by name
  • data/_catalog/manifests/564b00ae-cbf3-4efd-aa55-84cdb6d2b0b7.json
  • The manifest is deleted but STATE_OF_PLAY.mdnotes this was a "catalog hot-fix is not in git." If any code or stored query referencesclient_workerskjkk by string name, the del
    ⚠️ warnguessEthnicityFromName surname lookup is case-sensitive and fails on lowercase input
  • mcp-server/console.html:298
  • The function does s[0].toUpperCase()+s.slice(1).toLowerCase()for surname comparison againstSURNAMES_HISPANIC_C etc., but if the input surname is already mixed-case or contain
  • [grounding: file not found]
    ℹ️ infoloadChapter7 computes attribCost with floating-point accumulation on currency values
  • mcp-server/console.html:672
  • The code does attribCost += (r.total_cost||0)in aforEachloop over potentially hundreds of rows. JavaScriptNumberis IEEE-754 double; summing dollar amounts as floats can
  • [grounding: file not found]
    ℹ️ infoSTATE_OF_PLAY.md contains executable shell commands in markdown that may be copy-pasted with sudo
  • STATE_OF_PLAY.md:189
  • The RUNTIME CHEATSHEETsection includessudo systemctl restart lakehouse.service and similar commands. While not a code bug per se, this is a load-bearing assumption in operati
  • [grounding: file not found]

Metrics

{
  "audit_duration_ms": 166382,
  "findings_total": 222,
  "findings_block": 18,
  "findings_warn": 49,
  "findings_info": 155,
  "claims_strong": 16,
  "claims_moderate": 22,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 38,
  "diff_bytes": 689893
}

Lakehouse auditor · SHA c5654d41 · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 18 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" **Head SHA:** `c5654d417c36` **Audited at:** 2026-05-01T10:00:51.146Z <details><summary><b>static</b> — 2 findings (0 block, 2 warn, 0 info)</summary> ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 39 findings (16 block, 22 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 15035ms wall-clock) (truncated 689893→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 38` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44662 chars` 🛑 **block** — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `at commit:9eed982f:18` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Go stack or :4110 mentioned in diff` ⚠️ **warn** — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `at commit:d475fc7f:4` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No OpenCode Zen wiring in diff` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No UI animation or gradient changes in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ranking or schedule rotation logic in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No three-layer architecture changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright/end-to-end verification in diff` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No UI color/style changes in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No endorsed styling changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color scheme changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /spec endpoint changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /proof endpoint changes in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No CSS accent classes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console chapter changes in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No capability cards in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No contractor profile wiring in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color-coding changes in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No map tile/color changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /profiler endpoint in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ticker/price changes in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No attribution bar changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /profiler endpoint in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No DIRECT attribution logic in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on the public URL:" - `at commit:ba41ad28:38` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No public URL verification in diff` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No search result styling in diff` ⚠️ **warn** — cloud: claim not backed — "works on devop.live)" - `at commit:f6a7621b:40` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No devop.live specific changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `at commit:f6a7621b:43` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `at commit:a1066db8:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No signal wiring changes in diff` ⚠️ **warn** — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `at commit:a1066db8:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No permit cost coloring in diff` ⚠️ **warn** — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `at commit:a1066db8:62` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console click handling in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `at commit:a1066db8:65` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Turner Construction profile in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `at commit:5f0beffe:23` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No forklift operator search in diff` ⚠️ **warn** — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `at commit:5f0beffe:26` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Aisha/WI filtering in diff` ⚠️ **warn** — cloud: claim not backed — "button + green backfill list." - `at commit:677065de:30` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No backfill UI in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `at commit:677065de:54` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright drive in diff` ⚠️ **warn** — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `at commit:677065de:60` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Marcus profile data in diff` 🛑 **block** — cloud: claim not backed — "Verified live:" - `at commit:fb99e92a:24` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No live verification in diff` </details> <details><summary><b>kb_query</b> — 170 findings (0 block, 20 warn, 150 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ⚠️ **warn** — scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `reviewed_at: 2026-04-26T23:27:44.907Z` - `preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 46 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 46 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 46 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 50 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 31 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 45 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 21 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 16 flaggings, conf=0.13): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 4 flaggings, conf=0.50): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 4 flaggings, conf=0.50): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 4 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=1032d1a48899bdd4` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 10 findings (2 block, 5 warn, 3 info)</summary> 🛑 **block** — Overseer escalation references non-existent `opencode_key` field on state - ``crates/gateway/src/execution_loop/mod.rs:596`` - `The code reads `self.state.opencode_key.clone()` but the diff shows no corresponding addition of `opencode_key` to the `V1State` or execution state struct. If the field doesn't exi` - `[grounding: file not found]` ⚠️ **warn** — `cached_dim` atomic is never read with `Acquire`/`SeqCst`, allowing torn reads on cache-hit fast path - ``crates/aibridge/src/client.rs:175`` - ``cached_dim.load(Ordering::Relaxed)` on line 175 races with the `store` on line 219. On weakly-ordered architectures (ARM, which is likely the deployment target given the "Go side"` - `[grounding: file not found]` ⚠️ **warn** — `workerRow` helper silently drops `endorsed` chip when `playbook_boost` is exactly `0` - ``mcp-server/console.html:523`` - `The `endorsed` variable is computed with `(cand.playbook_boost||0) > 0`, but the condition in `workerRow` checks `if(opts.endorsed)` — JavaScript falsy values include `0`, empty st` - `[grounding: file not found]` ⚠️ **warn** — Face-pool cache key omits `race` and `age`, collapsing distinct worker demographics to same image - ``mcp-server/index.ts:1308`` - `The STATE_OF_PLAY describes "gender×race×age intersection bucketing with graceful fallback" but the diff-truncated `mcp-server/index.ts` is not shown. If the cache key only hashes ` - `[grounding: file not found]` ℹ️ **info** — `EmbedCacheKey` uses `String` for `model`, causing unnecessary heap allocation on every cache probe - ``crates/aibridge/src/client.rs:32`` - `The `model` field in `EmbedCacheKey` is a `String`, but in the `embed()` hot path the `model_key` is cloned from `req.model.clone().unwrap_or_default()` on every call. Since model ` - `[grounding: file not found]` ⚠️ **warn** — `qwen3.5:latest` model string in `rag.rs` does not match `lakehouse.toml` comment claiming "Ollama still serves both" - ``crates/vectord/src/rag.rs:166`` - `The code hardcodes `qwen3.5:latest` but the `lakehouse.toml` comment says "Ollama still serves both — bump back in this file if a workload regressed." However, `rag.rs` has no fall` - `[grounding: file not found]` 🛑 **block** — `client_workerskjkk` manifest deletion is a schema bypass — SQL queries may still reference it by name - ``data/_catalog/manifests/564b00ae-cbf3-4efd-aa55-84cdb6d2b0b7.json`` - `The manifest is deleted but `STATE_OF_PLAY.md` notes this was a "catalog hot-fix is not in git." If any code or stored query references `client_workerskjkk` by string name, the del` ⚠️ **warn** — `guessEthnicityFromName` surname lookup is case-sensitive and fails on lowercase input - ``mcp-server/console.html:298`` - `The function does `s[0].toUpperCase()+s.slice(1).toLowerCase()` for surname comparison against `SURNAMES_HISPANIC_C` etc., but if the input surname is already mixed-case or contain` - `[grounding: file not found]` ℹ️ **info** — `loadChapter7` computes `attribCost` with floating-point accumulation on currency values - ``mcp-server/console.html:672`` - `The code does `attribCost += (r.total_cost||0)` in a `forEach` loop over potentially hundreds of rows. JavaScript `Number` is IEEE-754 double; summing dollar amounts as floats can ` - `[grounding: file not found]` ℹ️ **info** — `STATE_OF_PLAY.md` contains executable shell commands in markdown that may be copy-pasted with `sudo` - ``STATE_OF_PLAY.md:189`` - `The `RUNTIME CHEATSHEET` section includes `sudo systemctl restart lakehouse.service` and similar commands. While not a code bug per se, this is a load-bearing assumption in operati` - `[grounding: file not found]` </details> ### Metrics ```json { "audit_duration_ms": 166382, "findings_total": 222, "findings_block": 18, "findings_warn": 49, "findings_info": 155, "claims_strong": 16, "claims_moderate": 22, "claims_weak": 0, "claims_empirical": 0, "claims_total": 38, "diff_bytes": 689893 } ``` <sub>Lakehouse auditor · SHA c5654d41 · re-audit on new commit flips the status automatically.</sub>
profit added 1 commit 2026-05-02 09:45:31 +00:00
gateway: pub extract_json + parity_extract_json bin (cross-runtime probe)
Some checks failed
lakehouse/auditor 10 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
654797a429
Supports the 2026-05-02 cross-runtime parity probe at
golangLAKEHOUSE/scripts/cutover/parity/extract_json_parity.sh which
feeds identical model-output strings through both runtimes' extract_json
and diffs results.

## Changes
- crates/gateway/src/v1/iterate.rs: extract_json gains `pub` + a
  comment pointing at the Go counterpart and the parity probe path
- crates/gateway/src/lib.rs: NEW thin lib facade re-exporting the
  modules so sub-binaries can reuse them. main.rs is unchanged
  (still uses local mod declarations)
- crates/gateway/src/bin/parity_extract_json.rs: NEW ~30-LOC binary
  that reads stdin, calls extract_json, prints {matched, value} JSON

## Probe result (logged in golangLAKEHOUSE)
12/12 match across fenced blocks, nested objects, unicode, escaped
quotes, top-level array, malformed JSON. Both runtimes' algorithms
are genuinely equivalent.

Substrate gate the probe enforces: `cargo test -p gateway extract_json`
PASS before any parity comparison runs. So a future divergence in
the live extract_json fires either as a Rust test failure (live
behavior changed) or a probe diff (Go behavior changed) — never
silently.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 10 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
Head SHA: 654797a429d0
Audited at: 2026-05-02T09:49:44.782Z

static — 2 findings (0 block, 2 warn, 0 info)

⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts

  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 30 findings (8 block, 21 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 23563ms wall-clock) (truncated 693055→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 37
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44604 chars
    🛑 block — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • at commit:9eed982f:18
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Go stack or :4110 mentioned in diff
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No gradient animation found in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ranking schedule found in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No three layers mentioned in diff
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No role-pill styling found in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No endorsed styling found in diff
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color classes found in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /spec endpoint found in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /proof endpoint found in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No accent classes found in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console chapters found in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No capability cards found in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No contractor profile index found in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color-coding found in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No map tile layer found in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /profiler endpoint found in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ticker UI found in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No attribution bar found in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /profiler endpoint found in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No DIRECT attribution found in diff
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No TARGET search found in diff
    ⚠️ warn — cloud: claim not backed — "works on devop.live)"
  • at commit:f6a7621b:40
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No devop.live reference in code changes
    ⚠️ warn — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • at commit:a1066db8:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No signal wiring details found in diff
    ⚠️ warn — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • at commit:a1066db8:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No permit cost coloring found in diff
    ⚠️ warn — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • at commit:a1066db8:62
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console click behavior found in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • at commit:a1066db8:65
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Turner Construction profile found in diff
    ⚠️ warn — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • at commit:5f0beffe:26
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Aisha/WI filtering found in diff
    ⚠️ warn — cloud: claim not backed — "button + green backfill list."
  • at commit:677065de:30
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No backfill UI found in diff
    ⚠️ warn — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • at commit:677065de:60
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Marcus profiles found in diff
kb_query — 173 findings (0 block, 21 warn, 152 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ⚠️ warn — scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • reviewed_at: 2026-04-26T23:27:44.907Z
  • preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 30 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 42 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 42 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 42 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 42 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 48 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 22 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • signature=c61ad10a3392f7bd
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=1032d1a48899bdd4
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d
  • signature=f037b8babf6d9c8a
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=d910e3254cf03240
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 9 findings (2 block, 5 warn, 2 info)

🛑 block — Deterministic face-pool seed derivation lacks hash collision handling

  • mcp-server/index.ts:1234
  • The description states "derives a deterministic-per-worker seed via djb2-style hash" but the diff does not include the actual implementation of this hash function. Without seeing t
  • [grounding: verified at mcp-server/index.ts:1234]
    🛑 block — Provider routing assumes opencode adapter exists but not shown in diff
  • crates/gateway/src/execution_loop/mod.rs:617
  • The code switches from ollama_cloud::chat()toopencode::chat()and setsprovider: Some("opencode".into()), but the diff does not show the v1::opencode module or its implem
  • [grounding: verified at crates/gateway/src/execution_loop/mod.rs:617]
    ⚠️ warn — Embed cache size tunable via config but default not wired to config loading
  • crates/aibridge/src/client.rs:41
  • The code defines DEFAULT_EMBED_CACHE_SIZE = 4096 and mentions "Tunable via [aibridge].embed_cache_size in the config", but the diff shows no changes to config parsing or to any p
  • [grounding: verified at crates/aibridge/src/client.rs:41]
    ⚠️ warn — Extract_json made public without export in lib.rs
  • crates/gateway/src/lib.rs:18
  • ``crates/gateway/src/lib.rsis added as a library facade and declarespub mod v1;, but the v1module re-exports are not shown. Theextract_json function at iterate.rs:98 is m
  • [grounding: verified at crates/gateway/src/lib.rs:18]
    ⚠️ warn — ComfyUI seed caching assumes deterministic _cache_key() but implementation not in diff
  • STATE_OF_PLAY.md:+273
  • diff-truncated, can't verify the actual change. The statement that "was caching by prompt only — 3 different worker seeds collapsed to 1 cached image" indicates a real bug was fixe
    ⚠️ warn — Face-pool minor-age exclusion filtering happens post-fetch but may be incomplete
  • data/headshots/manifest.jsonl:+1
  • The manifest file shows 1000 entries; STATE_OF_PLAY.md:+276 claims "48 minor exclusions" and "952 servable faces". Manual count of entries with "excluded": "minor" in the diff (s
    ⚠️ warn — Config model updates assume upstream providers have new models available
  • config/providers.toml:+38-+45
  • The config changes default models from gpt-oss:120btodeepseek-v3.2(Ollama Pro) andkimi-k2.6, and in modes.toml to gemini-3-flash-preview. The provider comments claim th
    ℹ️ info — Role-band lookup tables in console.html have no fallback for unknown roles
  • mcp-server/console.html:+219-+225
  • ``ROLE_BANDSarray has a fallback:{ match: /quality/i, band: 'production', label: 'Quality' }followed by a catch-allreturn { band: 'warehouse', label: role.split(' ')[0].toUpℹ️ **info** — STATE_OF_PLAY.md tags a commitdemo-2026-04-27` as the reference state but does not verify git tag exists
  • STATE_OF_PLAY.md:+177
  • The document states "Demo state is anchored by git tag demo-2026-04-27(commited57eda)" but the diff does not show the git tag being created. If a future session tries to git`

Metrics

{
  "audit_duration_ms": 167938,
  "findings_total": 215,
  "findings_block": 10,
  "findings_warn": 49,
  "findings_info": 156,
  "claims_strong": 15,
  "claims_moderate": 22,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 37,
  "diff_bytes": 693055
}

Lakehouse auditor · SHA 654797a4 · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 10 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" **Head SHA:** `654797a429d0` **Audited at:** 2026-05-02T09:49:44.782Z <details><summary><b>static</b> — 2 findings (0 block, 2 warn, 0 info)</summary> ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 30 findings (8 block, 21 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 23563ms wall-clock) (truncated 693055→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 37` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44604 chars` 🛑 **block** — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `at commit:9eed982f:18` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Go stack or :4110 mentioned in diff` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No gradient animation found in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ranking schedule found in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No three layers mentioned in diff` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No role-pill styling found in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No endorsed styling found in diff` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color classes found in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /spec endpoint found in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /proof endpoint found in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No accent classes found in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console chapters found in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No capability cards found in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No contractor profile index found in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color-coding found in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No map tile layer found in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /profiler endpoint found in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ticker UI found in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No attribution bar found in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /profiler endpoint found in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No DIRECT attribution found in diff` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No TARGET search found in diff` ⚠️ **warn** — cloud: claim not backed — "works on devop.live)" - `at commit:f6a7621b:40` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No devop.live reference in code changes` ⚠️ **warn** — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `at commit:a1066db8:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No signal wiring details found in diff` ⚠️ **warn** — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `at commit:a1066db8:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No permit cost coloring found in diff` ⚠️ **warn** — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `at commit:a1066db8:62` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console click behavior found in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `at commit:a1066db8:65` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Turner Construction profile found in diff` ⚠️ **warn** — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `at commit:5f0beffe:26` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Aisha/WI filtering found in diff` ⚠️ **warn** — cloud: claim not backed — "button + green backfill list." - `at commit:677065de:30` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No backfill UI found in diff` ⚠️ **warn** — cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `at commit:677065de:60` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Marcus profiles found in diff` </details> <details><summary><b>kb_query</b> — 173 findings (0 block, 21 warn, 152 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ⚠️ **warn** — scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `reviewed_at: 2026-04-26T23:27:44.907Z` - `preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 15 flaggings, conf=0.07): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 30 flaggings, conf=0.03): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 42 flaggings, conf=0.02): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 42 flaggings, conf=0.02): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 42 flaggings, conf=0.02): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 42 flaggings, conf=0.02): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 48 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 22 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `signature=c61ad10a3392f7bd` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=1032d1a48899bdd4` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d - `signature=f037b8babf6d9c8a` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=d910e3254cf03240` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 9 findings (2 block, 5 warn, 2 info)</summary> 🛑 **block** — Deterministic face-pool seed derivation lacks hash collision handling - `mcp-server/index.ts:1234` - `The description states "derives a deterministic-per-worker seed via djb2-style hash" but the diff does not include the actual implementation of this hash function. Without seeing t` - `[grounding: verified at mcp-server/index.ts:1234]` 🛑 **block** — Provider routing assumes `opencode` adapter exists but not shown in diff - `crates/gateway/src/execution_loop/mod.rs:617` - `The code switches from `ollama_cloud::chat()` to `opencode::chat()` and sets `provider: Some("opencode".into())`, but the diff does not show the `v1::opencode` module or its implem` - `[grounding: verified at crates/gateway/src/execution_loop/mod.rs:617]` ⚠️ **warn** — Embed cache size tunable via config but default not wired to config loading - `crates/aibridge/src/client.rs:41` - `The code defines `DEFAULT_EMBED_CACHE_SIZE = 4096` and mentions "Tunable via [aibridge].embed_cache_size in the config", but the diff shows no changes to config parsing or to any p` - `[grounding: verified at crates/aibridge/src/client.rs:41]` ⚠️ **warn** — Extract_json made public without export in lib.rs - `crates/gateway/src/lib.rs:18` - ``crates/gateway/src/lib.rs` is added as a library facade and declares `pub mod v1;`, but the `v1` module re-exports are not shown. The `extract_json` function at iterate.rs:98 is m` - `[grounding: verified at crates/gateway/src/lib.rs:18]` ⚠️ **warn** — ComfyUI seed caching assumes deterministic `_cache_key()` but implementation not in diff - `STATE_OF_PLAY.md:+273` - `diff-truncated, can't verify the actual change. The statement that "was caching by prompt only — 3 different worker seeds collapsed to 1 cached image" indicates a real bug was fixe` ⚠️ **warn** — Face-pool minor-age exclusion filtering happens post-fetch but may be incomplete - `data/headshots/manifest.jsonl:+1` - `The manifest file shows 1000 entries; STATE_OF_PLAY.md:+276 claims "48 minor exclusions" and "952 servable faces". Manual count of entries with `"excluded": "minor"` in the diff (s` ⚠️ **warn** — Config model updates assume upstream providers have new models available - `config/providers.toml:+38-+45` - `The config changes default models from `gpt-oss:120b` to `deepseek-v3.2` (Ollama Pro) and `kimi-k2.6`, and in modes.toml to `gemini-3-flash-preview`. The provider comments claim th` ℹ️ **info** — Role-band lookup tables in console.html have no fallback for unknown roles - `mcp-server/console.html:+219-+225` - ``ROLE_BANDS` array has a fallback: `{ match: /quality/i, band: 'production', label: 'Quality' }` followed by a catch-all `return { band: 'warehouse', label: role.split(' ')[0].toUp` ℹ️ **info** — STATE_OF_PLAY.md tags a commit `demo-2026-04-27` as the reference state but does not verify git tag exists - `STATE_OF_PLAY.md:+177` - `The document states "Demo state is anchored by git tag `demo-2026-04-27` (commit `ed57eda`)" but the diff does not show the git tag being created. If a future session tries to `git` </details> ### Metrics ```json { "audit_duration_ms": 167938, "findings_total": 215, "findings_block": 10, "findings_warn": 49, "findings_info": 156, "claims_strong": 15, "claims_moderate": 22, "claims_weak": 0, "claims_empirical": 0, "claims_total": 37, "diff_bytes": 693055 } ``` <sub>Lakehouse auditor · SHA 654797a4 · re-audit on new commit flips the status automatically.</sub>
profit added 1 commit 2026-05-02 09:59:54 +00:00
aibridge: drop Python sidecar from hot path; AiClient → direct Ollama
Some checks failed
lakehouse/auditor 11 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
ba928b1d64
The "drop Python sidecar from Rust aibridge" item from the
architecture_comparison decisions tracker. Universal-win cleanup —
removes 1 process + 1 runtime + 1 hop from every embed/generate
request, with no behavior change.

## What was on the hot path before

  gateway → AiClient → http://:3200 (FastAPI sidecar)
                          ├── embed.py    → http://:11434 (Ollama)
                          ├── generate.py → http://:11434
                          ├── rerank.py   → http://:11434 (loops generate)
                          └── admin.py    → http://:11434 (/api/ps + nvidia-smi)

The sidecar's hot-path code (~120 LOC across embed.py / generate.py /
rerank.py / admin.py) was pure pass-through: each route translated
its request body to Ollama's wire format and returned Ollama's
response in a sidecar envelope. Zero logic, one full HTTP hop of
overhead.

