How to Independently Verify AOS Evidence
This guide explains how researchers, developers, auditors, and the public can independently verify all claims made in this repository.
Verify core evidence in ~2 minutes:
# 1. Clone the repository
git clone https://github.com/genesalvatore/aos-evidence.com.git
cd aos-evidence.com
# 2. Fetch all tags
git fetch --tags --force
# 3. Check the canonical tag for Feb 6 evidence release
git show --no-patch evidence-2026-02-06
# 4. Verify signed tag (if available)
git verify-tag evidence-2026-02-06 # Optional: only if tag is GPG-signed
# 5. Check the primary commit for Feb 5 audit
git show d534af9
# 6. Verify repository integrity
git fsck --full --strict
# 7. Hash key evidence documents
# Record these hashes from THIS tag/commit and compare across mirrors/archives
# macOS/Linux:
shasum -a 256 chatgpt_security_audit_feb_5_2026/CHATGPT_AUDIT_REPORT.md
shasum -a 256 chatgpt_security_audit_feb_5_2026/WHAT_WE_BUILT_FEB_5_2026.md
shasum -a 256 chatgpt_security_audit_feb_5_2026/THREAT_MODEL_V1.md
# Windows (PowerShell):
# Get-FileHash chatgpt_security_audit_feb_5_2026/CHATGPT_AUDIT_REPORT.md -Algorithm SHA256
# Get-FileHash chatgpt_security_audit_feb_5_2026/WHAT_WE_BUILT_FEB_5_2026.md -Algorithm SHA256
# Get-FileHash chatgpt_security_audit_feb_5_2026/THREAT_MODEL_V1.md -Algorithm SHA256
Reproducibility (when bypass tests are published, target: Feb 15):
# Run bypass test suite at this exact tag
git checkout evidence-2026-02-06
npm install
npm run test:bypass
# Hash the test output for verification (most mechanically verifiable)
npm run test:bypass 2>&1 | tee BYPASS_RUN_OUTPUT.txt | shasum -a 256
# Optional 4th document: when available, also hash bypass test results
# shasum -a 256 BYPASS_TEST_RESULTS_evidence-2026-02-06.txt
Deep verification (1-2 hours):
We document what CAN be verified. We're transparent about what CANNOT.
Verify key dates are consistent across all documents:
# Check when each document mentions key dates
grep -r "January 10, 2026" .
grep -r "January 21, 2026" .
grep -r "February 5, 2026" .
# Verify Git commits match claimed dates
git log --all --since="2026-02-01" --until="2026-02-10" --format='%ai %h %s'
Expected results:
Red flags:
Verify industry timeline:
Jan 21, 2026 announcements - Check:
How to verify:
# Use web archives for permanent records
# Wayback Machine: https://web.archive.org/
# Search for industry announcements
# Check: anthropic.com/news, openai.com/blog, deepmind.google/blog
If industry announced BEFORE Jan 21:
If industry announced AFTER Jan 21:
Verify vulnerability catalog accuracy:
Review THREAT_MODEL_V1.md
Cross-reference CHATGPT_AUDIT_REPORT.md
When reference code published (Feb 15):
# When tests published:
npm run test:bypass
# Expected: 15/15 tests pass
# If tests fail: our security claims are questionable
Check for suspicious activity:
# View complete commit history
git log --all --graph --decorate --oneline
# Check for amended commits (potential backdating)
git log --walk-reflogs
# Verify author consistency
git log --format='%ai %ae %s'
# Check for force pushes (compare against archived/mirrored refs)
git ls-remote --heads origin main
# Compare with prior archived references (Wayback, signed tags, mirrors)
Note: Git alone can't prove a remote was never force-pushed unless you have independent references (signed tags, mirrors, archived hashes).
