MAL proof bundles are hash artifacts. They are useful for audit, but they are not trusted execution environment attestations.Documentation Index
Fetch the complete documentation index at: https://docs.compose.market/llms.txt
Use this file to discover all available pages before exploring further.
Proof Bundle
When a plan setsrequireProof: true, the interpreter accumulates:
| Field | Meaning |
|---|---|
planHash | Hash of the canonical plan before execution. |
steps[] | Per-step input hash, output hash, op, success flag, and optional inference run ids. |
inferenceRunIds[] | Run ids surfaced by subagent/tool execution. |
sandbox | Optional Daytona metadata when isolation is active. |
proofCid | Pinata CID when pinning succeeds. |
compose.proof.v1.
Honest Trust Model
| Claim | Status |
|---|---|
| Step inputs and outputs can be hash-checked against the bundle. | Yes. |
| The bundle can point to inference run ids for cross-checking receipts. | Yes. |
| Pinata can store the proof bundle CID. | Yes, when PINATA_JWT is configured. |
| The runtime emits a live EVM signature in this module. | No. signProofBundle() is a placeholder. |
| Daytona proves TEE-grade execution. | No. The sandbox path is isolation, not TEE attestation. |