## What's on the hot path now

  gateway → AiClient → http://:11434 (Ollama directly)

Inline rewrites in crates/aibridge/src/client.rs:
- embed_uncached: per-text loop to /api/embed; computes dimension
  from response[0].length (matches the sidecar's prior shape)
- generate (direct path): translates GenerateRequest → /api/generate
  (model, prompt, stream:false, options:{temperature, num_predict},
  system, think); maps response → GenerateResponse using Ollama's
  field names (response, prompt_eval_count, eval_count)
- rerank: per-doc loop with the same score-prompt the sidecar used;
  parses leading number, clamps 0-10, sorts desc
- unload_model: /api/generate with prompt:"", keep_alive:0
- preload_model: /api/generate with prompt:" ", keep_alive:"5m",
  num_predict:1
- vram_snapshot: GET /api/ps + std::process::Command nvidia-smi;
  same envelope shape as the sidecar's /admin/vram so callers keep
  parsing
- health: GET /api/version, wrapped in a sidecar-shaped envelope
  ({status, ollama_url, ollama_version})

Public AiClient API is unchanged — Request/Response types untouched.
Callers (gateway routes, vectord, etc.) require zero updates.

## Config changes

- crates/shared/src/config.rs: default_sidecar_url() bumps to
  :11434. The TOML field stays `[sidecar].url` for migration compat
  (operators with existing configs don't need to rename anything).
- lakehouse.toml + config/providers.toml: bumped to localhost:11434
  with comments explaining the 2026-05-02 transition.

## What stays Python

sidecar/sidecar/lab_ui.py (385 LOC) + pipeline_lab.py (503 LOC) are
dev-mode Streamlit-shape UIs for prompt experimentation. Not on the
runtime hot path; continue running for ad-hoc work. The
embed/generate/rerank/admin routes inside sidecar can be retired,
but operators who want to keep the sidecar process running for the
lab UI face no breakage — those routes still call Ollama and work.

## Verification

- cargo check --workspace: clean
- cargo test -p aibridge --lib: 32/32 PASS
- Live smoke against test gateway on :3199 with new config:
    /ai/embed     → 768-dim vector for "forklift operator" ✓
    /v1/chat      → provider=ollama, model=qwen2.5:latest, content=OK ✓
- nvidia-smi parsing tested via std::process::Command path
- Live `lakehouse.service` (port :3100) NOT yet restarted — deploy
  step is operator-driven (sudo systemctl restart lakehouse.service)

## Architecture comparison update

(Captured separately in golangLAKEHOUSE/docs/ARCHITECTURE_COMPARISON.md
decisions tracker.) The "drop Python sidecar" line moves from _open_
to DONE. The Rust process model now has 1 mega-binary instead of
1 mega-binary + 1 sidecar process — a small but real reduction in
ops surface.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 11 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
Head SHA: ba928b1d6469
Audited at: 2026-05-02T10:04:22.066Z

static — 2 findings (0 block, 2 warn, 0 info)

⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts

  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 30 findings (9 block, 20 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 37070ms wall-clock) (truncated 711694→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 35
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44414 chars
    ⚠️ warn — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • at commit:ba928b1d:79
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No evidence of Rust process model changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • at commit:9eed982f:18
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Go stack or :4110 references in diff
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No animation or gradient changes in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ranking schedule changes in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No three-layer architecture in diff
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No role-pill styling in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No endorsed styling in diff
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /spec endpoint changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /proof endpoint changes in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No accent classes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console chapter changes in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No capability cards in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No contractor profile changes in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No map tile changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /profiler endpoint in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ticker/price changes in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No attribution bar changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No /profiler endpoint in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No DIRECT attribution in diff
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No search functionality changes in diff
    ⚠️ warn — cloud: claim not backed — "works on devop.live)"
  • at commit:f6a7621b:40
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No devop.live specific changes in diff
    ⚠️ warn — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • at commit:a1066db8:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No signal wiring changes in diff
    ⚠️ warn — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • at commit:a1066db8:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No permit cost coloring in diff
    ⚠️ warn — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • at commit:a1066db8:62
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console click handling in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • at commit:a1066db8:65
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Turner Construction profile in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • at commit:5f0beffe:23
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No forklift operator search in diff
    ⚠️ warn — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • at commit:5f0beffe:26
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Aisha or location filtering in diff
kb_query — 175 findings (0 block, 19 warn, 156 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ⚠️ warn — scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • reviewed_at: 2026-04-26T23:27:44.907Z
  • preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 38 flaggings, conf=0.03): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 38 flaggings, conf=0.03): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 48 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 28 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 23 flaggings, conf=0.13): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 6 flaggings, conf=0.33): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 6 flaggings, conf=0.33): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • signature=c61ad10a3392f7bd
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=1032d1a48899bdd4
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d
  • signature=f037b8babf6d9c8a
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=d910e3254cf03240
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d
  • signature=ddebe1faaff0b1e6
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1
  • signature=4434173af432daf6
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 10 findings (2 block, 6 warn, 2 info)

🛑 block — Embed cache all-hit path uses stale cached_dim (0) on first call, causing dimension mismatch

  • crates/aibridge/src/client.rs:260-265
  • When miss_indices.is_empty()(all cache hits), the code falls back toembeddings[0].len()only ifcached_dim == 0. But cached_dim is initialized to 0 and only set on a *mis
  • [grounding: verified at crates/aibridge/src/client.rs:260]
    ⚠️ warnembed_cache lock poisoning on Mutex unwrap uses map_err but doesn't propagate panic, silently returning error string
  • crates/aibridge/src/client.rs:228,
  • ``cache.lock().map_err(|e| format!("cache lock poisoned: {e}"))?converts aPoisonErrorinto aStringerror. However,MutexGuard poisoning in Rust means the *previous* holder
  • [grounding: verified at crates/aibridge/src/client.rs:228]
    ⚠️ warnnvidia_smi_snapshot parses only first GPU line, silently drops multi-GPU systems
  • crates/aibridge/src/client.rs:545-570
  • ``nvidia-smi --query-gpu=... --format=csvoutputs one line per GPU. The code doeslet line = String::from_utf8_lossy(&stdout); let line = line.trim(); then splits on commas, assu
  • [grounding: verified at crates/aibridge/src/client.rs:545]
    ⚠️ warngenerate() direct Ollama path ignores req.model when gateway_url is set, but uses it when direct—model inconsistency across paths
  • crates/aibridge/src/client.rs:332-335
  • In generate(), when gateway_urlisSome, the method calls generate_via_gateway(gw, req).awaitpassingreqwith itsmodelfield. Butgenerate_via_gateway (shown at lin
  • [grounding: verified at crates/aibridge/src/client.rs:332]
    🛑 blockescalate_to_overseer hardcodes claude-opus-4-7 but opencode provider adapter may not exist
  • crates/gateway/src/execution_loop/mod.rs:611-612
  • The code calls crate::v1::opencode::chat(&opencode_key, &chat_req).awaitwithprovider: Some("opencode".into()). The diff does not show crates/gateway/src/v1/opencode.rs or a
  • [grounding: verified at crates/gateway/src/execution_loop/mod.rs:611]
    ⚠️ warnparity_extract_json binary depends on gateway::v1::iterate::extract_json being public, but no pub use in lib.rs
  • crates/gateway/src/lib.rs:1-19
  • The new lib.rsexposespub mod v1;butextract_jsonis defined incrates/gateway/src/v1/iterate.rs. For gateway::v1::iterate::extract_json to be reachable from the binary
  • [grounding: verified at crates/gateway/src/lib.rs:1]
    ℹ️ infoEmbedCacheKey uses String for both fields, causing unnecessary allocation on every cache lookup
  • crates/aibridge/src/client.rs:45-50
  • ``EmbedCacheKey { model: String, text: String }clones the entiretextString for every cache lookup (line 228:text: text.clone()). For a 4096-entry cache with 1KB average tex
  • [grounding: verified at crates/aibridge/src/client.rs:45]
    ⚠️ warnrerank loop fires N sequential /api/generate calls with no timeout or concurrency limit
  • crates/aibridge/src/client.rs:420-465
  • The rerankmethod loops overreq.documentsand makes a blocking (synchronous-wait) HTTP call per document. Withreqwest::Client default connection pool settings and no timeou
  • [grounding: verified at crates/aibridge/src/client.rs:420]
    ℹ️ infohealth() returns synthetic JSON with ollama_version field, but ollama_url is &self.base_url (borrowed string) serialized as JSON string—potential lifetime issue in serde_json::json! macro
  • crates/aibridge/src/client.rs:215-220
  • ``serde_json::json!({ "ollama_url": &self.base_url, ... })captures a reference toself.base_url. The json!macro should handle this by callingserde::Serialize on the refere
  • [grounding: verified at crates/aibridge/src/client.rs:215]
    ⚠️ warnlakehouse.toml and config/providers.toml both define ollama provider with different base_url values—runtime config precedence unclear
  • config/providers.toml:17-24
  • config/providers.toml` sets `base_url = "http://localhost:11434"` for `ollama` provider, while `lakehouse.toml` sets `url = "http://localhost:11434"` in `[sidecar]` section. The
  • [grounding: verified at config/providers.toml:17]

Metrics

{
  "audit_duration_ms": 223101,
  "findings_total": 218,
  "findings_block": 11,
  "findings_warn": 47,
  "findings_info": 160,
  "claims_strong": 14,
  "claims_moderate": 21,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 35,
  "diff_bytes": 711694
}

Lakehouse auditor · SHA ba928b1d · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 11 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" **Head SHA:** `ba928b1d6469` **Audited at:** 2026-05-02T10:04:22.066Z <details><summary><b>static</b> — 2 findings (0 block, 2 warn, 0 info)</summary> ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 30 findings (9 block, 20 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 37070ms wall-clock) (truncated 711694→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 35` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44414 chars` ⚠️ **warn** — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `at commit:ba928b1d:79` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No evidence of Rust process model changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `at commit:9eed982f:18` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Go stack or :4110 references in diff` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No animation or gradient changes in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ranking schedule changes in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No three-layer architecture in diff` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No role-pill styling in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No endorsed styling in diff` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /spec endpoint changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /proof endpoint changes in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No accent classes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console chapter changes in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No capability cards in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No contractor profile changes in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No map tile changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /profiler endpoint in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ticker/price changes in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No attribution bar changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No /profiler endpoint in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No DIRECT attribution in diff` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No search functionality changes in diff` ⚠️ **warn** — cloud: claim not backed — "works on devop.live)" - `at commit:f6a7621b:40` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No devop.live specific changes in diff` ⚠️ **warn** — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `at commit:a1066db8:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No signal wiring changes in diff` ⚠️ **warn** — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `at commit:a1066db8:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No permit cost coloring in diff` ⚠️ **warn** — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `at commit:a1066db8:62` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console click handling in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `at commit:a1066db8:65` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Turner Construction profile in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `at commit:5f0beffe:23` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No forklift operator search in diff` ⚠️ **warn** — cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `at commit:5f0beffe:26` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Aisha or location filtering in diff` </details> <details><summary><b>kb_query</b> — 175 findings (0 block, 19 warn, 156 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ⚠️ **warn** — scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `reviewed_at: 2026-04-26T23:27:44.907Z` - `preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 38 flaggings, conf=0.03): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 38 flaggings, conf=0.03): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 48 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 28 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 23 flaggings, conf=0.13): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 6 flaggings, conf=0.33): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 6 flaggings, conf=0.33): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `signature=c61ad10a3392f7bd` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=1032d1a48899bdd4` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d - `signature=f037b8babf6d9c8a` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=d910e3254cf03240` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d - `signature=ddebe1faaff0b1e6` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 - `signature=4434173af432daf6` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 10 findings (2 block, 6 warn, 2 info)</summary> 🛑 **block** — Embed cache all-hit path uses stale `cached_dim` (0) on first call, causing dimension mismatch - `crates/aibridge/src/client.rs:260-265` - `When `miss_indices.is_empty()` (all cache hits), the code falls back to `embeddings[0].len()` only if `cached_dim == 0`. But `cached_dim` is initialized to 0 and only set on a *mis` - `[grounding: verified at crates/aibridge/src/client.rs:260]` ⚠️ **warn** — `embed_cache` lock poisoning on `Mutex` unwrap uses `map_err` but doesn't propagate panic, silently returning error string - `crates/aibridge/src/client.rs:228,` - ``cache.lock().map_err(|e| format!("cache lock poisoned: {e}"))?` converts a `PoisonError` into a `String` error. However, `MutexGuard` poisoning in Rust means the *previous* holder` - `[grounding: verified at crates/aibridge/src/client.rs:228]` ⚠️ **warn** — `nvidia_smi_snapshot` parses only first GPU line, silently drops multi-GPU systems - `crates/aibridge/src/client.rs:545-570` - ``nvidia-smi --query-gpu=... --format=csv` outputs one line per GPU. The code does `let line = String::from_utf8_lossy(&stdout); let line = line.trim();` then splits on commas, assu` - `[grounding: verified at crates/aibridge/src/client.rs:545]` ⚠️ **warn** — `generate()` direct Ollama path ignores `req.model` when `gateway_url` is set, but uses it when direct—model inconsistency across paths - `crates/aibridge/src/client.rs:332-335` - `In `generate()`, when `gateway_url` is `Some`, the method calls `generate_via_gateway(gw, req).await` passing `req` with its `model` field. But `generate_via_gateway` (shown at lin` - `[grounding: verified at crates/aibridge/src/client.rs:332]` 🛑 **block** — `escalate_to_overseer` hardcodes `claude-opus-4-7` but `opencode` provider adapter may not exist - `crates/gateway/src/execution_loop/mod.rs:611-612` - `The code calls `crate::v1::opencode::chat(&opencode_key, &chat_req).await` with `provider: Some("opencode".into())`. The diff does not show `crates/gateway/src/v1/opencode.rs` or a` - `[grounding: verified at crates/gateway/src/execution_loop/mod.rs:611]` ⚠️ **warn** — `parity_extract_json` binary depends on `gateway::v1::iterate::extract_json` being public, but no `pub use` in `lib.rs` - `crates/gateway/src/lib.rs:1-19` - `The new `lib.rs` exposes `pub mod v1;` but `extract_json` is defined in `crates/gateway/src/v1/iterate.rs`. For `gateway::v1::iterate::extract_json` to be reachable from the binary` - `[grounding: verified at crates/gateway/src/lib.rs:1]` ℹ️ **info** — `EmbedCacheKey` uses `String` for both fields, causing unnecessary allocation on every cache lookup - `crates/aibridge/src/client.rs:45-50` - ``EmbedCacheKey { model: String, text: String }` clones the entire `text` String for every cache lookup (line 228: `text: text.clone()`). For a 4096-entry cache with 1KB average tex` - `[grounding: verified at crates/aibridge/src/client.rs:45]` ⚠️ **warn** — `rerank` loop fires N sequential `/api/generate` calls with no timeout or concurrency limit - `crates/aibridge/src/client.rs:420-465` - `The `rerank` method loops over `req.documents` and makes a blocking (synchronous-wait) HTTP call per document. With `reqwest::Client` default connection pool settings and no timeou` - `[grounding: verified at crates/aibridge/src/client.rs:420]` ℹ️ **info** — `health()` returns synthetic JSON with `ollama_version` field, but `ollama_url` is `&self.base_url` (borrowed string) serialized as JSON string—potential lifetime issue in serde_json::json! macro - `crates/aibridge/src/client.rs:215-220` - ``serde_json::json!({ "ollama_url": &self.base_url, ... })` captures a reference to `self.base_url`. The `json!` macro should handle this by calling `serde::Serialize` on the refere` - `[grounding: verified at crates/aibridge/src/client.rs:215]` ⚠️ **warn** — `lakehouse.toml` and `config/providers.toml` both define `ollama` provider with different `base_url` values—runtime config precedence unclear - `config/providers.toml:17-24` - ``config/providers.toml` sets `base_url = "http://localhost:11434"` for `ollama` provider, while `lakehouse.toml` sets `url = "http://localhost:11434"` in `[sidecar]` section. The `` - `[grounding: verified at config/providers.toml:17]` </details> ### Metrics ```json { "audit_duration_ms": 223101, "findings_total": 218, "findings_block": 11, "findings_warn": 47, "findings_info": 160, "claims_strong": 14, "claims_moderate": 21, "claims_weak": 0, "claims_empirical": 0, "claims_total": 35, "diff_bytes": 711694 } ``` <sub>Lakehouse auditor · SHA ba928b1d · re-audit on new commit flips the status automatically.</sub>
profit added 1 commit 2026-05-02 10:39:33 +00:00
gateway: trace-id propagation + coordinator session JSONL (Rust parity)
Some checks failed
lakehouse/auditor 10 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
57bde63a06
Cross-runtime parity with the Go-side observability wave (commits
d6d2fdf + 1a3a82a in golangLAKEHOUSE). The two layers J flagged:
the LIVE per-call view (Langfuse) and the LONGITUDINAL forensic view
(JSONL queryable via DuckDB). Hard correctness gate (FillValidator
phantom-rejection) was already in place; this is the observability
on top.

## Trace-id propagation

X-Lakehouse-Trace-Id header constant declared in
crates/gateway/src/v1/iterate.rs (matches Go's shared.TraceIDHeader
byte-for-byte). When set on an inbound /v1/iterate request, the
handler reuses it; the chat + validate self-loopback hops forward
the same header so chatd's trace emit nests under the parent rather
than minting a fresh top-level trace per call.

ChatTrace gains a parent_trace_id field. emit_chat_inner skips the
trace-create event when parent is set, only emits the
generation-create which attaches to the existing trace tree. Result:
an iterate session with N retries shows in Langfuse as ONE tree, not
N+1 disconnected traces.

emit_attempt_span (new) writes one Langfuse span per iteration
attempt with input={iteration, model, provider, prompt} and
output={verdict, raw, error}. WARNING level on non-accepted
verdicts. The returned span id is stamped on the corresponding
SessionRecord attempt for cross-log correlation.

## Coordinator session JSONL

crates/gateway/src/v1/session_log.rs — new writer matching Go's
internal/validator/session_log.go schema byte-for-byte:
  - SessionRecord with schema=session.iterate.v1
  - SessionAttemptRecord per retry
  - SessionLogger.append: tokio Mutex serialized append-only
  - Best-effort posture (slog.Warn on error, never blocks request)

iterate.rs builds + appends a row on EVERY code path:
  - accepted: write_session_accepted with grounded_in_roster bool
    derived from validate_workers WorkerLookup (matches Go's
    handlers.rosterCheckFor("fill") semantics)
  - max-iter-exhausted: write_session_failure
  - infra-error: write_infra_error (so a missing /v1/iterate event
    never silently disappears from the longitudinal log)

[gateway].session_log_path config field (empty = disabled).
Production: /var/lib/lakehouse/gateway/sessions.jsonl. Operators who
want a unified longitudinal stream can point both Rust and Go
loggers at the same path — write-append is safe at the row sizes we
produce.

## Cross-runtime parity probe

crates/gateway/src/bin/parity_session_log: tiny stdin/stdout helper
that round-trips a fixture through SessionRecord serde.
golangLAKEHOUSE/scripts/cutover/parity/session_log_parity.sh feeds
4 fixtures through both helpers and diffs the rows after stripping
timestamp + daemon (the two fields that legitimately differ between
producers).

Result: **4/4 byte-equal** including the unicode-prompt fixture
("Café résumé  你好"). Schema parity holds. The non-trivial-equal
guard in the probe rejects the case where both sides fail
identically — protecting against a regression where one side
silently stops producing valid JSON.