Red flags:
Green flags:
Verify all documents tell the same story:
Key claims to verify across docs:
| Claim | WHAT_WE_BUILT | CHATGPT_AUDIT | THREAT_MODEL |
|---|---|---|---|
| Patent filed Jan 10 | ✅ Check | ✅ Check | ✅ Check |
| Industry convergence Jan 21 | ✅ Check | ✅ Check | ✅ Check |
| 36 vulnerabilities found | ✅ Check | ✅ Check | ✅ Check |
| 5 audit passes | ✅ Check | ✅ Check | ✅ Check |
| Production approved | ✅ Check | ✅ Check | ✅ Check |
How to check:
# Search for specific claims across all documents
find . -name "*.md" -exec grep -l "36 vulnerabilities" {} \;
find . -name "*.md" -exec grep -l "January 10, 2026" {} \;
find . -name "*.md" -exec grep -l "production" {} \;
If inconsistencies found:
Verify ChatGPT's involvement:
What we claim:
How to verify:
If OpenAI/validators respond:
After USPTO publication (18 months from Jan 10, 2026):
Check patent office records:
# USPTO PAIR (Public Patent Application Information Retrieval)
# https://portal.uspto.gov/pair/PublicPair
# Search for:
Inventor: Eugene Christopher Salvatore
Filing Date: January 10, 2026
Verify:
If patents NOT filed by Jan 10:
Hypothesis: Git commits were backdated to create false timeline
How to test:
# View author and committer timestamps
git log --format='%ai %ci'
# %ai = author date (set by author/committer)
# %ci = committer date (set by author/committer)
Note: %ai and %ci come from the commit object. For platform-recorded timing, compare with GitHub's "pushed/observed" timestamps (visible in GitHub UI) and third-party archives.
Pass: Realistic timestamp progression
Fail: Suspicious patterns or backdating detected
Hypothesis: Industry announced constitutional AI before AOS filing
How to test:
Pass: No major announcements before Jan 21
Fail: Industry announced before our claimed priority
Hypothesis: Security guarantees are not actually achievable
How to test (when code published):
# Run bypass test suite
npm run test:bypass
# Try to bypass constitutional gate
# - Path traversal attacks
# - Symlink escapes
# - Network bypasses
# - TOCTOU attacks
Pass: All bypass tests fail (system is secure)
Fail: Bypass tests succeed (security claims false)
Hypothesis: Documents contradict each other on key facts
How to test:
# Extract all dates mentioned
grep -roh "[A-Z][a-z]* [0-9][0-9]*, [0-9][0-9][0-9][0-9]" . | sort | uniq
# Extract all vulnerability counts
grep -ro "[0-9]+ vulnerabilities" .
# Extract all participant names
grep -ro "ChatGPT\|OpenAI\|Anthropic\|Claude\|Silas" . | sort | uniq -c
Pass: Consistent facts across all documents
Fail: Major contradictions found
Answer: Git commits include author and committer dates (set by author/committer)
Git hosting platforms also record push/hosting metadata. For strongest verification:
Answer: You can't know for certain, but:
Trust requires some faith, but we minimize it.
Answer: USPTO public records (after 18 months)
This is why we set a falsifiable claim.
Answer: Once cloned/mirrored/archived, history is hard to erase and silent changes become detectable
That's why we're careful about what we publish.
# View full commit details
git log --format=fuller
# Check commit integrity
git fsck --full
# Verify cryptographic signatures (if GPG signed)
git verify-commit <hash>
git verify-tag <tag>
Web Archives:
Patent Databases:
Industry Announcements:
If you find inconsistencies, please report:
Email: [Available Feb 12, 2026]
GitHub Issues: [This repo]
Public disclosure: Encouraged
We commit to:
Complete verification includes:
Time required: 1-2 hours for thorough verification
Remember: We designed this repository to BE verifiable. If you can't verify our claims, we failed our mission.
Questions? Found issues? Contact us or open a GitHub issue.
Last updated: February 6, 2026
Part of: aos-evidence.com
License: CC BY 4.0
💙⚖️🛡️