Sealed Catalog V1
Client-facing, deterministic catalog output from Sovrient’s measured-event pipeline. This feed is designed for integration into existing model workflows without model rewrites: same event parameters, now with replayable evidence context and hash integrity.
What This Is
- Deterministic catalog export from date-bound `ms_zones` + `dsd` inputs.
- Fail-closed publication by default when gate/admissibility requirements are not met.
- Hash anchored with canonical identity hash and file-bytes SHA256 sidecar.
- Immutable dated artifact guard unless explicit force override is provided.
Live Endpoints
Latest JSON
Latest SHA256
Dated JSON
/data/sealed_catalog_YYYY-MM-DD.json
Dated SHA256
/data/sealed_catalog_YYYY-MM-DD.json.sha256
Latest may remain unchanged on non-admissible runs (fail-closed behavior).
Verify In 3 Steps
curl -fsS https://www.sovrient.com/data/sealed_catalog_latest.json -o sealed_catalog_latest.json curl -fsS https://www.sovrient.com/data/sealed_catalog_latest.json.sha256 -o sealed_catalog_latest.json.sha256 sha256sum -c sealed_catalog_latest.json.sha256
`OK` means file bytes match the published sidecar checksum.
Integration Contract (Readable)
- schema/date/generated_utc: artifact envelope and date identity.
- verification: gate state, admissibility, replay hash, DSD profile/pairs/DT0, anchor state.
- summary: daily counts and corroboration aggregates.
- catalog[]: per-event parameters + corroboration metrics.
- canonical_sha256: deterministic logical identity hash under declared scope.