## Verification

- cargo test -p gateway --lib: 90/90 PASS (3 new session_log tests
  including concurrent-append safety)
- cargo check --workspace: clean
- session_log_parity.sh: 4/4 fixtures byte-equal
- Both runtimes can append to the same path; DuckDB sees one stream
- The Go-side validatord smoke remains 5/5 (unchanged)

## Architecture invariant

Don't propose to "wire trace-id propagation in Rust" or "add Rust
session log" — both are now shipped on the demo/post-pr11-polish
branch. The longitudinal log + Langfuse tree together cover the
multi-call observability concern J flagged 2026-05-02.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 10 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
Head SHA: 57bde63a06b8
Audited at: 2026-05-02T10:42:51.874Z

static — 3 findings (0 block, 3 warn, 0 info)

⚠️ warn — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer

  • crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts
  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 27 findings (8 block, 18 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 17853ms wall-clock) (truncated 753215→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 33
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44194 chars
    ⚠️ warn — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • at commit:ba928b1d:79
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No evidence of mega-binary consolidation in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • at commit:9eed982f:18
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Go stack on :4110 mentioned in diff
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No gradient animation found in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ranking rotation logic in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No three-layer architecture in diff
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No role-pill styling in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No endorsed styling in diff
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No spec page with 11 chapters in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No proof page verification in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No accent classes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console with 9 chapters in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No capability cards in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No contractor profile wiring in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No map tile layer in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler page in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ticker UI in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No attribution bar in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No DIRECT labeling in diff
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No search functionality in diff
    ⚠️ warn — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • at commit:a1066db8:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No signal wiring in diff
    ⚠️ warn — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • at commit:a1066db8:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No cost-based coloring in diff
    ⚠️ warn — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • at commit:a1066db8:62
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No click propagation logic in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • at commit:a1066db8:65
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Turner Construction profile in diff
kb_query — 179 findings (0 block, 16 warn, 163 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ⚠️ warn — scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • reviewed_at: 2026-04-26T23:27:44.907Z
  • preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes
    ℹ️ info — scrum-master review for crates/gateway/src/main.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-25T23:42:49.497Z
  • preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with /v1, /ingest, AI client, secrets, journal, vectord memory stores, bucket registr
    ℹ️ info — scrum-master review for crates/gateway/src/v1/mod.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-26T23:12:34.425Z
  • preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible /v1/chat skeleton with basic prov
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 35 flaggings, conf=0.03): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 35 flaggings, conf=0.03): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 34 flaggings, conf=0.03): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 34 flaggings, conf=0.03): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 48 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 24 flaggings, conf=0.13): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (2 distinct PRs, 7 flaggings, conf=0.29): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ℹ️ info — recurring audit pattern (2 distinct PRs, 7 flaggings, conf=0.29): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • signature=c61ad10a3392f7bd
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=1032d1a48899bdd4
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d
  • signature=f037b8babf6d9c8a
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=d910e3254cf03240
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d
  • signature=ddebe1faaff0b1e6
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1
  • signature=4434173af432daf6
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway
  • signature=298880b9310be38b
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d
  • signature=f6ad293c96a80fd3
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 10 findings (2 block, 6 warn, 2 info)

🛑 block — Embed cache key collision between models with same text

  • crates/aibridge/src/client.rs:40–44
  • The EmbedCacheKeystruct keys on(model, text) but when two different embedding models produce vectors of different dimensions, the cache can return a mismatched vector from mo
  • [grounding: verified at crates/aibridge/src/client.rs:40]
    ⚠️ warn — Session logger silently succeeds on permission errors
  • crates/gateway/src/v1/session_log.rs:105–112
  • ``append() catches all I/O errors at line 109 and logs a warning without surfacing the error to the caller. A persistent write failure (e.g., read-only filesystem, permission denie
  • [grounding: verified at crates/gateway/src/v1/session_log.rs:105]
    🛑 block — Unverified sidecar retirement assumption
  • crates/aibridge/src/client.rs:1–16
  • The diff retires the Python sidecar and rewires AiClientto call Ollama directly at:11434. The config default changes from :3200(sidecar) to:11434 (Ollama). However, the
  • [grounding: verified at crates/aibridge/src/client.rs:1]
    ⚠️ warn — Session log rows may be torn across concurrent appends
  • crates/gateway/src/v1/session_log.rs:123–133
  • The mutex protects only the serde_json serialization and file open, not the write atomicity. Two concurrent append()calls on the sameSessionLogger can interleave their writes
  • [grounding: verified at crates/gateway/src/v1/session_log.rs:123]
    ⚠️ warn — Extract JSON made public without export from lib.rs
  • crates/gateway/src/lib.rs:1–19
  • ``extract_jsonis madepubat line 452 to support a parity probe binary, but it is NOT re-exported fromlib.rs. The new parity binary at crates/gateway/src/bin/parity_extract_`
  • [grounding: verified at crates/gateway/src/lib.rs:1]
    ⚠️ warn — Trace ID header propagation bypasses validation
  • crates/gateway/src/v1/iterate.rs:111–118
  • The trace ID is read from an untrusted client header (TRACE_ID_HEADER) at line 114 and immediately stamped into the session log and Langfuse emissions without validation. A malic
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:111]
    ℹ️ info — Sidecar default URL points to direct Ollama but config field is still named "sidecar"
  • crates/shared/src/config.rs:158–161
  • The config field is [sidecar].url (not renamed) for "migration compatibility" but the default now points to Ollama's native API port. This is a semantic lie: the field is labeled
  • [grounding: verified at crates/shared/src/config.rs:158]
    ⚠️ warn — Ollama embed response parsing assumes single-batch input
  • crates/aibridge/src/client.rs:310–333
  • The embed_uncached()loop at line 303 sends one text per request to/api/embedand expects{"embeddings": ...} with a single inner vector. Ollama 0.4+ supports batch inpu
  • [grounding: verified at crates/aibridge/src/client.rs:310]
    ⚠️ warn — Missing validation of session_log_path directory existence at startup
  • crates/gateway/src/main.rs:364–379
  • The session logger is constructed at line 375 by calling SessionLogger::from_path(path), which returns None on empty path but does not validate the directory exists or is writa
  • [grounding: verified at crates/gateway/src/main.rs:364]
    ℹ️ info — STATE_OF_PLAY.md is not tracked in git and will diverge from runtime
  • STATE_OF_PLAY.md
  • This 239-line operational status document is committed as static markdown, but the README's own prose at lines 5–6 states "If memory contradicts this file, this file wins" and "Upd

Metrics

{
  "audit_duration_ms": 163135,
  "findings_total": 220,
  "findings_block": 10,
  "findings_warn": 43,
  "findings_info": 167,
  "claims_strong": 13,
  "claims_moderate": 20,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 33,
  "diff_bytes": 753215
}

Lakehouse auditor · SHA 57bde63a · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 10 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" **Head SHA:** `57bde63a06b8` **Audited at:** 2026-05-02T10:42:51.874Z <details><summary><b>static</b> — 3 findings (0 block, 3 warn, 0 info)</summary> ⚠️ **warn** — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 27 findings (8 block, 18 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 17853ms wall-clock) (truncated 753215→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 33` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 44194 chars` ⚠️ **warn** — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `at commit:ba928b1d:79` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No evidence of mega-binary consolidation in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `at commit:9eed982f:18` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Go stack on :4110 mentioned in diff` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No gradient animation found in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ranking rotation logic in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No three-layer architecture in diff` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No role-pill styling in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No endorsed styling in diff` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No spec page with 11 chapters in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No proof page verification in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No accent classes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console with 9 chapters in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No capability cards in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No contractor profile wiring in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No map tile layer in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler page in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ticker UI in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No attribution bar in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No DIRECT labeling in diff` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No search functionality in diff` ⚠️ **warn** — cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `at commit:a1066db8:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No signal wiring in diff` ⚠️ **warn** — cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `at commit:a1066db8:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No cost-based coloring in diff` ⚠️ **warn** — cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `at commit:a1066db8:62` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No click propagation logic in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `at commit:a1066db8:65` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Turner Construction profile in diff` </details> <details><summary><b>kb_query</b> — 179 findings (0 block, 16 warn, 163 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ⚠️ **warn** — scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `reviewed_at: 2026-04-26T23:27:44.907Z` - `preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes` ℹ️ **info** — scrum-master review for `crates/gateway/src/main.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-25T23:42:49.497Z` - `preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with `/v1`, `/ingest`, AI client, secrets, journal, vectord memory stores, bucket registr` ℹ️ **info** — scrum-master review for `crates/gateway/src/v1/mod.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-26T23:12:34.425Z` - `preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible `/v1/chat` skeleton with basic prov` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 35 flaggings, conf=0.03): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 35 flaggings, conf=0.03): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 34 flaggings, conf=0.03): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 34 flaggings, conf=0.03): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 48 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 24 flaggings, conf=0.13): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 11 flaggings, conf=0.27): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 7 flaggings, conf=0.29): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 7 flaggings, conf=0.29): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `signature=c61ad10a3392f7bd` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=1032d1a48899bdd4` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d - `signature=f037b8babf6d9c8a` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=d910e3254cf03240` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d - `signature=ddebe1faaff0b1e6` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 - `signature=4434173af432daf6` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway - `signature=298880b9310be38b` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d - `signature=f6ad293c96a80fd3` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 10 findings (2 block, 6 warn, 2 info)</summary> 🛑 **block** — Embed cache key collision between models with same text - `crates/aibridge/src/client.rs:40–44` - `The `EmbedCacheKey` struct keys on `(model, text)` but when two different embedding models produce vectors of different dimensions, the cache can return a mismatched vector from mo` - `[grounding: verified at crates/aibridge/src/client.rs:40]` ⚠️ **warn** — Session logger silently succeeds on permission errors - `crates/gateway/src/v1/session_log.rs:105–112` - ``append()` catches all I/O errors at line 109 and logs a warning without surfacing the error to the caller. A persistent write failure (e.g., read-only filesystem, permission denie` - `[grounding: verified at crates/gateway/src/v1/session_log.rs:105]` 🛑 **block** — Unverified sidecar retirement assumption - `crates/aibridge/src/client.rs:1–16` - `The diff retires the Python sidecar and rewires `AiClient` to call Ollama directly at `:11434`. The config default changes from `:3200` (sidecar) to `:11434` (Ollama). However, the` - `[grounding: verified at crates/aibridge/src/client.rs:1]` ⚠️ **warn** — Session log rows may be torn across concurrent appends - `crates/gateway/src/v1/session_log.rs:123–133` - `The mutex protects only the serde_json serialization and file open, not the write atomicity. Two concurrent `append()` calls on the same `SessionLogger` can interleave their writes` - `[grounding: verified at crates/gateway/src/v1/session_log.rs:123]` ⚠️ **warn** — Extract JSON made public without export from lib.rs - `crates/gateway/src/lib.rs:1–19` - ``extract_json` is made `pub` at line 452 to support a parity probe binary, but it is NOT re-exported from `lib.rs`. The new parity binary at `crates/gateway/src/bin/parity_extract_` - `[grounding: verified at crates/gateway/src/lib.rs:1]` ⚠️ **warn** — Trace ID header propagation bypasses validation - `crates/gateway/src/v1/iterate.rs:111–118` - `The trace ID is read from an untrusted client header (`TRACE_ID_HEADER`) at line 114 and immediately stamped into the session log and Langfuse emissions without validation. A malic` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:111]` ℹ️ **info** — Sidecar default URL points to direct Ollama but config field is still named "sidecar" - `crates/shared/src/config.rs:158–161` - `The config field is `[sidecar].url` (not renamed) for "migration compatibility" but the default now points to Ollama's native API port. This is a semantic lie: the field is labeled` - `[grounding: verified at crates/shared/src/config.rs:158]` ⚠️ **warn** — Ollama embed response parsing assumes single-batch input - `crates/aibridge/src/client.rs:310–333` - `The `embed_uncached()` loop at line 303 sends one text per request to `/api/embed` and expects `{"embeddings": [[...]]}` with a single inner vector. Ollama 0.4+ supports batch inpu` - `[grounding: verified at crates/aibridge/src/client.rs:310]` ⚠️ **warn** — Missing validation of session_log_path directory existence at startup - `crates/gateway/src/main.rs:364–379` - `The session logger is constructed at line 375 by calling `SessionLogger::from_path(path)`, which returns `None` on empty path but does not validate the directory exists or is writa` - `[grounding: verified at crates/gateway/src/main.rs:364]` ℹ️ **info** — STATE_OF_PLAY.md is not tracked in git and will diverge from runtime - `STATE_OF_PLAY.md` - `This 239-line operational status document is committed as static markdown, but the README's own prose at lines 5–6 states "If memory contradicts this file, this file wins" and "Upd` </details> ### Metrics ```json { "audit_duration_ms": 163135, "findings_total": 220, "findings_block": 10, "findings_warn": 43, "findings_info": 167, "claims_strong": 13, "claims_moderate": 20, "claims_weak": 0, "claims_empirical": 0, "claims_total": 33, "diff_bytes": 753215 } ``` <sub>Lakehouse auditor · SHA 57bde63a · re-audit on new commit flips the status automatically.</sub>
profit added 1 commit 2026-05-02 11:24:45 +00:00
gateway: IterateResponse echoes trace_id + enable session_log_path
Some checks failed
lakehouse/auditor 14 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
98b6647f2a
Closes the 2026-05-02 cross-runtime parity gap: Go's
validator.IterateResponse carried trace_id back to callers; Rust's
didn't. A caller pivoting from response → Langfuse → session log
worked on Go but failed on Rust because the join key wasn't visible
in the response body.

## Changes

crates/gateway/src/v1/iterate.rs:
  - IterateResponse + IterateFailure gain `trace_id: Option<String>`
    (skip-serializing-if-none preserves backward-compat for any
    consumer parsing the response without the field)
  - Both return sites populated with the resolved trace_id

lakehouse.toml:
  - [gateway].session_log_path set to /tmp/lakehouse-validator/sessions.jsonl
    — same path Go validatord writes to. The two daemons now co-write
    one unified longitudinal log; rows tag daemon="gateway" vs
    daemon="validatord" so producers stay distinguishable in DuckDB
    queries. Append-write is atomic at the row sizes both runtimes
    produce, so concurrent writes from both daemons are safe.

## Verification

Post-restart of lakehouse.service:
  POST /v1/iterate with X-Lakehouse-Trace-Id: rust-fix1-test
    → response.trace_id = "rust-fix1-test" ✓ (was: field absent)
    → sessions.jsonl latest row daemon=gateway, session_id=rust-fix1-test ✓ (was: no row)

Cross-runtime drive — same prompt to Rust :3100 and Go :4110:
  Rust:  trace_id=unified-rust-001, daemon=gateway, accepted
  Go:    trace_id=unified-go-001,   daemon=validatord, accepted
  Same file, distinct daemons, one query covers both:
    SELECT daemon, COUNT(*) FROM read_json_auto('sessions.jsonl', format='nd') GROUP BY daemon
    → gateway: 2, validatord: 19

All 4 parity probes still 6/6 + 12/12 + 4/4 + 2/2 against live
:3100 + :4110 stacks. Cargo test 4/4 PASS for v1::iterate module.

## Architecture invariant

The "unified longitudinal log" thesis is now demonstrated. Operators
running both runtimes in production point both daemons at the same
session_log_path and DuckDB queries naturally span both producers.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 14 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
Head SHA: 98b6647f2a96
Audited at: 2026-05-02T11:27:40.290Z

static — 3 findings (0 block, 3 warn, 0 info)

⚠️ warn — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer

  • crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts
  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 29 findings (12 block, 16 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 17478ms wall-clock) (truncated 754439→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 29
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 43755 chars
    ⚠️ warn — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • at commit:ba928b1d:79
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No evidence of Rust process model changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • at commit:9eed982f:18
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Go stack or :4110 references in diff
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No animation or gradient changes in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ranking schedule changes in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No three-layer implementation in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification changes in diff
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No role-pill styling changes in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No endorsed styling changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console playwright verification in diff
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No spec page changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No proof page changes in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No accent class changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console chapter changes in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No capability card changes in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No contractor profile changes in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding changes in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No map tile changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler page changes in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ticker changes in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No attribution changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler verification in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No direct attribution changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on the public URL:"
  • at commit:ba41ad28:38
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No public URL verification in diff
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No search functionality changes in diff
    ⚠️ warn — cloud: claim not backed — "works on devop.live)"
  • at commit:f6a7621b:40
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No devop.live verification in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • at commit:f6a7621b:43
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No playwright verification in diff
kb_query — 181 findings (0 block, 17 warn, 164 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ⚠️ warn — scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • reviewed_at: 2026-04-26T23:27:44.907Z
  • preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes
    ℹ️ info — scrum-master review for crates/gateway/src/main.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-25T23:42:49.497Z
  • preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with /v1, /ingest, AI client, secrets, journal, vectord memory stores, bucket registr
    ℹ️ info — scrum-master review for crates/gateway/src/v1/mod.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-26T23:12:34.425Z
  • preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible /v1/chat skeleton with basic prov
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 31 flaggings, conf=0.03): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 31 flaggings, conf=0.03): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 48 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 26 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 30 flaggings, conf=0.03): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 30 flaggings, conf=0.03): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 25 flaggings, conf=0.12): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (2 distinct PRs, 8 flaggings, conf=0.25): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ℹ️ info — recurring audit pattern (2 distinct PRs, 8 flaggings, conf=0.25): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • signature=c61ad10a3392f7bd
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=1032d1a48899bdd4
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d
  • signature=f037b8babf6d9c8a
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=d910e3254cf03240
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d
  • signature=ddebe1faaff0b1e6
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1
  • signature=4434173af432daf6
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway
  • signature=298880b9310be38b
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d
  • signature=f6ad293c96a80fd3
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • signature=4d93acf8c8d5a683
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=37c5f6ca656ebf90
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 10 findings (2 block, 6 warn, 2 info)

⚠️ warnnew_trace_id() uses wall-clock + subsec_nanos — collisions possible under load

  • crates/gateway/src/v1/iterate.rs:451-458
  • The fallback trace-id generator concatenates timestamp_nanos_opt()withsubsec_nanos() from two different clocks. Both can return identical values across concurrent requests wi
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:451]
    ⚠️ warnAiClient::new() silently ignores LH_EMBED_CACHE_SIZE env var — config bypass
  • crates/aibridge/src/client.rs:141-142
  • The constructor hardcodes DEFAULT_EMBED_CACHE_SIZE(4096) with no env override, while the comment claims it's "Tunable via [aibridge].embed_cache_size in the config." There's no
  • [grounding: verified at crates/aibridge/src/client.rs:141]
    ℹ️ infoembed_uncached() per-text loop ignores Ollama batch API — N× latency for N texts
  • crates/aibridge/src/client.rs:296-335
  • The comment admits Ollama 0.4+ supports batch input, but the implementation loops per-text to "keep compatibility broader." For a 32-text RAG query this is 32 sequential HTTP round
  • [grounding: verified at crates/aibridge/src/client.rs:296]
    ℹ️ infoclient_workerskjkk manifest deleted but .gitignore still references data/headshots/face_*.jpg pattern — unrelated schema debris
  • .gitignore:7-8
  • The client_workerskjkkdeletion (data/_catalog/manifests/564b00ae...) removes a broken catalog entry, but the.gitignoreaddition in the same PR introduces adata/headshots/fa`
  • [grounding: verified at .gitignore:7]
    ⚠️ warnSessionLogger::append() uses tokio::fs::create_dir_all without DirBuilder mode — permissions leak on umask-restricted systems
  • crates/gateway/src/v1/session_log.rs:178-182
  • The lazy mkdir creates parent directories with default permissions (subject to process umask). On systems where the gateway runs under a dedicated user but the log directory needs
  • [grounding: verified at crates/gateway/src/v1/session_log.rs:178]
    ⚠️ warnemit_attempt_span() spawns fire-and-forget task without abort handle — memory pressure under Langfuse outage
  • crates/gateway/src/v1/langfuse_trace.rs:85-94
  • The tokio::spawn() for attempt-span emission has no timeout, no backpressure, and no cancellation. If Langfuse is slow or the network is partitioned, these tasks accumulate in th
  • [grounding: verified at crates/gateway/src/v1/langfuse_trace.rs:85]
    🛑 blockollama_cloud provider base_url changed to https://ollama.com — path routing assumption unverified
  • config/providers.toml:22
  • The Ollama Cloud provider now points at https://ollama.com(the marketing site) instead ofhttps://ollama.com/api or a dedicated inference endpoint. The comment says "Model-pre
  • [grounding: verified at config/providers.toml:22]
    ⚠️ warngenerate() body construction drops req.model into Ollama's model field without prefix stripping
  • crates/aibridge/src/client.rs:372-373
  • The generate()method takesreq.model(which may be"cloud/deepseek-v3.2"or"openrouter/kimi-k2.6") and passes it directly to Ollama's model field. Ollama expects bare m
  • [grounding: verified at crates/aibridge/src/client.rs:372]
    ⚠️ warnnvidia_smi_snapshot() parses single-GPU output but vram_snapshot() returns "gpu": <single object> — multi-GPU systems get silent data loss
  • crates/aibridge/src/client.rs:556-575
  • The nvidia-smi query returns one line per GPU, but the parser reads only the first line and returns a single JSON object. On multi-GPU systems, the remaining GPUs are silently dr
  • [grounding: verified at crates/aibridge/src/client.rs:556]
    🛑 blockparity_extract_json.rs and parity_session_log.rs binaries use gateway::v1::iterate::extract_json and gateway::v1::session_log::SessionRecord — but lib.rs only exposes pub mod v1, not the nested items
  • crates/gateway/src/lib.rs:1-19
  • The new lib.rsfacade exposespub mod v1, but extract_jsonis defined inv1::iteratewhich ispubwithinv1, and SessionRecordis inv1::session_log. The binary pa`
  • [grounding: verified at crates/gateway/src/lib.rs:1]

Metrics

{
  "audit_duration_ms": 165086,
  "findings_total": 224,
  "findings_block": 14,
  "findings_warn": 42,
  "findings_info": 168,
  "claims_strong": 12,
  "claims_moderate": 17,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 29,
  "diff_bytes": 754439
}

Lakehouse auditor · SHA 98b6647f · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 14 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" **Head SHA:** `98b6647f2a96` **Audited at:** 2026-05-02T11:27:40.290Z <details><summary><b>static</b> — 3 findings (0 block, 3 warn, 0 info)</summary> ⚠️ **warn** — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 29 findings (12 block, 16 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 17478ms wall-clock) (truncated 754439→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 29` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 43755 chars` ⚠️ **warn** — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `at commit:ba928b1d:79` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No evidence of Rust process model changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `at commit:9eed982f:18` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Go stack or :4110 references in diff` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No animation or gradient changes in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ranking schedule changes in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No three-layer implementation in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification changes in diff` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No role-pill styling changes in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No endorsed styling changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console playwright verification in diff` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No spec page changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No proof page changes in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No accent class changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console chapter changes in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No capability card changes in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No contractor profile changes in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding changes in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No map tile changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler page changes in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ticker changes in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No attribution changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler verification in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No direct attribution changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on the public URL:" - `at commit:ba41ad28:38` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No public URL verification in diff` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No search functionality changes in diff` ⚠️ **warn** — cloud: claim not backed — "works on devop.live)" - `at commit:f6a7621b:40` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No devop.live verification in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `at commit:f6a7621b:43` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No playwright verification in diff` </details> <details><summary><b>kb_query</b> — 181 findings (0 block, 17 warn, 164 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ⚠️ **warn** — scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `reviewed_at: 2026-04-26T23:27:44.907Z` - `preview: ```json { "verdict": "fail", "critical_failures": [ { "id": "CF-1", "file": "mcp-server/observer.ts:137", "description": "Execution memory writes` ℹ️ **info** — scrum-master review for `crates/gateway/src/main.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-25T23:42:49.497Z` - `preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with `/v1`, `/ingest`, AI client, secrets, journal, vectord memory stores, bucket registr` ℹ️ **info** — scrum-master review for `crates/gateway/src/v1/mod.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-26T23:12:34.425Z` - `preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible `/v1/chat` skeleton with basic prov` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 31 flaggings, conf=0.03): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 31 flaggings, conf=0.03): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 48 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 26 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 30 flaggings, conf=0.03): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 30 flaggings, conf=0.03): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 25 flaggings, conf=0.12): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 12 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 8 flaggings, conf=0.25): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 8 flaggings, conf=0.25): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `signature=c61ad10a3392f7bd` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=1032d1a48899bdd4` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d - `signature=f037b8babf6d9c8a` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=d910e3254cf03240` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d - `signature=ddebe1faaff0b1e6` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 - `signature=4434173af432daf6` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway - `signature=298880b9310be38b` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d - `signature=f6ad293c96a80fd3` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `signature=4d93acf8c8d5a683` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=37c5f6ca656ebf90` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 10 findings (2 block, 6 warn, 2 info)</summary> ⚠️ **warn** — `new_trace_id()` uses wall-clock + subsec_nanos — collisions possible under load - `crates/gateway/src/v1/iterate.rs:451-458` - `The fallback trace-id generator concatenates `timestamp_nanos_opt()` with `subsec_nanos()` from two different clocks. Both can return identical values across concurrent requests wi` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:451]` ⚠️ **warn** — `AiClient::new()` silently ignores `LH_EMBED_CACHE_SIZE` env var — config bypass - `crates/aibridge/src/client.rs:141-142` - `The constructor hardcodes `DEFAULT_EMBED_CACHE_SIZE` (4096) with no env override, while the comment claims it's "Tunable via [aibridge].embed_cache_size in the config." There's no ` - `[grounding: verified at crates/aibridge/src/client.rs:141]` ℹ️ **info** — `embed_uncached()` per-text loop ignores Ollama batch API — N× latency for N texts - `crates/aibridge/src/client.rs:296-335` - `The comment admits Ollama 0.4+ supports batch input, but the implementation loops per-text to "keep compatibility broader." For a 32-text RAG query this is 32 sequential HTTP round` - `[grounding: verified at crates/aibridge/src/client.rs:296]` ℹ️ **info** — `client_workerskjkk` manifest deleted but `.gitignore` still references `data/headshots/face_*.jpg` pattern — unrelated schema debris - `.gitignore:7-8` - `The `client_workerskjkk` deletion (data/_catalog/manifests/564b00ae...) removes a broken catalog entry, but the `.gitignore` addition in the same PR introduces a `data/headshots/fa` - `[grounding: verified at .gitignore:7]` ⚠️ **warn** — `SessionLogger::append()` uses `tokio::fs::create_dir_all` without `DirBuilder` mode — permissions leak on umask-restricted systems - `crates/gateway/src/v1/session_log.rs:178-182` - `The lazy mkdir creates parent directories with default permissions (subject to process umask). On systems where the gateway runs under a dedicated user but the log directory needs ` - `[grounding: verified at crates/gateway/src/v1/session_log.rs:178]` ⚠️ **warn** — `emit_attempt_span()` spawns fire-and-forget task without abort handle — memory pressure under Langfuse outage - `crates/gateway/src/v1/langfuse_trace.rs:85-94` - `The `tokio::spawn()` for attempt-span emission has no timeout, no backpressure, and no cancellation. If Langfuse is slow or the network is partitioned, these tasks accumulate in th` - `[grounding: verified at crates/gateway/src/v1/langfuse_trace.rs:85]` 🛑 **block** — `ollama_cloud` provider `base_url` changed to `https://ollama.com` — path routing assumption unverified - `config/providers.toml:22` - `The Ollama Cloud provider now points at `https://ollama.com` (the marketing site) instead of `https://ollama.com/api` or a dedicated inference endpoint. The comment says "Model-pre` - `[grounding: verified at config/providers.toml:22]` ⚠️ **warn** — `generate()` body construction drops `req.model` into Ollama's `model` field without prefix stripping - `crates/aibridge/src/client.rs:372-373` - `The `generate()` method takes `req.model` (which may be `"cloud/deepseek-v3.2"` or `"openrouter/kimi-k2.6"`) and passes it directly to Ollama's `model` field. Ollama expects bare m` - `[grounding: verified at crates/aibridge/src/client.rs:372]` ⚠️ **warn** — `nvidia_smi_snapshot()` parses single-GPU output but `vram_snapshot()` returns `"gpu": <single object>` — multi-GPU systems get silent data loss - `crates/aibridge/src/client.rs:556-575` - `The `nvidia-smi` query returns one line per GPU, but the parser reads only the first line and returns a single JSON object. On multi-GPU systems, the remaining GPUs are silently dr` - `[grounding: verified at crates/aibridge/src/client.rs:556]` 🛑 **block** — `parity_extract_json.rs` and `parity_session_log.rs` binaries use `gateway::v1::iterate::extract_json` and `gateway::v1::session_log::SessionRecord` — but `lib.rs` only exposes `pub mod v1`, not the nested items - `crates/gateway/src/lib.rs:1-19` - `The new `lib.rs` facade exposes `pub mod v1`, but `extract_json` is defined in `v1::iterate` which is `pub` within `v1`, and `SessionRecord` is in `v1::session_log`. The binary `pa` - `[grounding: verified at crates/gateway/src/lib.rs:1]` </details> ### Metrics ```json { "audit_duration_ms": 165086, "findings_total": 224, "findings_block": 14, "findings_warn": 42, "findings_info": 168, "claims_strong": 12, "claims_moderate": 17, "claims_weak": 0, "claims_empirical": 0, "claims_total": 29, "diff_bytes": 754439 } ``` <sub>Lakehouse auditor · SHA 98b6647f · re-audit on new commit flips the status automatically.</sub>
profit added 1 commit 2026-05-03 01:07:11 +00:00
lance backend: 4-pack — bug fix + smoke + tests + 10M re-bench
Some checks failed
lakehouse/auditor 12 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
7594725c25
Surfaced by the 2026-05-02 audit (vectord-lance + lance-bench + glue
existed and worked but had no tests, no smoke, leaked server paths
on missing-index search, and the ADR-019 10M re-bench was deferred).

## 1. Fix: missing-index search returned 500 + leaked filesystem path

Pre-fix:
  $ POST /vectors/lance/search/no-such-index
  HTTP 500
  Dataset at path home/profit/lakehouse/data/lance/no-such-index was
  not found: Not found: home/profit/lakehouse/data/lance/no-such-index/
  _versions, /root/.cargo/registry/src/index.crates.io-...-1949cf8c.../
  lance-table-4.0.0/src/io/commit.rs:364:26, ...

Post-fix:
  HTTP 404
  lance dataset not found: no-such-index

Added `sanitize_lance_err()` in crates/vectord/src/service.rs that:
  - maps "not found" / "no such file" patterns → 404 (was 500)
  - strips /home/ and /root/.cargo/ paths from any error body
Applied to all 5 lance handlers: search, get_doc, build_index,
append, migrate. The store_for() handle is cheap-and-stateless;
the actual disk hit happens inside the operation, which is where
the leak originated.

## 2. scripts/lance_smoke.sh — first regression gate

9-probe smoke against the live HTTP surface. Exercises only read
paths (no state mutation in CI). Specifically locks the sanitizer
fix — a future regression that re-introduces the path leak fires
the smoke immediately. 9/9 PASS against the live :3100 today.

## 3. Unit tests on vectord-lance/src/lib.rs (was: zero tests)

7 tests covering the public LanceVectorStore API:
  - fresh_store_reports_no_state — handle is lazy
  - migrate_then_count_and_fetch — Parquet → Lance round-trip
  - get_by_doc_id_missing_returns_none — Ok(None) vs Err contract
    that lets the HTTP handler return 404 cleanly
  - append_grows_count_and_new_rows_fetchable — ADR-019's
    structural-difference claim verified at the unit level
  - append_dim_mismatch_errors — guards against silently breaking
    search by accepting inconsistent-dim rows
  - search_returns_nearest — exact-vector match → top-1
  - stats_reports_post_migrate_state — locks the field shape

7/7 PASS. cargo test -p vectord-lance --lib green.

## 4. 10M re-bench (deferred from ADR-019)

reports/lance_10m_rebench_2026-05-02.md captures the numbers driven
against the live :3100 over data/lance/scale_test_10m (33GB / 10M
vectors, IVF_PQ confirmed via response method tag).

Headline:
  Search cold (10 diverse queries):   median ~32ms, mean ~46ms
  Search warm (5x same query):        ~20ms p50
  Doc fetch (5x same id):             ~100ms p50

Search latency at 10M is acceptable for batch / async workloads,
too slow for sub-10ms voice/recommendation paths. ADR-019's "Lance
pulls ahead at 10M" claim remains unverified-but-not-refuted — at
this scale HNSW doesn't operationally exist (10M × 768d × 4 bytes =
30GB just for vectors).

Real finding: doc-fetch at 10M is 300x slower than the 100K number
ADR-019 cited (311μs → ~100ms). Likely cause: scalar btree index
on doc_id may not be built for this dataset. Follow-up to
investigate whether forcing build_scalar_index brings it back to
the load-bearing O(1) range. Captured in the report.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 12 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
Head SHA: 7594725c251e
Audited at: 2026-05-03T01:11:04.721Z

static — 3 findings (0 block, 3 warn, 0 info)

⚠️ warn — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer

  • crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts
  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 30 findings (12 block, 17 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 14331ms wall-clock) (truncated 777535→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 30
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 43847 chars
    ⚠️ warn — cloud: claim not backed — "7/7 PASS. cargo test -p vectord-lance --lib green."
  • at commit:7594725c:50
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No mention of vectord-lance crate or tests in diff
    ⚠️ warn — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • at commit:ba928b1d:79
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No process model or binary consolidation in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • at commit:9eed982f:18
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No Go stack or :4110 reference in diff
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No animation or gradient UI changes in diff
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ranking or schedule rotation logic in diff
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No three-layer architecture described in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no playwright or devop.live/lakehouse verification
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No role-pill styling changes in diff
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No endorsed styling changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no console playwright verification
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding changes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no devop.live/lakehouse playwright verification
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No spec page or chapter structure in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No proof page verification in diff
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No accent classes in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No console chapters in diff
    🛑 block — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • at commit:db81fd88:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No capability cards in diff
    ⚠️ warn — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • at commit:db81fd88:24
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No contractor profile wiring in diff
    ⚠️ warn — cloud: claim not backed — "Color-coded green/red."
  • at commit:a7890009:19
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No color coding in diff
    ⚠️ warn — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • at commit:a7890009:37
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No map tile layer in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:a7890009:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler page in diff
    ⚠️ warn — cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • at commit:aa56fbce:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No ticker or price UI in diff
    ⚠️ warn — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • at commit:aa56fbce:17
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No attribution bar coloring in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • at commit:aa56fbce:45
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No profiler page in diff
    ⚠️ warn — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • at commit:ba41ad28:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No direct attribution logic in diff
    🛑 block — cloud: claim not backed — "Verified end-to-end on the public URL:"
  • at commit:ba41ad28:38
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no public URL verification
    ⚠️ warn — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • at commit:ba41ad28:42
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: No search functionality in diff
    ⚠️ warn — cloud: claim not backed — "works on devop.live)"
  • at commit:f6a7621b:40
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no devop.live functionality
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • at commit:f6a7621b:43
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no public URL playwright verification
kb_query — 183 findings (0 block, 16 warn, 167 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ℹ️ info — scrum-master review for crates/vectord/src/service.rs — accepted on attempt 1 by ollama/qwen3.5:latest (tree-split)
  • reviewed_at: 2026-04-23T05:35:38.718Z
  • preview: ### 1. Alignment Score: **6/10** **Rationale:** The file implements core service logic (RAG, Index management, Playbook retirement) that aligns with the PRD's architectur
    ℹ️ info — scrum-master review for crates/gateway/src/main.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-25T23:42:49.497Z
  • preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with /v1, /ingest, AI client, secrets, journal, vectord memory stores, bucket registr
    ℹ️ info — scrum-master review for crates/gateway/src/v1/mod.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-26T23:12:34.425Z
  • preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible /v1/chat skeleton with basic prov
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 25 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 46 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 26 flaggings, conf=0.12): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ℹ️ info — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • signature=c61ad10a3392f7bd
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=1032d1a48899bdd4
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d
  • signature=f037b8babf6d9c8a
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=d910e3254cf03240
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d
  • signature=ddebe1faaff0b1e6
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1
  • signature=4434173af432daf6
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway
  • signature=298880b9310be38b
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d
  • signature=f6ad293c96a80fd3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • signature=4d93acf8c8d5a683
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=37c5f6ca656ebf90
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=7433343a46eaaa0a
  • checks: static
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1
  • signature=810539a4a0d66361
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 10 findings (0 block, 4 warn, 6 info)

⚠️ warn — Unverified embed cache dimension consistency on all-hit case

  • crates/aibridge/src/client.rs:253
  • When all texts are cache hits, cached_dimis read to populate response dimensions. Ifcached_dim was never populated (first startup, no prior embed calls), it reads 0, then fal
  • [grounding: verified at crates/aibridge/src/client.rs:253]
    ⚠️ warn — Session record timestamp pinned in parity binary, not in live gateway
  • crates/gateway/src/bin/parity_session_log.rs:50
  • The parity test helper pins timestamp to "2026-01-01T00:00:00+00:00"for reproducible testing. However, the realbuild_session_record()in iterate.rs:385 callschrono::Utc::no`
  • [grounding: verified at crates/gateway/src/bin/parity_session_log.rs:50]
    ℹ️ info — Lance error sanitization strips the error message entirely in edge case
  • crates/vectord/src/service.rs:1901-1922
  • The sanitize_lance_err()function splits on/root/.cargo/and/home/, taking the first part. If an error contains BOTH patterns, only the first split succeeds, possibly leavi
  • [grounding: verified at crates/vectord/src/service.rs:1901]
    ⚠️ warn — Ollama direct-call migration changes request envelope without validation
  • crates/aibridge/src/client.rs:365-395
  • The generate()function was refactored from calling/generateon the Python sidecar to calling/api/generatedirectly on Ollama. The new code constructs a JSON body withopt`
  • [grounding: verified at crates/aibridge/src/client.rs:365]
    ℹ️ info — Session log write is best-effort fire-and-forget; no observability of drops
  • crates/gateway/src/v1/session_log.rs:106-111
  • The append()method is async but returns()(notResult); failures land in tracing::warn! only. If the session log volume exceeds filesystem bandwidth or the target disk fi
  • [grounding: verified at crates/gateway/src/v1/session_log.rs:106]
    ℹ️ info — Extract JSON public export creates API surface without deprecation path
  • crates/gateway/src/v1/iterate.rs:459-467
  • The extract_json()function was madepub to support the cross-runtime parity probe (2026-05-02). This creates a public API that the test harness now depends on. If the extracti
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:459]
    ⚠️ warn — Trace ID header propagation not validated for injection
  • crates/gateway/src/v1/iterate.rs:117-123
  • The TRACE_ID_HEADER value is passed directly from the HTTP header into the Langfuse trace tree. A caller could inject an arbitrary trace ID to pollute Langfuse or link sessions t
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:117]
    ℹ️ info — Config field [sidecar].url renamed semantically but retains old name
  • crates/shared/src/config.rs:149-154
  • The default sidecar URL changed from :3200(Python sidecar) to:11434(Ollama direct). The comment notes this is for "migration compatibility" but existing operators with[sid`
  • [grounding: verified at crates/shared/src/config.rs:149]
    ℹ️ info — Manifest row_count updated for one dataset but no bulk refresh mechanism
  • data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14-16
  • The playbook_memory dataset manifest was updated to include row_count: 2077and acolumns array. However, this is a manual edit in the diff, not generated by any catalog refres
  • [grounding: verified at data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14]
    ℹ️ info — VectorD-lance tests added post-launch with no fixture versioning
  • crates/vectord-lance/src/lib.rs:606-795
  • 145 lines of tests were added for Lance (per the PRIOR FINDINGS: "vectord-lance had ZERO tests despite being on the live HTTP path"). The tests use synthetic Parquet data and temp
  • [grounding: verified at crates/vectord-lance/src/lib.rs:606]

Metrics

{
  "audit_duration_ms": 158184,
  "findings_total": 227,
  "findings_block": 12,
  "findings_warn": 40,
  "findings_info": 175,
  "claims_strong": 12,
  "claims_moderate": 18,
  "claims_weak": 0,
  "claims_empirical": 0,
  "claims_total": 30,
  "diff_bytes": 777535
}

Lakehouse auditor · SHA 7594725c · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 12 blocking issues: cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" **Head SHA:** `7594725c251e` **Audited at:** 2026-05-03T01:11:04.721Z <details><summary><b>static</b> — 3 findings (0 block, 3 warn, 0 info)</summary> ⚠️ **warn** — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 30 findings (12 block, 17 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 14331ms wall-clock) (truncated 777535→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 30` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 43847 chars` ⚠️ **warn** — cloud: claim not backed — "7/7 PASS. cargo test -p vectord-lance --lib green." - `at commit:7594725c:50` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No mention of vectord-lance crate or tests in diff` ⚠️ **warn** — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `at commit:ba928b1d:79` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No process model or binary consolidation in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `at commit:9eed982f:18` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No Go stack or :4110 reference in diff` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No animation or gradient UI changes in diff` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ranking or schedule rotation logic in diff` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No three-layer architecture described in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no playwright or devop.live/lakehouse verification` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No role-pill styling changes in diff` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No endorsed styling changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no console playwright verification` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding changes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no devop.live/lakehouse playwright verification` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No spec page or chapter structure in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No proof page verification in diff` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No accent classes in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No console chapters in diff` 🛑 **block** — cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `at commit:db81fd88:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No capability cards in diff` ⚠️ **warn** — cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `at commit:db81fd88:24` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No contractor profile wiring in diff` ⚠️ **warn** — cloud: claim not backed — "Color-coded green/red." - `at commit:a7890009:19` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No color coding in diff` ⚠️ **warn** — cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `at commit:a7890009:37` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No map tile layer in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:a7890009:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler page in diff` ⚠️ **warn** — cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `at commit:aa56fbce:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No ticker or price UI in diff` ⚠️ **warn** — cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `at commit:aa56fbce:17` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No attribution bar coloring in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `at commit:aa56fbce:45` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No profiler page in diff` ⚠️ **warn** — cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `at commit:ba41ad28:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No direct attribution logic in diff` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on the public URL:" - `at commit:ba41ad28:38` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no public URL verification` ⚠️ **warn** — cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `at commit:ba41ad28:42` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: No search functionality in diff` ⚠️ **warn** — cloud: claim not backed — "works on devop.live)" - `at commit:f6a7621b:40` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no devop.live functionality` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `at commit:f6a7621b:43` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no public URL playwright verification` </details> <details><summary><b>kb_query</b> — 183 findings (0 block, 16 warn, 167 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ℹ️ **info** — scrum-master review for `crates/vectord/src/service.rs` — accepted on attempt 1 by `ollama/qwen3.5:latest` (tree-split) - `reviewed_at: 2026-04-23T05:35:38.718Z` - `preview: ### 1. Alignment Score: **6/10** **Rationale:** The file implements core service logic (RAG, Index management, Playbook retirement) that aligns with the PRD's architectur` ℹ️ **info** — scrum-master review for `crates/gateway/src/main.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-25T23:42:49.497Z` - `preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with `/v1`, `/ingest`, AI client, secrets, journal, vectord memory stores, bucket registr` ℹ️ **info** — scrum-master review for `crates/gateway/src/v1/mod.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-26T23:12:34.425Z` - `preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible `/v1/chat` skeleton with basic prov` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 25 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 46 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 26 flaggings, conf=0.12): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 13 flaggings, conf=0.23): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `signature=c61ad10a3392f7bd` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=1032d1a48899bdd4` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d - `signature=f037b8babf6d9c8a` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=d910e3254cf03240` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d - `signature=ddebe1faaff0b1e6` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 - `signature=4434173af432daf6` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway - `signature=298880b9310be38b` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d - `signature=f6ad293c96a80fd3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `signature=4d93acf8c8d5a683` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=37c5f6ca656ebf90` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=7433343a46eaaa0a` - `checks: static` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 - `signature=810539a4a0d66361` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 10 findings (0 block, 4 warn, 6 info)</summary> ⚠️ **warn** — Unverified embed cache dimension consistency on all-hit case - `crates/aibridge/src/client.rs:253` - `When all texts are cache hits, `cached_dim` is read to populate response dimensions. If `cached_dim` was never populated (first startup, no prior embed calls), it reads 0, then fal` - `[grounding: verified at crates/aibridge/src/client.rs:253]` ⚠️ **warn** — Session record timestamp pinned in parity binary, not in live gateway - `crates/gateway/src/bin/parity_session_log.rs:50` - `The parity test helper pins timestamp to `"2026-01-01T00:00:00+00:00"` for reproducible testing. However, the real `build_session_record()` in iterate.rs:385 calls `chrono::Utc::no` - `[grounding: verified at crates/gateway/src/bin/parity_session_log.rs:50]` ℹ️ **info** — Lance error sanitization strips the error message entirely in edge case - `crates/vectord/src/service.rs:1901-1922` - `The `sanitize_lance_err()` function splits on `/root/.cargo/` and `/home/`, taking the first part. If an error contains BOTH patterns, only the first split succeeds, possibly leavi` - `[grounding: verified at crates/vectord/src/service.rs:1901]` ⚠️ **warn** — Ollama direct-call migration changes request envelope without validation - `crates/aibridge/src/client.rs:365-395` - `The `generate()` function was refactored from calling `/generate` on the Python sidecar to calling `/api/generate` directly on Ollama. The new code constructs a JSON body with `opt` - `[grounding: verified at crates/aibridge/src/client.rs:365]` ℹ️ **info** — Session log write is best-effort fire-and-forget; no observability of drops - `crates/gateway/src/v1/session_log.rs:106-111` - `The `append()` method is async but returns `()` (not `Result`); failures land in `tracing::warn!` only. If the session log volume exceeds filesystem bandwidth or the target disk fi` - `[grounding: verified at crates/gateway/src/v1/session_log.rs:106]` ℹ️ **info** — Extract JSON public export creates API surface without deprecation path - `crates/gateway/src/v1/iterate.rs:459-467` - `The `extract_json()` function was made `pub` to support the cross-runtime parity probe (2026-05-02). This creates a public API that the test harness now depends on. If the extracti` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:459]` ⚠️ **warn** — Trace ID header propagation not validated for injection - `crates/gateway/src/v1/iterate.rs:117-123` - `The `TRACE_ID_HEADER` value is passed directly from the HTTP header into the Langfuse trace tree. A caller could inject an arbitrary trace ID to pollute Langfuse or link sessions t` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:117]` ℹ️ **info** — Config field `[sidecar].url` renamed semantically but retains old name - `crates/shared/src/config.rs:149-154` - `The default sidecar URL changed from `:3200` (Python sidecar) to `:11434` (Ollama direct). The comment notes this is for "migration compatibility" but existing operators with `[sid` - `[grounding: verified at crates/shared/src/config.rs:149]` ℹ️ **info** — Manifest row_count updated for one dataset but no bulk refresh mechanism - `data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14-16` - `The playbook_memory dataset manifest was updated to include `row_count: 2077` and a `columns` array. However, this is a manual edit in the diff, not generated by any catalog refres` - `[grounding: verified at data/_catalog/manifests/32ee74a0-59b4-4e5b-8edb-70c9347a4bf3.json:14]` ℹ️ **info** — VectorD-lance tests added post-launch with no fixture versioning - `crates/vectord-lance/src/lib.rs:606-795` - `145 lines of tests were added for Lance (per the PRIOR FINDINGS: "vectord-lance had ZERO tests despite being on the live HTTP path"). The tests use synthetic Parquet data and temp ` - `[grounding: verified at crates/vectord-lance/src/lib.rs:606]` </details> ### Metrics ```json { "audit_duration_ms": 158184, "findings_total": 227, "findings_block": 12, "findings_warn": 40, "findings_info": 175, "claims_strong": 12, "claims_moderate": 18, "claims_weak": 0, "claims_empirical": 0, "claims_total": 30, "diff_bytes": 777535 } ``` <sub>Lakehouse auditor · SHA 7594725c · re-audit on new commit flips the status automatically.</sub>
profit added 5 commits 2026-05-03 03:26:12 +00:00
scale_test_10m doc-fetch p50 was ~100ms — full table scan over 35GB. Root
cause: the auto-build at service.rs:1492-1503 only fires for IndexMeta-
registered indexes during set_active_profile warming. lance-bench writes
datasets through /vectors/lance/migrate/* directly, bypassing IndexMeta,
so its datasets never get the doc_id btree that ADR-019 depends on.

Fix: build the btree inline at the end of lance_migrate. Costs ~1.2s on
10M rows (+269MB on disk), drops doc-fetch from ~100ms to ~5ms (20x).
Failure is non-fatal — logs a warning and the dataset stays queryable.

Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across
5 calls, smoke 9/9 PASS, vectord-lance 7/7 unit tests PASS.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
The bench's own measure_random_access_lance uses take(row_position) —
doesn't need the btree. But datasets written by this bench are commonly
queried via /vectors/lance/doc/<name>/<doc_id> downstream, and without
the btree that path falls back to a full table scan. Building inline
keeps bench-produced datasets immediately production-shape and removes
a footgun (the same one that made scale_test_10m's doc-fetch ~100ms
until commit 5d30b3d fixed it via the migrate handler path).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Untracked count was 100+; almost all were data/_*/ daemon state, generated
parquets under data/datasets and data/vectors, the 33GB data/lance/ tree,
node_modules, exports, logs, per-run distillation reports, and test
scratchpads. None of these are content — all regenerate from inputs.

Now down to 33 untracked items, all real content (scripts, systemd unit,
test scenarios, dev-only sidecar UIs, kimi audit reports). Those need
J's call on what to track vs leave parked.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Surfaced by today's untracked-files audit. None of these are accidents —
multiple are referenced by name in CLAUDE.md and memory files but were
never added.

Categories:
- docs/PHASE_AUDIT_GUIDE.md (106 LOC) — Claude Code phase audit guidance
- ops/systemd/lakehouse-langfuse-bridge.service — Langfuse bridge unit
- package.json — top-level npm manifest
- scripts/e2e_pipeline_check.sh + production_smoke.sh — real test scripts
- reports/kimi/audit-last-week*.md — the "Two reports live" CLAUDE.md cites
- tests/multi-agent/scenarios/ — 44 staffing scenarios (cutover decision A)
- tests/multi-agent/playbooks/ — 102 playbook records
- tests/battery/, tests/agent_test/PRD.md, tests/real-world/* — real tests
- sidecar/sidecar/{lab_ui,pipeline_lab}.py — 888 LOC dev-only UIs that
  remain in service post-sidecar-drop (commit ba928b1 explicitly kept them)

Sensitivity check: scenarios use synthetic company names ("Heritage Foods",
"Cornerstone Fabrication"); audit reports describe code findings only;
no PII or secrets surfaced.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
STATE_OF_PLAY: refresh for 2026-05-02 wave (Lance gauntlet + parity + housekeeping)
Some checks failed
lakehouse/auditor 9 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
0af62861d2
Anchor was 5 days stale. Adds the 12-commit wave (Lance backend hardening,
sidecar drop, observability parity, gitignore cleanup, gray-zone content
add) with verification status for each. Updates DO NOT RELITIGATE with
the 4 new things this wave makes load-bearing:
- python sidecar dropped from hot path (don't wire it back)
- lance gauntlet shipped (don't re-discover the bugs we just fixed)
- 32/32 cross-runtime parity (don't build a 6th probe for already-covered surface)
- ARCHITECTURE_COMPARISON.md is the single source of truth for cross-runtime decisions

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 9 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
Head SHA: 0af62861d2b3
Audited at: 2026-05-03T03:29:22.065Z

static — 3 findings (0 block, 3 warn, 0 info)

⚠️ warn — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer

  • crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts
  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 14 findings (6 block, 7 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 21457ms wall-clock) (truncated 6169306→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 20
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 42987 chars
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks UI/color changes
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks ranking/reliability rotation
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks three-layer architecture
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks playwright verification
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks role-pill styles
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks endorsed styling
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks console playwright verification
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks color classes
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks playwright verification
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks spec chapter verification
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks proof page verification
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks accent classes
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: scratchpad lacks console chapter verification
kb_query — 183 findings (0 block, 16 warn, 167 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ℹ️ info — scrum-master review for crates/vectord/src/service.rs — accepted on attempt 1 by ollama/qwen3.5:latest (tree-split)
  • reviewed_at: 2026-04-23T05:35:38.718Z
  • preview: ### 1. Alignment Score: **6/10** **Rationale:** The file implements core service logic (RAG, Index management, Playbook retirement) that aligns with the PRD's architectur
    ℹ️ info — scrum-master review for crates/gateway/src/main.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-25T23:42:49.497Z
  • preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with /v1, /ingest, AI client, secrets, journal, vectord memory stores, bucket registr
    ℹ️ info — scrum-master review for crates/gateway/src/v1/mod.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-26T23:12:34.425Z
  • preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible /v1/chat skeleton with basic prov
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 46 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 27 flaggings, conf=0.11): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ℹ️ info — recurring audit pattern (2 distinct PRs, 10 flaggings, conf=0.20): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • signature=c61ad10a3392f7bd
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=1032d1a48899bdd4
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d
  • signature=f037b8babf6d9c8a
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=d910e3254cf03240
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d
  • signature=ddebe1faaff0b1e6
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1
  • signature=4434173af432daf6
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway
  • signature=298880b9310be38b
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d
  • signature=f6ad293c96a80fd3
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • signature=4d93acf8c8d5a683
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=37c5f6ca656ebf90
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=7433343a46eaaa0a
  • checks: static
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1
  • signature=810539a4a0d66361
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 10 findings (3 block, 7 warn, 0 info)

🛑 blockstd::sync::Mutex held across async await points in embed cache

  • crates/aibridge/src/client.rs:141
  • ``embed_cache: Option<Arc<Mutex<LruCache<...>>>>usesstd::sync::Mutex, not tokio::sync::Mutex. The embed()method acquires this lock with.lock() at lines 196 and 245, the
  • [grounding: verified at crates/aibridge/src/client.rs:141]
    ⚠️ warnnew_trace_id() silently drops sub-nanosecond precision, creating collision risk
  • crates/gateway/src/v1/iterate.rs:458
  • The function uses timestamp_nanos_opt()which returnsi64nanoseconds since epoch, then formats as{:016x}. At current time (~2026), this is ~0x18_5A0_... — a 37-bit value. T
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:458]
    🛑 blockgenerate() drops raw field from response, breaking callers expecting sidecar shape
  • crates/aibridge/src/client.rs:396
  • The legacy GenerateResponsestruct (line 74-79) has fieldstext, model, tokens_evaluated, tokens_generated. The old sidecar returned additional fields including raw (th
  • [grounding: verified at crates/aibridge/src/client.rs:396]
    ⚠️ warnembed_uncached() loops per-text instead of batching, defeating Ollama 0.4+ batch API
  • crates/aibridge/src/client.rs:253
  • The comment at line 251-254 claims "Ollama 0.4+ supports batch input but per-text keeps compatibility broader". However, the EmbedRequestalready containstexts: Vec
  • [grounding: verified at crates/aibridge/src/client.rs:253]
    ⚠️ warnsanitize_lance_err path stripping is fragile and may leak partial paths
  • crates/vectord/src/service.rs:1937
  • The split("/root/.cargo/").next()andsplit("/home/").next()pattern at line 1949-1950 splits on hardcoded prefixes. If the Lance error message contains a path like/opt/lakeh`
  • [grounding: verified at crates/vectord/src/service.rs:1937]
    ⚠️ warngrounded_in_roster uses find() on validate_workers but the field type is unclear
  • crates/gateway/src/v1/iterate.rs:421
  • The grounded_in_rosterfunction callsstate.validate_workers.find(id)wherevalidate_workersis presumably some kind of worker roster. However, theV1State struct definitio
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:421]
    ⚠️ warnSessionLogger::append swallows serde_json::to_string errors silently
  • crates/gateway/src/v1/session_log.rs:118
  • The appendmethod returns()and logs serialization errors withtracing::warn!, then returns. The caller (write_session_accepted, write_session_failure, write_infra_erro`
  • [grounding: verified at crates/gateway/src/v1/session_log.rs:118]
    ⚠️ warnemit_attempt_span spawns a detached tokio task without abort handle or backpressure
  • crates/gateway/src/v1/langfuse_trace.rs:89
  • The emit_attempt_spanmethod spawns atokio::spawnfor every iteration attempt (up tomax_iterper/v1/iteratecall). Under high load, this creates unbounded task growth —
  • [grounding: verified at crates/gateway/src/v1/langfuse_trace.rs:89]
    🛑 blockparity_extract_json binary uses gateway::v1::iterate::extract_json but the module path may not exist in library build
  • crates/gateway/src/bin/parity_extract_json.rs:24
  • The binary calls gateway::v1::iterate::extract_json(&buf) via the library facade (lib.rs). However, lib.rsat line 19 declarespub mod v1;, and v1/mod.rsdeclarespub mo`
  • [grounding: verified at crates/gateway/src/bin/parity_extract_json.rs:24]
    ⚠️ warnconfig/providers.toml default model changes without migration path for running deployments
  • config/providers.toml:20
  • The ollama_cloudprovider'sdefault_modelchanges fromgpt-oss:120btodeepseek-v3.2, and openrouterchanges fromopenai/gpt-oss-120b:freetox-ai/grok-4.1-fast. Exis
  • [grounding: verified at config/providers.toml:20]

Metrics

{
  "audit_duration_ms": 163809,
  "findings_total": 211,
  "findings_block": 9,
  "findings_warn": 33,
  "findings_info": 169,
  "claims_strong": 8,
  "claims_moderate": 12,
  "claims_weak": 0,
  "claims_empirical": 1,
  "claims_total": 21,
  "diff_bytes": 6169306
}

Lakehouse auditor · SHA 0af62861 · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 9 blocking issues: cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" **Head SHA:** `0af62861d2b3` **Audited at:** 2026-05-03T03:29:22.065Z <details><summary><b>static</b> — 3 findings (0 block, 3 warn, 0 info)</summary> ⚠️ **warn** — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 14 findings (6 block, 7 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 21457ms wall-clock) (truncated 6169306→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 20` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 42987 chars` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks UI/color changes` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks ranking/reliability rotation` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks three-layer architecture` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks playwright verification` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks role-pill styles` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks endorsed styling` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks console playwright verification` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks color classes` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks playwright verification` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks spec chapter verification` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks proof page verification` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks accent classes` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: scratchpad lacks console chapter verification` </details> <details><summary><b>kb_query</b> — 183 findings (0 block, 16 warn, 167 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ℹ️ **info** — scrum-master review for `crates/vectord/src/service.rs` — accepted on attempt 1 by `ollama/qwen3.5:latest` (tree-split) - `reviewed_at: 2026-04-23T05:35:38.718Z` - `preview: ### 1. Alignment Score: **6/10** **Rationale:** The file implements core service logic (RAG, Index management, Playbook retirement) that aligns with the PRD's architectur` ℹ️ **info** — scrum-master review for `crates/gateway/src/main.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-25T23:42:49.497Z` - `preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with `/v1`, `/ingest`, AI client, secrets, journal, vectord memory stores, bucket registr` ℹ️ **info** — scrum-master review for `crates/gateway/src/v1/mod.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-26T23:12:34.425Z` - `preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible `/v1/chat` skeleton with basic prov` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 24 flaggings, conf=0.04): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 46 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 27 flaggings, conf=0.11): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 14 flaggings, conf=0.21): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 14 flaggings, conf=0.07): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 10 flaggings, conf=0.20): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `signature=c61ad10a3392f7bd` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=1032d1a48899bdd4` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d - `signature=f037b8babf6d9c8a` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=d910e3254cf03240` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d - `signature=ddebe1faaff0b1e6` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 - `signature=4434173af432daf6` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway - `signature=298880b9310be38b` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d - `signature=f6ad293c96a80fd3` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `signature=4d93acf8c8d5a683` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=37c5f6ca656ebf90` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=7433343a46eaaa0a` - `checks: static` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 - `signature=810539a4a0d66361` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 10 findings (3 block, 7 warn, 0 info)</summary> 🛑 **block** — `std::sync::Mutex` held across async await points in embed cache - `crates/aibridge/src/client.rs:141` - ``embed_cache: Option<Arc<Mutex<LruCache<...>>>>` uses `std::sync::Mutex`, not `tokio::sync::Mutex`. The `embed()` method acquires this lock with `.lock()` at lines 196 and 245, the` - `[grounding: verified at crates/aibridge/src/client.rs:141]` ⚠️ **warn** — `new_trace_id()` silently drops sub-nanosecond precision, creating collision risk - `crates/gateway/src/v1/iterate.rs:458` - `The function uses `timestamp_nanos_opt()` which returns `i64` nanoseconds since epoch, then formats as `{:016x}`. At current time (~2026), this is ~0x18_5A0_... — a 37-bit value. T` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:458]` 🛑 **block** — `generate()` drops `raw` field from response, breaking callers expecting sidecar shape - `crates/aibridge/src/client.rs:396` - `The legacy `GenerateResponse` struct (line 74-79) has fields `text`, `model`, `tokens_evaluated`, `tokens_generated`. The old sidecar returned additional fields including `raw` (th` - `[grounding: verified at crates/aibridge/src/client.rs:396]` ⚠️ **warn** — `embed_uncached()` loops per-text instead of batching, defeating Ollama 0.4+ batch API - `crates/aibridge/src/client.rs:253` - `The comment at line 251-254 claims "Ollama 0.4+ supports batch input but per-text keeps compatibility broader". However, the `EmbedRequest` already contains `texts: Vec<String>` — ` - `[grounding: verified at crates/aibridge/src/client.rs:253]` ⚠️ **warn** — `sanitize_lance_err` path stripping is fragile and may leak partial paths - `crates/vectord/src/service.rs:1937` - `The `split("/root/.cargo/").next()` and `split("/home/").next()` pattern at line 1949-1950 splits on hardcoded prefixes. If the Lance error message contains a path like `/opt/lakeh` - `[grounding: verified at crates/vectord/src/service.rs:1937]` ⚠️ **warn** — `grounded_in_roster` uses `find()` on `validate_workers` but the field type is unclear - `crates/gateway/src/v1/iterate.rs:421` - `The `grounded_in_roster` function calls `state.validate_workers.find(id)` where `validate_workers` is presumably some kind of worker roster. However, the `V1State` struct definitio` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:421]` ⚠️ **warn** — `SessionLogger::append` swallows `serde_json::to_string` errors silently - `crates/gateway/src/v1/session_log.rs:118` - `The `append` method returns `()` and logs serialization errors with `tracing::warn!`, then returns. The caller (`write_session_accepted`, `write_session_failure`, `write_infra_erro` - `[grounding: verified at crates/gateway/src/v1/session_log.rs:118]` ⚠️ **warn** — `emit_attempt_span` spawns a detached tokio task without abort handle or backpressure - `crates/gateway/src/v1/langfuse_trace.rs:89` - `The `emit_attempt_span` method spawns a `tokio::spawn` for every iteration attempt (up to `max_iter` per `/v1/iterate` call). Under high load, this creates unbounded task growth — ` - `[grounding: verified at crates/gateway/src/v1/langfuse_trace.rs:89]` 🛑 **block** — `parity_extract_json` binary uses `gateway::v1::iterate::extract_json` but the module path may not exist in library build - `crates/gateway/src/bin/parity_extract_json.rs:24` - `The binary calls `gateway::v1::iterate::extract_json(&buf)` via the library facade (`lib.rs`). However, `lib.rs` at line 19 declares `pub mod v1;`, and `v1/mod.rs` declares `pub mo` - `[grounding: verified at crates/gateway/src/bin/parity_extract_json.rs:24]` ⚠️ **warn** — `config/providers.toml` default model changes without migration path for running deployments - `config/providers.toml:20` - `The `ollama_cloud` provider's `default_model` changes from `gpt-oss:120b` to `deepseek-v3.2`, and `openrouter` changes from `openai/gpt-oss-120b:free` to `x-ai/grok-4.1-fast`. Exis` - `[grounding: verified at config/providers.toml:20]` </details> ### Metrics ```json { "audit_duration_ms": 163809, "findings_total": 211, "findings_block": 9, "findings_warn": 33, "findings_info": 169, "claims_strong": 8, "claims_moderate": 12, "claims_weak": 0, "claims_empirical": 1, "claims_total": 21, "diff_bytes": 6169306 } ``` <sub>Lakehouse auditor · SHA 0af62861 · re-audit on new commit flips the status automatically.</sub>
profit added 1 commit 2026-05-03 03:41:08 +00:00
Merge remote-tracking branch 'origin/main' into demo/post-pr11-polish-2026-04-28
Some checks failed
lakehouse/auditor 9 blocking issues: cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across"
a294a61ee4
Author
Owner

Auditor verdict: 🛑 block

One-liner: 9 blocking issues: cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across"
Head SHA: a294a61ee4b6
Audited at: 2026-05-03T03:44:38.269Z

static — 3 findings (0 block, 3 warn, 0 info)

⚠️ warn — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer

  • crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts
  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 21 findings (8 block, 12 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 13207ms wall-clock) (truncated 6158460→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 20
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 42975 chars
    ⚠️ warn — cloud: claim not backed — "- lance gauntlet shipped (don't re-discover the bugs we just fixed)"
  • at commit:0af62861:8
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no lance gauntlet or bug fixes
    ⚠️ warn — cloud: claim not backed — "until commit 5d30b3d fixed it via the migrate handler path)."
  • at commit:044650a1:9
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no doc-fetch or migrate handler changes
    🛑 block — cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across"
  • at commit:5d30b3da:13
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no scale_test_10m or doc-fetch changes
    ⚠️ warn — cloud: claim not backed — "7/7 PASS. cargo test -p vectord-lance --lib green."
  • at commit:7594725c:50
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no vectord-lance test changes
    ⚠️ warn — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • at commit:ba928b1d:79
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no process model changes
    🛑 block — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • at commit:9eed982f:18
  • consensus: 2/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no Go stack verification
    ⚠️ warn — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • at commit:d475fc7f:4
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no OLLAMA_CLOUD_KEY or OpenCode changes
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no UI animation changes
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no ranking reliability changes
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no three layers implementation
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no playwright verification
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no role-pill style changes
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no endorsed UI changes
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no console playwright verification
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no color scheme changes
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no playwright verification
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no spec page changes
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no proof page changes
    ⚠️ warn — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • at commit:4c46cf6a:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no accent class changes
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • at commit:4c46cf6a:44
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no console chapter changes
kb_query — 183 findings (0 block, 14 warn, 169 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ℹ️ info — scrum-master review for crates/vectord/src/service.rs — accepted on attempt 1 by ollama/qwen3.5:latest (tree-split)
  • reviewed_at: 2026-04-23T05:35:38.718Z
  • preview: ### 1. Alignment Score: **6/10** **Rationale:** The file implements core service logic (RAG, Index management, Playbook retirement) that aligns with the PRD's architectur
    ℹ️ info — scrum-master review for crates/gateway/src/main.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-25T23:42:49.497Z
  • preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with /v1, /ingest, AI client, secrets, journal, vectord memory stores, bucket registr
    ℹ️ info — scrum-master review for crates/gateway/src/v1/mod.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-26T23:12:34.425Z
  • preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible /v1/chat skeleton with basic prov
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 23 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 46 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 28 flaggings, conf=0.11): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ℹ️ info — recurring audit pattern (2 distinct PRs, 11 flaggings, conf=0.18): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • signature=c61ad10a3392f7bd
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=1032d1a48899bdd4
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d
  • signature=f037b8babf6d9c8a
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=d910e3254cf03240
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d
  • signature=ddebe1faaff0b1e6
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1
  • signature=4434173af432daf6
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway
  • signature=298880b9310be38b
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d
  • signature=f6ad293c96a80fd3
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • signature=4d93acf8c8d5a683
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=37c5f6ca656ebf90
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=7433343a46eaaa0a
  • checks: static
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1
  • signature=810539a4a0d66361
  • checks: kb_query
  • scopes: pr-12
kimi_architect — 10 findings (1 block, 6 warn, 3 info)

🛑 block — LRU cache clone semantics create non-deterministic cache state across handler instances

  • crates/aibridge/src/client.rs:61-66
  • ``AiClientis cloned per-request (common in Axum patterns). Each clone sharesArc<Mutex<LruCache<...>>>, but Ordering::Relaxedon hit/miss counters (lines 61-62) andcached_di`
  • [grounding: verified at crates/aibridge/src/client.rs:61]
    ⚠️ warn — embed_cache_stats() acquires lock that can deadlock if called during in-flight embed() lock hold
  • crates/aibridge/src/client.rs:180-187
  • Line 230 holds cache.lock()for the full duration of the first pass loop. If any observer (e.g., a metrics endpoint) callsembed_cache_stats() on a clone of the same client dur
  • [grounding: verified at crates/aibridge/src/client.rs:180]
    ⚠️ warn — Session log records silently dropped on serialization failure — no operator visibility
  • crates/gateway/src/v1/session_log.rs:97-104
  • Lines 99-102 catch serde_json::to_string errors and return silently after logging to tracing::warn!. The /v1/iterate response ships normally (the caller never learns the log fa
  • [grounding: verified at crates/gateway/src/v1/session_log.rs:97]
    ⚠️ warn — Cross-runtime parity binary accepts fixture input with no schema enforcement
  • crates/gateway/src/bin/parity_session_log.rs:33-39
  • The fixture deserialization (lines 33-39) uses a hand-rolled FixtureInputstruct with optional fields. If the Go-side test harness sends a fixture missingmodelorprovider,
  • [grounding: verified at crates/gateway/src/bin/parity_session_log.rs:33]
    ⚠️ warn — TRACE_ID_HEADER propagation not idempotent — nested calls double-nest in Langfuse
  • crates/gateway/src/v1/mod.rs:513-517
  • When /v1/iterateforwardsx-lakehouse-trace-idto its internal/v1/chathops (line 134, iterate.rs), those hops will emit to the parent trace. But if one of those/v1/chat
  • [grounding: verified at crates/gateway/src/v1/mod.rs:513]
    ⚠️ warn — Lance error sanitizer pattern-matches on lowercased string — false negatives on case-variant paths
  • crates/vectord/src/service.rs:1920-1933
  • Line 1921 lowercases the error and checks for "not found" or "no such file", but Lance error messages may vary: "NotFound", "dataset.Not.Found", or filesystem-specific messages ("N
  • [grounding: verified at crates/vectord/src/service.rs:1920]
    ℹ️ info — Session logger creates parent directory on every append — unbounded stat() load
  • crates/gateway/src/v1/session_log.rs:113-116
  • Every append()call (one per/v1/iteratesession) runstokio::fs::create_dir_all(parent) unconditionally. At 10+ requests/sec, this is 10+ stat syscalls per second on the par
  • [grounding: verified at crates/gateway/src/v1/session_log.rs:113]
    ⚠️ warn — Roster grounding check in iterate.rs doesn't distinguish "ID missing" from "dataset missing"
  • crates/gateway/src/v1/iterate.rs:268-283
  • Line 276 calls state.validate_workers.find(id)and returnsSome(false)onNone, but if validate_workersisn't initialized (dataset load failed), the check will also return
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:268]
    ℹ️ info — Headshots manifest JSONL contains 1000 entries but file truncated in diff — unsure of actual state
  • data/headshots/manifest.jsonl
  • The diff shows entries 0–662 and then "... [truncated; original diff was 6158460 chars]". The STATE_OF_PLAY.md claims "952 servable faces" after filtering 48 minors from 1000, but
    ℹ️ info — New config field [gateway].session_log_path defaults to empty string with no startup validation
  • crates/shared/src/config.rs:65-73
  • The default is String::new()(line 68), and the gateway init checkspath.is_empty() to disable (crates/gateway/src/main.rs:375). If an operator's config file is malformed (e.g.
  • [grounding: verified at crates/shared/src/config.rs:65]

Metrics

{
  "audit_duration_ms": 159782,
  "findings_total": 218,
  "findings_block": 9,
  "findings_warn": 35,
  "findings_info": 174,
  "claims_strong": 8,
  "claims_moderate": 12,
  "claims_weak": 0,
  "claims_empirical": 1,
  "claims_total": 21,
  "diff_bytes": 6158460
}

Lakehouse auditor · SHA a294a61e · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 9 blocking issues: cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across" **Head SHA:** `a294a61ee4b6` **Audited at:** 2026-05-03T03:44:38.269Z <details><summary><b>static</b> — 3 findings (0 block, 3 warn, 0 info)</summary> ⚠️ **warn** — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 21 findings (8 block, 12 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 13207ms wall-clock) (truncated 6158460→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 20` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 42975 chars` ⚠️ **warn** — cloud: claim not backed — "- lance gauntlet shipped (don't re-discover the bugs we just fixed)" - `at commit:0af62861:8` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no lance gauntlet or bug fixes` ⚠️ **warn** — cloud: claim not backed — "until commit 5d30b3d fixed it via the migrate handler path)." - `at commit:044650a1:9` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no doc-fetch or migrate handler changes` 🛑 **block** — cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across" - `at commit:5d30b3da:13` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no scale_test_10m or doc-fetch changes` ⚠️ **warn** — cloud: claim not backed — "7/7 PASS. cargo test -p vectord-lance --lib green." - `at commit:7594725c:50` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no vectord-lance test changes` ⚠️ **warn** — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `at commit:ba928b1d:79` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no process model changes` 🛑 **block** — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `at commit:9eed982f:18` - `consensus: 2/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no Go stack verification` ⚠️ **warn** — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `at commit:d475fc7f:4` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no OLLAMA_CLOUD_KEY or OpenCode changes` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no UI animation changes` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no ranking reliability changes` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no three layers implementation` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no playwright verification` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no role-pill style changes` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no endorsed UI changes` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no console playwright verification` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no color scheme changes` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no playwright verification` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no spec page changes` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no proof page changes` ⚠️ **warn** — cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `at commit:4c46cf6a:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no accent class changes` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `at commit:4c46cf6a:44` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no console chapter changes` </details> <details><summary><b>kb_query</b> — 183 findings (0 block, 14 warn, 169 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ℹ️ **info** — scrum-master review for `crates/vectord/src/service.rs` — accepted on attempt 1 by `ollama/qwen3.5:latest` (tree-split) - `reviewed_at: 2026-04-23T05:35:38.718Z` - `preview: ### 1. Alignment Score: **6/10** **Rationale:** The file implements core service logic (RAG, Index management, Playbook retirement) that aligns with the PRD's architectur` ℹ️ **info** — scrum-master review for `crates/gateway/src/main.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-25T23:42:49.497Z` - `preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with `/v1`, `/ingest`, AI client, secrets, journal, vectord memory stores, bucket registr` ℹ️ **info** — scrum-master review for `crates/gateway/src/v1/mod.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-26T23:12:34.425Z` - `preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible `/v1/chat` skeleton with basic prov` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 23 flaggings, conf=0.04): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 21 flaggings, conf=0.05): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 46 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 28 flaggings, conf=0.11): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 15 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 16 flaggings, conf=0.06): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 11 flaggings, conf=0.18): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `signature=c61ad10a3392f7bd` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=1032d1a48899bdd4` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d - `signature=f037b8babf6d9c8a` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=d910e3254cf03240` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d - `signature=ddebe1faaff0b1e6` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 - `signature=4434173af432daf6` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway - `signature=298880b9310be38b` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d - `signature=f6ad293c96a80fd3` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `signature=4d93acf8c8d5a683` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=37c5f6ca656ebf90` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=7433343a46eaaa0a` - `checks: static` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 4 flaggings, conf=0.25): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 - `signature=810539a4a0d66361` - `checks: kb_query` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 10 findings (1 block, 6 warn, 3 info)</summary> 🛑 **block** — LRU cache clone semantics create non-deterministic cache state across handler instances - `crates/aibridge/src/client.rs:61-66` - ``AiClient` is cloned per-request (common in Axum patterns). Each clone shares `Arc<Mutex<LruCache<...>>>`, but `Ordering::Relaxed` on hit/miss counters (lines 61-62) and `cached_di` - `[grounding: verified at crates/aibridge/src/client.rs:61]` ⚠️ **warn** — embed_cache_stats() acquires lock that can deadlock if called during in-flight embed() lock hold - `crates/aibridge/src/client.rs:180-187` - `Line 230 holds `cache.lock()` for the full duration of the first pass loop. If any observer (e.g., a metrics endpoint) calls `embed_cache_stats()` on a clone of the same client dur` - `[grounding: verified at crates/aibridge/src/client.rs:180]` ⚠️ **warn** — Session log records silently dropped on serialization failure — no operator visibility - `crates/gateway/src/v1/session_log.rs:97-104` - `Lines 99-102 catch serde_json::to_string errors and return silently after logging to `tracing::warn!`. The `/v1/iterate` response ships normally (the caller never learns the log fa` - `[grounding: verified at crates/gateway/src/v1/session_log.rs:97]` ⚠️ **warn** — Cross-runtime parity binary accepts fixture input with no schema enforcement - `crates/gateway/src/bin/parity_session_log.rs:33-39` - `The fixture deserialization (lines 33-39) uses a hand-rolled `FixtureInput` struct with optional fields. If the Go-side test harness sends a fixture missing `model` or `provider`, ` - `[grounding: verified at crates/gateway/src/bin/parity_session_log.rs:33]` ⚠️ **warn** — TRACE_ID_HEADER propagation not idempotent — nested calls double-nest in Langfuse - `crates/gateway/src/v1/mod.rs:513-517` - `When `/v1/iterate` forwards `x-lakehouse-trace-id` to its internal `/v1/chat` hops (line 134, iterate.rs), those hops will emit to the parent trace. But if one of those `/v1/chat` ` - `[grounding: verified at crates/gateway/src/v1/mod.rs:513]` ⚠️ **warn** — Lance error sanitizer pattern-matches on lowercased string — false negatives on case-variant paths - `crates/vectord/src/service.rs:1920-1933` - `Line 1921 lowercases the error and checks for "not found" or "no such file", but Lance error messages may vary: "NotFound", "dataset.Not.Found", or filesystem-specific messages ("N` - `[grounding: verified at crates/vectord/src/service.rs:1920]` ℹ️ **info** — Session logger creates parent directory on every append — unbounded stat() load - `crates/gateway/src/v1/session_log.rs:113-116` - `Every `append()` call (one per `/v1/iterate` session) runs `tokio::fs::create_dir_all(parent)` unconditionally. At 10+ requests/sec, this is 10+ stat syscalls per second on the par` - `[grounding: verified at crates/gateway/src/v1/session_log.rs:113]` ⚠️ **warn** — Roster grounding check in iterate.rs doesn't distinguish "ID missing" from "dataset missing" - `crates/gateway/src/v1/iterate.rs:268-283` - `Line 276 calls `state.validate_workers.find(id)` and returns `Some(false)` on `None`, but if `validate_workers` isn't initialized (dataset load failed), the check will also return ` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:268]` ℹ️ **info** — Headshots manifest JSONL contains 1000 entries but file truncated in diff — unsure of actual state - `data/headshots/manifest.jsonl` - `The diff shows entries 0–662 and then "... [truncated; original diff was 6158460 chars]". The STATE_OF_PLAY.md claims "952 servable faces" after filtering 48 minors from 1000, but ` ℹ️ **info** — New config field `[gateway].session_log_path` defaults to empty string with no startup validation - `crates/shared/src/config.rs:65-73` - `The default is `String::new()` (line 68), and the gateway init checks `path.is_empty()` to disable (crates/gateway/src/main.rs:375). If an operator's config file is malformed (e.g.` - `[grounding: verified at crates/shared/src/config.rs:65]` </details> ### Metrics ```json { "audit_duration_ms": 159782, "findings_total": 218, "findings_block": 9, "findings_warn": 35, "findings_info": 174, "claims_strong": 8, "claims_moderate": 12, "claims_weak": 0, "claims_empirical": 1, "claims_total": 21, "diff_bytes": 6158460 } ``` <sub>Lakehouse auditor · SHA a294a61e · re-audit on new commit flips the status automatically.</sub>
profit added 1 commit 2026-05-03 04:35:06 +00:00
lance: scrum-driven sanitizer + smoke-gate fixes (opus 2026-05-02 BLOCK)
Some checks failed
lakehouse/auditor 9 blocking issues: cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across"
7bb66f08c3
Cross-lineage scrum on the lance wave (4 bundles, 33 distinct findings)
surfaced 1 real BLOCK and 2 real WARNs from opus that the kimi/qwen
lineages missed. Per feedback_cross_lineage_review.md, opus is the
load-bearing reviewer; cross-lineage convergence is noise unless verified.

BLOCK fix — sanitize_lance_err path-stripping was unsound:
  err.split("/home/").next().unwrap_or(&err)
returns Some("") when err STARTS with "/home/", erasing the entire
message. Replaced truncation with redact_paths() — a hand-rolled scanner
that walks the input once, replacing path-shaped substrings with
[REDACTED] while preserving surrounding error context. Catches:
- absolute paths under /root/.cargo, /home, /var, /tmp, /etc, /usr, /opt
- relative variants (Lance occasionally strips leading slash —
  observed live "Dataset at path home/profit/lakehouse/data/lance/x
  was not found")
- multiple occurrences in one error
- preserves quote/comma/whitespace terminators

WARN fix #1 — is_not_found heuristic was too broad:
  lower.contains("not found")
caught real 500s like "column not found", "field not found in schema".
Narrowed to require dataset-shape phrasing AND exclude the
column/field/schema patterns explicitly.

WARN fix #2 — lance_smoke.sh `grep -qvE` was an unsound regression gate.
  bash -c "echo '$BODY' | grep -qvE 'pat'"
With -v -q, exits 0 if ANY line lacks the pattern — so a multi-line
body with one leak line + any clean line FALSE-PASSES. Replaced with
the correct "pattern absent" form: `! grep -qE 'pat'`. Also expanded
the pattern set (added /var/, /tmp/) since the scrum surfaced these
as additional leak vectors.

Also unblocks pre-existing pathway_memory test compile error (stale
PathwayTrace init missing 6 Mem0-versioning fields added in 6ac7f61).
Tests filled in with sensible defaults — needed to run sanitize_tests.

10/10 new sanitize tests pass. Smoke 9/9 PASS against rebuilt+restarted
gateway. Live missing-index probe now returns:
  "lance dataset not found: no-such-11205" + HTTP 404
(was: leaked absolute paths + HTTP 500 → leaked absolute and relative
paths post-first-fix → clean message + 404 now.)

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Author
Owner

Auditor verdict: 🛑 block

One-liner: 9 blocking issues: cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across"
Head SHA: 7bb66f08c326
Audited at: 2026-05-03T04:39:32.111Z

static — 3 findings (0 block, 3 warn, 0 info)

⚠️ warn — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer

  • crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts
  • mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion
    ⚠️ warn — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each scene string lands directly in the
dynamic — 1 findings (0 block, 0 warn, 1 info)

ℹ️ info — dynamic check skipped — skipped by options

  • skipped by options
inference — 19 findings (7 block, 11 warn, 1 info)

ℹ️ info — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 14317ms wall-clock) (truncated 6168577→40000 chars; matrix retrieval supplies cross-PR context)

  • claims voted: 18
  • parsed runs: 3 / 3
  • enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 42768 chars
    ⚠️ warn — cloud: claim not backed — "- lance gauntlet shipped (don't re-discover the bugs we just fixed)"
  • at commit:0af62861:8
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no lance gauntlet tests or fixes
    ⚠️ warn — cloud: claim not backed — "until commit 5d30b3d fixed it via the migrate handler path)."
  • at commit:044650a1:9
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no lance migrate handler changes
    🛑 block — cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across"
  • at commit:5d30b3da:13
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no scale_test_10m doc-fetch benchmarks
    ⚠️ warn — cloud: claim not backed — "7/7 PASS. cargo test -p vectord-lance --lib green."
  • at commit:7594725c:50
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no vectord-lance test additions
    ⚠️ warn — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • at commit:ba928b1d:79
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no process model consolidation
    🛑 block — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • at commit:9eed982f:18
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no Go stack integration tests
    ⚠️ warn — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • at commit:d475fc7f:4
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no OLLAMA_CLOUD_KEY or OpenCode wiring
    ⚠️ warn — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • at commit:f4dc1b29:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no UI gradient animations
    ⚠️ warn — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • at commit:f8922306:10
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no ranking rotation logic
    ⚠️ warn — cloud: claim not backed — "Three layers shipped:"
  • at commit:10ed3bc6:3
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no three-layer architecture
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:10ed3bc6:69
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no playwright end-to-end tests
    ⚠️ warn — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • at commit:cdf5f592:15
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no role-pill styling
    ⚠️ warn — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • at commit:cdf5f592:21
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no endorsed UI component
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • at commit:cdf5f592:28
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no console playwright tests
    ⚠️ warn — cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • at commit:f92b5561:20
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no color-coded UI elements
    🛑 block — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • at commit:f92b5561:41
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no playwright verification
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • at commit:d571d62e:88
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no spec chapter content
    🛑 block — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • at commit:631b0329:58
  • consensus: 3/3 not-backed (resolution: majority_not_backed)
  • cloud reason: diff shows no proof page verification
kb_query — 184 findings (0 block, 14 warn, 170 info)

ℹ️ info — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%)

  • most recent: ?
  • recent failing sigs: none
    ℹ️ info — scrum-master review for crates/vectord/src/service.rs — accepted on attempt 1 by ollama/qwen3.5:latest (tree-split)
  • reviewed_at: 2026-04-23T05:35:38.718Z
  • preview: ### 1. Alignment Score: **6/10** **Rationale:** The file implements core service logic (RAG, Index management, Playbook retirement) that aligns with the PRD's architectur
    ℹ️ info — scrum-master review for crates/gateway/src/main.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-25T23:42:49.497Z
  • preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with /v1, /ingest, AI client, secrets, journal, vectord memory stores, bucket registr
    ℹ️ info — scrum-master review for crates/gateway/src/v1/mod.rs — accepted on attempt 1 by openrouter/x-ai/grok-4.1-fast (tree-split)
  • reviewed_at: 2026-04-26T23:12:34.425Z
  • preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible /v1/chat skeleton with basic prov
    ℹ️ info — scrum-master review for crates/gateway/src/execution_loop/mod.rs — accepted on attempt 1 by ollama_cloud/kimi-k2:1t (tree-split)
  • reviewed_at: 2026-04-24T08:21:18.916Z
  • preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr
    ℹ️ info — core entity sql_policy_check recurs in 2 PRs (types: Function)
  • count=4 distinct_PRs=2
  • description: A function that is missing in the code.
  • PRs: 0,11
    ℹ️ info — core entity mkdir recurs in 2 PRs (types: Function)
  • count=3 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for creating directories
  • PRs: 8,9
    ℹ️ info — core entity gateway recurs in 2 PRs (types: Constant,System Component,Software Component)
  • count=3 distinct_PRs=2
  • description: A component in the system responsible for handling initial access and communication.
  • PRs: 0,8
    ℹ️ info — core entity execute_query recurs in 2 PRs (types: Function,function)
  • count=3 distinct_PRs=2
  • description:
  • PRs: 0,11
    ℹ️ info — core entity writeFile recurs in 2 PRs (types: Function)
  • count=2 distinct_PRs=2
  • description: A function imported from 'node:fs/promises' for writing files
  • PRs: 8,9
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f5b36d952caf591
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=1fdb4d320bcdf203
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=5f84c6b830b3ff12
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=78f07c2e84a56db6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3631c337796c04a3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f1426e133dc92ba0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=51da88b79b07925b
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): todo!() macro call in tests/real-world/scrum_master_pipeline.ts
  • signature=1d64852d2b0a95c0
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0."
  • signature=b0235a992c0216ae
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=240451351e1b8cef
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b69738e705604f02
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=cee27b199d23457f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=278f466e54dac13a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=33f475cd7a5c255e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=0868549b1fe15baf
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99ac8803cd15b1a5
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3e2ed94d1ba06de3
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=6fd1860f42d0fa85
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=066143c1baeb3f7e
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=3b5f4b16a3c8b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=e1cef15c3f560811
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d249d21feebd04ce
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d57b721418f3f088
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c55cac2e690e8fe6
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=b3ddb9a4ec8ab6cb
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=ee7e11933fe9a19f
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a264dd9c9f22abc2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=a3e62e18dd4e59b1
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=94874c682dda210d
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=99249e0a441ba21c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=d48c35bffe3863ea
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=886b7e5d93e502b2
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=103ad6b6d830a23c
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=50c24a7a40e41ad7
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=f386e2477d18f7d9
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=c8843a8a24d7b00a
  • checks: static
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 46 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts
  • signature=c74394177c67a49d
  • checks: static
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| tests/real-world/scrum_master_pipeline.ts | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue"
  • signature=edbd5e67a0387680
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)"
  • signature=07975499ecb4dbaa
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "Auto-applier dry-run: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte"
  • signature=396c0aecd5527dcc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after "
  • signature=21a58eacd406823c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state"
  • signature=69c0a41f864a8f71
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)."
  • signature=a8f0c146f272e49f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through /v1/* was flagged as"
  • signature=6e86ff852cb12613
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third"
  • signature=510660f02f9f0bbb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (pi --print --provider openrouter)"
  • signature=9d031dcf7ca12a86
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through /v1/chat/completions,"
  • signature=5c212551c59da7a6
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:"
  • signature=8a8db031b06a6e73
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's"
  • signature=5ef622471680e6a8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the"
  • signature=bae54948bedaad89
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today."
  • signature=6e2a531a69c2d96e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase."
  • signature=05a943a19b1faf8d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return"
  • signature=436acd155eb1a1ef
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)"
  • signature=2d214359173d8a9b
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops"
  • signature=c1d8f1ed53857de9
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting"
  • signature=192a0a8fd2ef6466
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):"
  • signature=7488287a5b8dae2e
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=653816a556f59908
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic"
  • signature=867a82fc9a8cddc8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:"
  • signature=fdedfb3591acccbe
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned cycle on"
  • signature=65b1ebd75e1e9560
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:"
  • signature=b6a0b605c0c43adf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):"
  • signature=bbf22f2213563a24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false"
  • signature=4d9a026e152a0eb2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)"
  • signature=d4eee21dd8099cc1
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache"
  • signature=bc26dee12aaf6ec7
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:"
  • signature=e537ffe25b037bdb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data"
  • signature=eca2e6fd2a54798c
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven."
  • signature=a6a47725b125e835
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):"
  • signature=3cfcf147c85d37be
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on"
  • signature=06f3761914b49df2
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven"
  • signature=73800b46527b8362
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:"
  • signature=9ac4e9c2aa8300fb
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows"
  • signature=004eec535740ee24
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges,"
  • signature=d09d0c3898a9ca4f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via"
  • signature=c653622096fa3a12
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from"
  • signature=a45738cd08b2edd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this"
  • signature=7537eb77270d7bd4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)"
  • signature=bde2b46a5c181555
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 29 flaggings, conf=0.10): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified"
  • signature=803df5936ad8ebf5
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading"
  • signature=33b25ee5b60df8ff
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):"
  • signature=5b6fb5cbd5d3e476
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with"
  • signature=8364565c3e958055
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):"
  • signature=45ccbf946cc4c6e0
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. cargo check --workspace (production) is green;"
  • signature=a0a5b3a346e7ff2a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green"
  • signature=e3ede3f4dd10e6fc
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array"
  • signature=2e448df73d047858
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred."
  • signature=a5290686a5f8e175
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were"
  • signature=e42b45244e926181
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=93d264d27b1458d8
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):"
  • signature=717c35314b69dd00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:"
  • signature=bafae3bec6618043
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green"
  • signature=f86bca6368049083
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green"
  • signature=36b58ab7f2d3d4a4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value"
  • signature=06e8b0edcf74d87e
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when"
  • signature=dbddb1ed194d8797
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires fetch(...) or"
  • signature=5477158c3900b392
  • checks: inference
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:"
  • signature=34382324bf7c2a55
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways."
  • signature=edb960def1660954
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety"
  • signature=9709ea20bf9668d1
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green."
  • signature=44b4f9260f0abe84
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)"
  • signature=1dea433cb02225d5
  • checks: kb_query
  • scopes: pr-11
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre
  • signature=28a52763ffbbad41
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s
  • signature=7a04d1b89c00775a
  • checks: kb_query
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):"
  • signature=784c3977a0ac9158
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:"
  • signature=7965ec7d350eac32
  • checks: inference
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)"
  • signature=4d287c2223dfa02f
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete"
  • signature=c93d122e037f690d
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module,"
  • signature=b07f0e2e03242f00
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:"
  • signature=34f2f34a4e910dea
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2"
  • signature=358fcc5514ec6edf
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):"
  • signature=2402a57ca395b1ba
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")"
  • signature=c04797074f5ddef4
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon"
  • signature=ada2afb623940b0a
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon"
  • signature=9a5144617ca8e3db
  • checks: inference
  • scopes: pr-11
    ℹ️ info — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=db2e3357f7c64eba
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p
  • signature=56eae12a688ef046
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n
  • signature=786001b0aa188f3e
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P
  • signature=0fad08efa8aeb9ff
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=959bf54aa5a6f4f1
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ℹ️ info — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T
  • signature=33c112ea77f3c532
  • checks: kb_query
  • scopes: pr-11,pr-13,pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=a13abf1d9c7baf17
  • checks: kb_query
  • scopes: pr-11,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a"
  • signature=c39996be8f4c4fe5
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users"
  • signature=57928b29b5bb17d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Three layers shipped:"
  • signature=4e0eeae8b7f5e28e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:"
  • signature=93c83d5251ba2048
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the"
  • signature=ea9fa30a6c63b765
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed"
  • signature=189644ee9d721040
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:"
  • signature=05f429115c7558f1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "color: blue / amber / purple / green / orange. The"
  • signature=be892c5067cdc403
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s"
  • signature=3abfa52001068dcf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:"
  • signature=c70b3255a1bc0066
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and"
  • signature=8855bfc40bf8fd79
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters"
  • signature=ef21c980c67f2397
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):"
  • signature=f410f884e34c48b8
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources"
  • signature=6c063ff93f666903
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Color-coded green/red."
  • signature=5f291b5a8fa6de3c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K,"
  • signature=fbd23973cd1978cb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:"
  • signature=d177549dfa18accb
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- ticker + live price + day-change % (red/green)"
  • signature=d332a09de93e8fb7
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct"
  • signature=0abca453231711c1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)"
  • signature=065e76d04b94201a
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on the public URL:"
  • signature=a33d48938c4497fe
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +"
  • signature=8d483e9841fa507e
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "works on devop.live)"
  • signature=4a612bd464d2f492
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright on the public URL."
  • signature=a250efef86f9c8dc
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real"
  • signature=d9eeab1dd1d4d8d3
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to"
  • signature=6230a454129141b1
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the"
  • signature=99a8b254ee688719
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:"
  • signature=8ad842531e1861e6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":"
  • signature=119364ce046243cf
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY"
  • signature=ecaea4417af3be8c
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list."
  • signature=e48890e139c2ee0b
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:"
  • signature=e6fe9bbd5f1659b6
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)"
  • signature=4c9c5445694c29d9
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (2 distinct PRs, 6 flaggings, conf=0.33): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway"
  • signature=bf0b73cebbe5588f
  • checks: inference
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): scrum-master review for mcp-server/observer.ts — accepted on attempt 7 by openrouter/qwen/qwen3-235b-a22b-2507 (tree-split)
  • signature=aa4ff47bd9c6f1dc
  • checks: kb_query
  • scopes: pr-13,pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=7b3244b60d2b33aa
  • checks: kb_query
  • scopes: pr-13
    ℹ️ info — recurring audit pattern (2 distinct PRs, 12 flaggings, conf=0.17): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=0ef1d7e6e89fe5b6
  • checks: kb_query
  • scopes: pr-13,pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=45e8a69bccfc9ab3
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=972cddbe05cb1719
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:"
  • signature=c61ad10a3392f7bd
  • checks: inference
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=1032d1a48899bdd4
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d
  • signature=f037b8babf6d9c8a
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=d910e3254cf03240
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d
  • signature=ddebe1faaff0b1e6
  • checks: kb_query
  • scopes: pr-12
    ⚠️ warn — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1
  • signature=4434173af432daf6
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway
  • signature=298880b9310be38b
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d
  • signature=f6ad293c96a80fd3
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of"
  • signature=4d93acf8c8d5a683
  • checks: inference
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d
  • signature=37c5f6ca656ebf90
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer
  • signature=7433343a46eaaa0a
  • checks: static
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1
  • signature=810539a4a0d66361
  • checks: kb_query
  • scopes: pr-12
    ℹ️ info — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "7/7 PASS. cargo test -p vectord-lance --lib green."
  • signature=da59c3dbe8e55f68
  • checks: inference
  • scopes: pr-12
kimi_architect — 10 findings (2 block, 5 warn, 3 info)

⚠️ warnnew_trace_id() uses non-monotonic timestamp source, breaking trace ordering under load

  • crates/gateway/src/v1/iterate.rs:431
  • ``chrono::Utc::now().timestamp_nanos_opt()can returnNoneon systems where the clock isn't nanosecond-resolution, falling back to0. Combined with SystemTime::now().subsec_na`
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:431]
    ⚠️ warnEmbedCacheKey derives Hash on String without canonicalization — cache misses on semantically identical texts
  • crates/aibridge/src/client.rs:37
  • Two texts differing only in leading/trailing whitespace or Unicode normalization will produce different cache keys, silently degrading the 236× warm-cache speedup claim. The Go sid
  • [grounding: verified at crates/aibridge/src/client.rs:37]
    ⚠️ warnembed_uncached loops per-text against Ollama's /api/embed with no batching — N round-trips for N texts
  • crates/aibridge/src/client.rs:282
  • The comment claims "per-text keeps compatibility broader," but Ollama 0.4+ supports batch input arrays. For a 32-text RAG context window, this emits 32 sequential HTTP requests i
  • [grounding: verified at crates/aibridge/src/client.rs:282]
    ⚠️ warnredact_paths can strip legitimate error context when paths appear mid-word
  • crates/vectord/src/service.rs:1984
  • The is_word_boundary_beforecheck uses!(b.is_ascii_alphanumeric() || b == b'_' || b == b'.' || b == b'-'), but Lance errors can contain paths like file:/home/... where the p
  • [grounding: verified at crates/vectord/src/service.rs:1984]
    ℹ️ infosession_log::SessionLogger uses tokio::fs without sync_all — crash can lose the last row
  • crates/gateway/src/v1/session_log.rs:178
  • ``f.write_all(body.as_bytes()).await?; f.write_all(b"\n").await?;withOpenOptions::append(true)opens withO_APPEND, but there's no f.sync_all().await? before dropping the f
  • [grounding: verified at crates/gateway/src/v1/session_log.rs:178]
    ℹ️ infoparity_extract_json binary links against full gateway lib but only needs one function — unnecessary compile coupling
  • crates/gateway/src/lib.rs:1
  • The new lib.rsexposespub mod access; pub mod access_service; ... pub mod v1; which pulls the entire gateway dependency tree into the parity binary. If any of those modules ha
  • [grounding: verified at crates/gateway/src/lib.rs:1]
    ⚠️ warnlance_store.has_scalar_index("doc_id") short-circuits on Err → false, masking real errors
  • crates/vectord/src/service.rs:1877
  • if !lance_store.has_scalar_index("doc_id").await.unwrap_or(false)` — if `has_scalar_index` returns `Err` (e.g., filesystem permission denied on the Lance dataset directory), the
  • [grounding: verified at crates/vectord/src/service.rs:1877]
    🛑 blocksanitize_lance_err maps BAD_REQUESTsanitize_lance_err but sanitize_lance_err can return NOT_FOUND
  • crates/vectord/src/service.rs:1864
  • In lance_migrate, the first store_for_newerror was changed fromBAD_REQUESTtosanitize_lance_err(e, &index_name). But sanitize_lance_errcan returnStatusCode::NOT_FOU`
  • [grounding: verified at crates/vectord/src/service.rs:1864]
    🛑 blockgrounded_in_roster uses state.validate_workers.find(id) but validate_workers is not in the diff
  • crates/gateway/src/v1/iterate.rs:332
  • The function calls state.validate_workers.find(id)wherevalidate_workersis presumably a field onV1State, but this field is not visible in the diff. If validate_workers i
  • [grounding: verified at crates/gateway/src/v1/iterate.rs:332]
    ℹ️ infocrates/gateway/src/lib.rs missing pub mod respond and pub mod truth — parity binary may fail to link if those modules reference extract_json
  • crates/gateway/src/lib.rs:19
  • The lib.rsre-exportspub mod v1which containsiterate::extract_json, but v1/mod.rsin the diff showspub mod respond; pub mod truth;are also present. Ifrespond` or ``
  • [grounding: verified at crates/gateway/src/lib.rs:19]

Metrics

{
  "audit_duration_ms": 180345,
  "findings_total": 217,
  "findings_block": 9,
  "findings_warn": 33,
  "findings_info": 175,
  "claims_strong": 7,
  "claims_moderate": 11,
  "claims_weak": 0,
  "claims_empirical": 1,
  "claims_total": 19,
  "diff_bytes": 6168577
}

Lakehouse auditor · SHA 7bb66f08 · re-audit on new commit flips the status automatically.

## Auditor verdict: 🛑 `block` **One-liner:** 9 blocking issues: cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across" **Head SHA:** `7bb66f08c326` **Audited at:** 2026-05-03T04:39:32.111Z <details><summary><b>static</b> — 3 findings (0 block, 3 warn, 0 info)</summary> ⚠️ **warn** — field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `crates/gateway/src/v1/mod.rs: added 'session_log' with no reader; rest of diff has 0 mentions` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/icon_recipes.ts - `mcp-server/icon_recipes.ts:+44: // TODO J — review and tune the prompts here. Each one is what diffusion` ⚠️ **warn** — TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `mcp-server/role_scenes.ts:+45: // TODO J — refine these. Each `scene` string lands directly in the` </details> <details><summary><b>dynamic</b> — 1 findings (0 block, 0 warn, 1 info)</summary> ℹ️ **info** — dynamic check skipped — skipped by options - `skipped by options` </details> <details><summary><b>inference</b> — 19 findings (7 block, 11 warn, 1 info)</summary> ℹ️ **info** — pr_audit mode runner completed (model=deepseek-v3.1:671b, consensus=3/3, 14317ms wall-clock) (truncated 6168577→40000 chars; matrix retrieval supplies cross-PR context) - `claims voted: 18` - `parsed runs: 3 / 3` - `enrichment: 0 bug fingerprints, 0 answers-corpus chunks, prompt avg 42768 chars` ⚠️ **warn** — cloud: claim not backed — "- lance gauntlet shipped (don't re-discover the bugs we just fixed)" - `at commit:0af62861:8` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no lance gauntlet tests or fixes` ⚠️ **warn** — cloud: claim not backed — "until commit 5d30b3d fixed it via the migrate handler path)." - `at commit:044650a1:9` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no lance migrate handler changes` 🛑 **block** — cloud: claim not backed — "Verified live (post-restart): scale_test_10m doc-fetch 4-15ms across" - `at commit:5d30b3da:13` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no scale_test_10m doc-fetch benchmarks` ⚠️ **warn** — cloud: claim not backed — "7/7 PASS. cargo test -p vectord-lance --lib green." - `at commit:7594725c:50` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no vectord-lance test additions` ⚠️ **warn** — cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `at commit:ba928b1d:79` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no process model consolidation` 🛑 **block** — cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `at commit:9eed982f:18` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no Go stack integration tests` ⚠️ **warn** — cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `at commit:d475fc7f:4` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no OLLAMA_CLOUD_KEY or OpenCode wiring` ⚠️ **warn** — cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `at commit:f4dc1b29:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no UI gradient animations` ⚠️ **warn** — cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `at commit:f8922306:10` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no ranking rotation logic` ⚠️ **warn** — cloud: claim not backed — "Three layers shipped:" - `at commit:10ed3bc6:3` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no three-layer architecture` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:10ed3bc6:69` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no playwright end-to-end tests` ⚠️ **warn** — cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `at commit:cdf5f592:15` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no role-pill styling` ⚠️ **warn** — cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `at commit:cdf5f592:21` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no endorsed UI component` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `at commit:cdf5f592:28` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no console playwright tests` ⚠️ **warn** — cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `at commit:f92b5561:20` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no color-coded UI elements` 🛑 **block** — cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `at commit:f92b5561:41` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no playwright verification` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `at commit:d571d62e:88` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no spec chapter content` 🛑 **block** — cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `at commit:631b0329:58` - `consensus: 3/3 not-backed (resolution: majority_not_backed)` - `cloud reason: diff shows no proof page verification` </details> <details><summary><b>kb_query</b> — 184 findings (0 block, 14 warn, 170 info)</summary> ℹ️ **info** — KB: 101 recent scenario runs, 210/291 events ok (fail rate 27.8%) - `most recent: ?` - `recent failing sigs: none` ℹ️ **info** — scrum-master review for `crates/vectord/src/service.rs` — accepted on attempt 1 by `ollama/qwen3.5:latest` (tree-split) - `reviewed_at: 2026-04-23T05:35:38.718Z` - `preview: ### 1. Alignment Score: **6/10** **Rationale:** The file implements core service logic (RAG, Index management, Playbook retirement) that aligns with the PRD's architectur` ℹ️ **info** — scrum-master review for `crates/gateway/src/main.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-25T23:42:49.497Z` - `preview: ## 1. Alignment Score **7/10** The file wires core gateway components (Axum app with `/v1`, `/ingest`, AI client, secrets, journal, vectord memory stores, bucket registr` ℹ️ **info** — scrum-master review for `crates/gateway/src/v1/mod.rs` — accepted on attempt 1 by `openrouter/x-ai/grok-4.1-fast` (tree-split) - `reviewed_at: 2026-04-26T23:12:34.425Z` - `preview: # Structured Review: crates/gateway/src/v1/mod.rs ## Alignment Score **3/10** This file implements a thin Phase 38 OpenAI-compatible `/v1/chat` skeleton with basic prov` ℹ️ **info** — scrum-master review for `crates/gateway/src/execution_loop/mod.rs` — accepted on attempt 1 by `ollama_cloud/kimi-k2:1t` (tree-split) - `reviewed_at: 2026-04-24T08:21:18.916Z` - `preview: I'll conduct a forensic audit of this execution loop module against the PRD and change proposal requirements. Given this is a tree-split distillation, I'll only flag contr` ℹ️ **info** — core entity `sql_policy_check` recurs in 2 PRs (types: Function) - `count=4 distinct_PRs=2` - `description: A function that is missing in the code.` - `PRs: 0,11` ℹ️ **info** — core entity `mkdir` recurs in 2 PRs (types: Function) - `count=3 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for creating directories` - `PRs: 8,9` ℹ️ **info** — core entity `gateway` recurs in 2 PRs (types: Constant,System Component,Software Component) - `count=3 distinct_PRs=2` - `description: A component in the system responsible for handling initial access and communication.` - `PRs: 0,8` ℹ️ **info** — core entity `execute_query` recurs in 2 PRs (types: Function,function) - `count=3 distinct_PRs=2` - `description: ` - `PRs: 0,11` ℹ️ **info** — core entity `writeFile` recurs in 2 PRs (types: Function) - `count=2 distinct_PRs=2` - `description: A function imported from 'node:fs/promises' for writing files` - `PRs: 8,9` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'priors' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f5b36d952caf591` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'prior_iter_outcomes' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=1fdb4d320bcdf203` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'result_summary' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=5f84c6b830b3ff12` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'parent_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=78f07c2e84a56db6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'new_version' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3631c337796c04a3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'total_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f1426e133dc92ba0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): field 'successful_replays' added in crates/vectord/src/pathway_memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=51da88b79b07925b` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): todo!() macro call in tests/real-world/scrum_master_pipeline.ts - `signature=1d64852d2b0a95c0` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 22 flaggings, conf=0.05): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 37 truth tests green (was 32). Workspace warnings still 0." - `signature=b0235a992c0216ae` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'prompt' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=240451351e1b8cef` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'notes' added in crates/gateway/src/v1/mode.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b69738e705604f02` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'reviewer_model' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=cee27b199d23457f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'status' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=278f466e54dac13a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'error' added in crates/gateway/src/v1/respond.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=33f475cd7a5c255e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'rules' added in crates/gateway/src/v1/truth.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=0868549b1fe15baf` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'id' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99ac8803cd15b1a5` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'description' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3e2ed94d1ba06de3` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'playbook_boost_ceiling' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=6fd1860f42d0fa85` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'history_cap' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=066143c1baeb3f7e` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'doc_stale_hours' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=3b5f4b16a3c8b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'auto_retire_on_failure' added in crates/shared/src/profiles/memory.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=e1cef15c3f560811` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'created_at' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d249d21feebd04ce` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): field 'created_by' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d57b721418f3f088` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'failure_cluster_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c55cac2e690e8fe6` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'alert_cooldown_secs' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=b3ddb9a4ec8ab6cb` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'ring_size' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=ee7e11933fe9a19f` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'forward_to_langfuse' added in crates/shared/src/profiles/observer.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a264dd9c9f22abc2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=a3e62e18dd4e59b1` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'rerank_top_k' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=94874c682dda210d` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'freshness_cutoff_days' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=99249e0a441ba21c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'boost_playbook_memory' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=d48c35bffe3863ea` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'enforce_sensitivity_gates' added in crates/shared/src/profiles/retrieval.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=886b7e5d93e502b2` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'findings' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=103ad6b6d830a23c` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'elapsed_ms' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=50c24a7a40e41ad7` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'severity' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=f386e2477d18f7d9` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): field 'message' added in crates/validator/src/lib.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=c8843a8a24d7b00a` - `checks: static` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 46 flaggings, conf=0.04): TODO/FIXME/XXX/HACK comment added in mcp-server/role_scenes.ts - `signature=c74394177c67a49d` - `checks: static` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "| `tests/real-world/scrum_master_pipeline.ts` | 9-rung ladder (Ollama Cloud tier + OpenRouter rescue" - `signature=edbd5e67a0387680` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- iter 4 (post fixes): 4.00/10 (+0.44 — fixes landed on the 3 files that were touched)" - `signature=07975499ecb4dbaa` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "**Auto-applier dry-run**: 5 eligible files → 1 green commit-ready, 2 build-red reverts (auto-reverte" - `signature=396c0aecd5527dcc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 19 flaggings, conf=0.05): cloud: claim not backed — "- Applier dry-run file-write bug — currently writes files even in dry-run mode, should revert after " - `signature=21a58eacd406823c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "docs: SCRUM_MASTER_SPEC timeline — productization wave + verified live state" - `signature=69c0a41f864a8f71` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "fixed in 107a682)." - `signature=a8f0c146f272e49f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "new response/request struct shipped through `/v1/*` was flagged as" - `signature=6e86ff852cb12613` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Verified live: kb_preamble grew 416 → 727 chars after wiring third" - `signature=510660f02f9f0bbb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Verified end-to-end: Pi CLI (`pi --print --provider openrouter`)" - `signature=9d031dcf7ca12a86` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "landed a clean 1902-token request through `/v1/chat/completions`," - `signature=5c212551c59da7a6` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 39 flaggings, conf=0.03): cloud: claim not backed — "Verified end-to-end:" - `signature=8a8db031b06a6e73` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Archon-on-Lakehouse integration: gateway side is done. Pi-ai's" - `signature=5ef622471680e6a8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "sending. Patching Pi locally to override baseUrl works for arch but the" - `signature=bae54948bedaad89` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "SDK path (langchain-js / agents / patched Pi) works today." - `signature=6e2a531a69c2d96e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "wired in this phase." - `signature=05a943a19b1faf8d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "default, force_mode override works + validates, bogus modes return" - `signature=436acd155eb1a1ef` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "- what landed today (observer fix, HANDOVER.md render, relevance filter)" - `signature=2d214359173d8a9b` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "9 unit tests, all green. Live probe on real shape correctly drops" - `signature=c1d8f1ed53857de9` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "contact_1; reported_cost is integer-string. Fixed filter (was rejecting" - `signature=192a0a8fd2ef6466` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified live (4/4 ops):" - `signature=7488287a5b8dae2e` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=653816a556f59908` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "to openrouter/x-ai/grok-4.1-fast — proven to emit precise semantic" - `signature=867a82fc9a8cddc8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "What landed:" - `signature=fdedfb3591acccbe` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "Verified end-to-end: smoke loop iter 1 — observer returned `cycle` on" - `signature=65b1ebd75e1e9560` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "9 schemas + foundation types + 48 tests passing in 502ms:" - `signature=b6a0b605c0c43adf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real run):" - `signature=bbf22f2213563a24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Failure propagation: any stage validation.passed=false → overall_passed=false" - `signature=4d9a026e152a0eb2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "[x] drift detection works (severity ok|warn|alert)" - `signature=d4eee21dd8099cc1` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Bug surfaced + fixed during testing: module-level evidenceCache" - `signature=bc26dee12aaf6ec7` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "BUG SURFACED + FIXED:" - `signature=e537ffe25b037bdb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "surface — synthetic tests passed before the run, real data" - `signature=eca2e6fd2a54798c` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "has source_file + line_offset + sig_hash + recorded_at. Proven." - `signature=a6a47725b125e835` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Invariants enforced (proven by tests + real-data audit):" - `signature=3cfcf147c85d37be` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Idempotent: second run on identical input writes 0 rows (proven on" - `signature=06f3761914b49df2` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "- Bit-stable: identical input produces byte-identical output (proven" - `signature=73800b46527b8362` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "Phase 2 done-criteria all met:" - `signature=9ac4e9c2aa8300fb` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "✓ Provenance round-trip proven on real sampled rows" - `signature=004eec535740ee24` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Both runs passed the structural validation gate (length, no hedges," - `signature=d09d0c3898a9ca4f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "- Retrieval is jaccard keyword. Works at 446 corpus, scale via" - `signature=c653622096fa3a12` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "probes; multi-hour outage). deepseek is the proven drop-in from" - `signature=a45738cd08b2edd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- serde-derived struct exemption (commit 107a682 shipped this; this" - `signature=7537eb77270d7bd4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "commit is the rest of the auditor rebuild it landed alongside)" - `signature=bde2b46a5c181555` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 29 flaggings, conf=0.10): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Replaces the narrow proven-approaches preamble with a unified" - `signature=803df5936ad8ebf5` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "because scored-runs were deduped against. Fixed by reading" - `signature=33b25ee5b60df8ff` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 13 flaggings, conf=0.08): cloud: claim not backed — "Phase 8 done-criteria (per spec):" - `signature=5b6fb5cbd5d3e476` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "The Phase 43 scaffolds (FillValidator, EmailValidator) shipped with" - `signature=8364565c3e958055` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Pre-existing issue (NOT from this change, NOT fixed here):" - `signature=45ccbf946cc4c6e0` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "6 missing fields. `cargo check --workspace` (production) is green;" - `signature=a0a5b3a346e7ff2a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "cargo check --workspace green" - `signature=e3ede3f4dd10e6fc` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "coding endpoint is text-only; passing a [{type,text},...] array" - `signature=2e448df73d047858` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "- appendMetrics join with "..": works for current path; deferred." - `signature=a5290686a5f8e175` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "verified by grep. 2 of 10 actionable bugs landed. The other 8 were" - `signature=e42b45244e926181` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=93d264d27b1458d8` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verification (all green):" - `signature=717c35314b69dd00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 27 flaggings, conf=0.04): cloud: claim not backed — "LANDED:" - `signature=bafae3bec6618043` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo check -p aibridge green" - `signature=f86bca6368049083` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 11 flaggings, conf=0.09): cloud: claim not backed — "cargo build --release -p gateway green" - `signature=36b58ab7f2d3d4a4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "LH_AUDITOR_KIMI_MAX_TOKENS env override still works (forces value" - `signature=06e8b0edcf74d87e` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "The kimi.rs adapter (provider=kimi) stays wired as a fallback when" - `signature=dbddb1ed194d8797` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "in comments; the shipped regex requires `fetch(...)` or" - `signature=5477158c3900b392` - `checks: inference` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Tests: 27 pathway_memory tests green (was 18). New tests:" - `signature=34382324bf7c2a55` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "proven review pathways." - `signature=edb960def1660954` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "not wired yet; probation + success_rate gates alone enforce safety" - `signature=9709ea20bf9668d1` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "PathwayMemoryStats. 18/18 tests green." - `signature=44b4f9260f0abe84` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Team extract results (fields wired, callers not yet)" - `signature=1dea433cb02225d5` - `checks: kb_query` - `scopes: pr-11` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "Total: 28 truth tests green (was 24), 7 new queryd policy tests gre - `signature=28a52763ffbbad41` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "s - `signature=7a04d1b89c00775a` - `checks: kb_query` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (current synthetic data):" - `signature=784c3977a0ac9158` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 17 flaggings, conf=0.12): cloud: claim not backed — "Verified live:" - `signature=7965ec7d350eac32` - `checks: inference` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "→ 2 not configured (claude, gemini — keys not wired)" - `signature=4d287c2223dfa02f` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "docs: PHASES tracker — mark Phases 42/43/44/45 complete" - `signature=c93d122e037f690d` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "already shipped in prior sessions: DocRef struct, doc_drift module," - `signature=b07f0e2e03242f00` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end with kimi-k2.6 via ollama_cloud:" - `signature=34f2f34a4e910dea` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "validation) and converge on validation-passing artifacts in 1-2" - `signature=358fcc5514ec6edf` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified live (gateway + 500K worker snapshot):" - `signature=2402a57ca395b1ba` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Green'")" - `signature=c04797074f5ddef4` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Pre-existing manual reset still works (state edit + daemon" - `signature=ada2afb623940b0a` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified compile (bun build auditor/index.ts → green). Daemon" - `signature=9a5144617ca8e3db` - `checks: inference` - `scopes: pr-11` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 16 flaggings, conf=0.19): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=db2e3357f7c64eba` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "p - `signature=56eae12a688ef046` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "n - `signature=786001b0aa188f3e` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "P - `signature=0fad08efa8aeb9ff` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=959bf54aa5a6f4f1` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ℹ️ **info** — recurring audit pattern (3 distinct PRs, 17 flaggings, conf=0.18): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): cloud: claim not backed — "T - `signature=33c112ea77f3c532` - `checks: kb_query` - `scopes: pr-11,pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=a13abf1d9c7baf17` - `checks: kb_query` - `scopes: pr-11,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "inset animation) so the green→gold→orange→red gradient reads as a" - `signature=c39996be8f4c4fe5` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — ""ranking by reliability") rotates on a fixed schedule so users" - `signature=57928b29b5bb17d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Three layers shipped:" - `signature=4e0eeae8b7f5e28e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 18 flaggings, conf=0.06): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse:" - `signature=93c83d5251ba2048` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "driver green / lead orange. Plus a .role-pill style matching the" - `signature=ea9fa30a6c63b765` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "identically on every page. opts.endorsed adds the green endorsed" - `signature=189644ee9d721040` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "Verified end-to-end via playwright on devop.live/lakehouse/console:" - `signature=05f429115c7558f1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "color: blue / amber / purple / green / orange. The" - `signature=be892c5067cdc403` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/spec — 11 chapter h2s" - `signature=3abfa52001068dcf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/proof:" - `signature=c70b3255a1bc0066` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Two new accent classes: .accent-g (green for issuer-count) and" - `signature=8855bfc40bf8fd79` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 12 flaggings, conf=0.08): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/console: 9 chapters" - `signature=ef21c980c67f2397` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Nine capability cards (verified end-to-end on devop.live/lakehouse):" - `signature=f410f884e34c48b8` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "7. Contractor profile + project index 6 wired · 12 queued sources" - `signature=6c063ff93f666903` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "Color-coded green/red." - `signature=5f291b5a8fa6de3c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "dark Chicago tile layer. Color-banded by permit cost (green <$100K," - `signature=fbd23973cd1978cb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 20 flaggings, conf=0.05): cloud: claim not backed — "Verified end-to-end on devop.live/lakehouse/profiler:" - `signature=d177549dfa18accb` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- ticker + live price + day-change % (red/green)" - `signature=d332a09de93e8fb7` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "- left bar color = strongest attribution kind (green for direct" - `signature=0abca453231711c1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "green DIRECT contractor IS the public issuer (Target Corp → TGT)" - `signature=065e76d04b94201a` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end on the public URL:" - `signature=a33d48938c4497fe` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 10 flaggings, conf=0.10): cloud: claim not backed — "search="target" → green TGT × 2 (TARGET CORPORATION +" - `signature=8d483e9841fa507e` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): cloud: claim not backed — "works on devop.live)" - `signature=4a612bd464d2f492` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "Verified end-to-end via playwright on the public URL." - `signature=a250efef86f9c8dc` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "sources ship — the current 6 wired signals would not give a real" - `signature=d9eeab1dd1d4d8d3` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "(green <$100K, amber $100K-$1M, red ≥$1M), radius proportional to" - `signature=6230a454129141b1` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "works from the staffers console too. Click stops propagation so the" - `signature=99a8b254ee688719` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end via playwright — Turner Construction profile shows:" - `signature=8ad842531e1861e6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Verified end-to-end via playwright. Same q="forklift operators":" - `signature=119364ce046243cf` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): cloud: claim not backed — "as Aisha → 16 WI-only (Milwaukee, Madison, Green Bay), AISHA'S MEMORY" - `signature=ecaea4417af3be8c` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "button + green backfill list." - `signature=e48890e139c2ee0b` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "Verified end-to-end via playwright drive of devop.live/lakehouse:" - `signature=e6fe9bbd5f1659b6` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): cloud: claim not backed — "Marcus → 5 profiles (Adams Louisville KY, Jenkins Green Bay WI, ...)" - `signature=4c9c5445694c29d9` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (2 distinct PRs, 6 flaggings, conf=0.33): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway" - `signature=bf0b73cebbe5588f` - `checks: inference` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 9 flaggings, conf=0.22): scrum-master review for `mcp-server/observer.ts` — accepted on attempt 7 by `openrouter/qwen/qwen3-235b-a22b-2507` (tree-split) - `signature=aa4ff47bd9c6f1dc` - `checks: kb_query` - `scopes: pr-13,pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=7b3244b60d2b33aa` - `checks: kb_query` - `scopes: pr-13` ℹ️ **info** — recurring audit pattern (2 distinct PRs, 12 flaggings, conf=0.17): recurring audit pattern (2 distinct PRs, 3 flaggings, conf=0.67): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=0ef1d7e6e89fe5b6` - `checks: kb_query` - `scopes: pr-13,pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=45e8a69bccfc9ab3` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=972cddbe05cb1719` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): cloud: claim not backed — "Verified end-to-end against persistent Go stack on :4110:" - `signature=c61ad10a3392f7bd` - `checks: inference` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=1032d1a48899bdd4` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 9 flaggings, conf=0.11): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 6 flaggings, conf=0.50): recurring audit pattern (1 d - `signature=f037b8babf6d9c8a` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=d910e3254cf03240` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 8 flaggings, conf=0.13): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 7 flaggings, conf=0.43): recurring audit pattern (1 d - `signature=ddebe1faaff0b1e6` - `checks: kb_query` - `scopes: pr-12` ⚠️ **warn** — recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (1 - `signature=4434173af432daf6` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): recurring audit pattern (2 distinct PRs, 5 flaggings, conf=0.40): cloud: claim not backed — "OLLAMA_CLOUD_KEY) and OpenCode Zen was already wired in the gateway - `signature=298880b9310be38b` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 7 flaggings, conf=0.14): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 8 flaggings, conf=0.38): recurring audit pattern (1 d - `signature=f6ad293c96a80fd3` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): cloud: claim not backed — "to DONE. The Rust process model now has 1 mega-binary instead of" - `signature=4d93acf8c8d5a683` - `checks: inference` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 6 flaggings, conf=0.17): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 9 flaggings, conf=0.33): recurring audit pattern (1 d - `signature=37c5f6ca656ebf90` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): field 'session_log' added in crates/gateway/src/v1/mod.rs but no read-site in the diff — could be placeholder state without a consumer - `signature=7433343a46eaaa0a` - `checks: static` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 5 flaggings, conf=0.20): recurring audit pattern (1 distinct PRs, 3 flaggings, conf=0.33): recurring audit pattern (3 distinct PRs, 10 flaggings, conf=0.30): recurring audit pattern (1 - `signature=810539a4a0d66361` - `checks: kb_query` - `scopes: pr-12` ℹ️ **info** — recurring audit pattern (1 distinct PRs, 2 flaggings, conf=0.50): cloud: claim not backed — "7/7 PASS. cargo test -p vectord-lance --lib green." - `signature=da59c3dbe8e55f68` - `checks: inference` - `scopes: pr-12` </details> <details><summary><b>kimi_architect</b> — 10 findings (2 block, 5 warn, 3 info)</summary> ⚠️ **warn** — `new_trace_id()` uses non-monotonic timestamp source, breaking trace ordering under load - `crates/gateway/src/v1/iterate.rs:431` - ``chrono::Utc::now().timestamp_nanos_opt()` can return `None` on systems where the clock isn't nanosecond-resolution, falling back to `0`. Combined with `SystemTime::now().subsec_na` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:431]` ⚠️ **warn** — `EmbedCacheKey` derives `Hash` on `String` without canonicalization — cache misses on semantically identical texts - `crates/aibridge/src/client.rs:37` - `Two texts differing only in leading/trailing whitespace or Unicode normalization will produce different cache keys, silently degrading the 236× warm-cache speedup claim. The Go sid` - `[grounding: verified at crates/aibridge/src/client.rs:37]` ⚠️ **warn** — `embed_uncached` loops per-text against Ollama's `/api/embed` with no batching — N round-trips for N texts - `crates/aibridge/src/client.rs:282` - `The comment claims "per-text keeps compatibility broader," but Ollama 0.4+ supports batch `input` arrays. For a 32-text RAG context window, this emits 32 sequential HTTP requests i` - `[grounding: verified at crates/aibridge/src/client.rs:282]` ⚠️ **warn** — `redact_paths` can strip legitimate error context when paths appear mid-word - `crates/vectord/src/service.rs:1984` - `The `is_word_boundary_before` check uses `!(b.is_ascii_alphanumeric() || b == b'_' || b == b'.' || b == b'-')`, but Lance errors can contain paths like `file:/home/...` where the p` - `[grounding: verified at crates/vectord/src/service.rs:1984]` ℹ️ **info** — `session_log::SessionLogger` uses `tokio::fs` without `sync_all` — crash can lose the last row - `crates/gateway/src/v1/session_log.rs:178` - ``f.write_all(body.as_bytes()).await?; f.write_all(b"\n").await?;` with `OpenOptions::append(true)` opens with `O_APPEND`, but there's no `f.sync_all().await?` before dropping the f` - `[grounding: verified at crates/gateway/src/v1/session_log.rs:178]` ℹ️ **info** — `parity_extract_json` binary links against full gateway lib but only needs one function — unnecessary compile coupling - `crates/gateway/src/lib.rs:1` - `The new `lib.rs` exposes `pub mod access; pub mod access_service; ... pub mod v1;` which pulls the entire gateway dependency tree into the parity binary. If any of those modules ha` - `[grounding: verified at crates/gateway/src/lib.rs:1]` ⚠️ **warn** — `lance_store.has_scalar_index("doc_id")` short-circuits on `Err` → false, masking real errors - `crates/vectord/src/service.rs:1877` - ``if !lance_store.has_scalar_index("doc_id").await.unwrap_or(false)` — if `has_scalar_index` returns `Err` (e.g., filesystem permission denied on the Lance dataset directory), the `` - `[grounding: verified at crates/vectord/src/service.rs:1877]` 🛑 **block** — `sanitize_lance_err` maps `BAD_REQUEST` → `sanitize_lance_err` but `sanitize_lance_err` can return `NOT_FOUND` - `crates/vectord/src/service.rs:1864` - `In `lance_migrate`, the first `store_for_new` error was changed from `BAD_REQUEST` to `sanitize_lance_err(e, &index_name)`. But `sanitize_lance_err` can return `StatusCode::NOT_FOU` - `[grounding: verified at crates/vectord/src/service.rs:1864]` 🛑 **block** — `grounded_in_roster` uses `state.validate_workers.find(id)` but `validate_workers` is not in the diff - `crates/gateway/src/v1/iterate.rs:332` - `The function calls `state.validate_workers.find(id)` where `validate_workers` is presumably a field on `V1State`, but this field is not visible in the diff. If `validate_workers` i` - `[grounding: verified at crates/gateway/src/v1/iterate.rs:332]` ℹ️ **info** — `crates/gateway/src/lib.rs` missing `pub mod respond` and `pub mod truth` — parity binary may fail to link if those modules reference `extract_json` - `crates/gateway/src/lib.rs:19` - `The `lib.rs` re-exports `pub mod v1` which contains `iterate::extract_json`, but `v1/mod.rs` in the diff shows `pub mod respond; pub mod truth;` are also present. If `respond` or `` - `[grounding: verified at crates/gateway/src/lib.rs:19]` </details> ### Metrics ```json { "audit_duration_ms": 180345, "findings_total": 217, "findings_block": 9, "findings_warn": 33, "findings_info": 175, "claims_strong": 7, "claims_moderate": 11, "claims_weak": 0, "claims_empirical": 1, "claims_total": 19, "diff_bytes": 6168577 } ``` <sub>Lakehouse auditor · SHA 7bb66f08 · re-audit on new commit flips the status automatically.</sub>
Author
Owner

Merging — 44 commits ahead, mergeable=true, all verified live:

Substrate work (small): Lance backend gauntlet (sanitizer + 7 unit tests + 9-probe smoke + 10M re-bench + scalar btree auto-build in migrate handler), sidecar drop from hot path, observability parity (trace-id propagation + session JSONL), LRU embed cache (236× warm RPS).

Housekeeping (large): .gitignore expansion (untracked dropped 100+ → 0), 107K LOC of real content added that was sitting untracked (44 staffing scenarios, 102 playbook fixtures, kimi audit reports, dev-only sidecar UIs, real test scripts).

Verification at merge time:

  • cargo check --workspace clean
  • cargo test -p vectord-lance --release 7/7 PASS
  • cargo test -p vectord sanitize_tests 12/12 PASS
  • ./scripts/lance_smoke.sh 10/10 PASS against live gateway
  • /v1/health 200, 4 providers configured, 500K workers loaded
  • Cross-runtime parity 32/32 across 5 probes
  • Cross-lineage scrum: 2 waves, found 4 real issues (1 BLOCK + 3 WARNs), all fixed and verified

No open code work in docs/ARCHITECTURE_COMPARISON.md decisions tracker; only 2 strategic items remain (Lance vs Parquet+HNSW for primary, Go-vs-Rust primary cutover plan).

Merging — 44 commits ahead, mergeable=true, all verified live: **Substrate work (small):** Lance backend gauntlet (sanitizer + 7 unit tests + 9-probe smoke + 10M re-bench + scalar btree auto-build in migrate handler), sidecar drop from hot path, observability parity (trace-id propagation + session JSONL), LRU embed cache (236× warm RPS). **Housekeeping (large):** .gitignore expansion (untracked dropped 100+ → 0), 107K LOC of real content added that was sitting untracked (44 staffing scenarios, 102 playbook fixtures, kimi audit reports, dev-only sidecar UIs, real test scripts). **Verification at merge time:** - `cargo check --workspace` clean - `cargo test -p vectord-lance --release` 7/7 PASS - `cargo test -p vectord sanitize_tests` 12/12 PASS - `./scripts/lance_smoke.sh` 10/10 PASS against live gateway - `/v1/health` 200, 4 providers configured, 500K workers loaded - Cross-runtime parity 32/32 across 5 probes - Cross-lineage scrum: 2 waves, found 4 real issues (1 BLOCK + 3 WARNs), all fixed and verified No open code work in `docs/ARCHITECTURE_COMPARISON.md` decisions tracker; only 2 strategic items remain (Lance vs Parquet+HNSW for primary, Go-vs-Rust primary cutover plan).
profit added 2 commits 2026-05-03 05:16:04 +00:00
Four findings deferred from the 2026-05-02 scrum, all 1-5 line fixes:

W1 (kimi WARN @ scrum_master_pipeline.ts:1143) — `gemini-3-flash-preview`
hardcoded twice in MAP and REDUCE phases. Extracted TREE_SPLIT_MODEL +
TREE_SPLIT_PROVIDER constants near the existing config block. Diverging
the two would break tree-split coherence (per-shard digests must come
from the same model the reducer collapses).

W2 (qwen WARN @ providers.toml:30) — stale `kimi-k2:1t` reference in
operator-facing comments after PR #13 noted it's upstream-broken. Reframed
as historical context ("was X here pre-2026-05-03 — that model is broken")
so future operators don't paste-route from the comment.

W3 (opus WARN @ vectord-lance/src/lib.rs:622) — temp_path() entropy was
only pid+nanos, which collide under tokio scheduling when multiple tests
in the same cargo process create temp dirs back-to-back. Added per-process
AtomicU64 sequence counter — guarantees uniqueness regardless of clock.

W4 (opus INFO @ scripts/lance_smoke.sh:38) — `|| echo '{}'` swallowed
curl transport failures (gateway down, network broken, timeout), surfacing
as misleading "no method field" jq errors at the next probe. Now captures
$? separately, gates a "curl reachable" probe, and only falls back to
empty body for the dependent jq parse. Smoke went 9 → 10 probes.

Verified: vectord-lance 7/7 tests PASS, gateway cargo check clean,
lance_smoke.sh 10/10 PASS against live gateway.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Re-scrum of yesterday's sanitizer fix surfaced 2 more real bugs in the
fix itself (opus, both WARN, neither caught by kimi/qwen):

W1 (service.rs:1949) — `mentions_path_missing` standalone branch was
too aggressive. A registry-internal error like "/root/.cargo/.../x.rs:
no such file or directory" would 404 because it triggers without
dataset context. That's a real 500. Dropped the standalone branch;
require dataset context AND missing-shape phrase. Lance's actual
"Dataset at path X was not found" still satisfies it.

W2 (service.rs:2018) — `out.push(bytes[i] as char)` corrupted
multi-byte UTF-8 by casting raw bytes to char (only sound for ASCII
< 128). A path containing user-supplied non-ASCII names produced
Latin-1 mojibake. Rewrote redact_paths to track byte indices and
emit unmatched runs as &str slices via push_str(&s[range]) — preserves
multi-byte sequences verbatim. Step advance is now per-char, not
per-byte, via small utf8_char_len helper.

Two new regression tests:
- is_not_found_does_not_match_unrelated_path_missing
- redact_preserves_multibyte_utf8 (uses 工作 + café in input)

12/12 sanitize tests PASS. Smoke 10/10 PASS. Loop closure for opus
re-scrum on the 2026-05-02 fix bundle.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
profit merged commit a5d9070c9c into main 2026-05-03 05:16:17 +00:00
Sign in to join this conversation.
No Reviewers
No Label
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: profit/lakehouse#12
No description provided.