Evidence Package Manifest

Informative Appendix (non-normative)

This appendix provides an illustrative evidence package manifest for autonomous penetration testing findings and audit artifacts. It is intended to help platform operators, customers, and reviewers connect the Auditability and Reporting requirements into one verifiable handoff artifact. It does not prescribe one mandatory file format.

Purpose

APTS requires platforms to preserve evidence, hash artifacts, maintain provenance, document chain of custody, and support downstream finding integrity. Those requirements are distributed across multiple domains and can be difficult to implement consistently without a concrete example.

This appendix provides:

Design Principles

A useful evidence package manifest should:

1. Finding identity

Use stable identifiers so the manifest can be referenced from reports, tickets, and audit logs.

Recommended fields:

2. Artifact inventory

Each supporting artifact should have a durable identifier and integrity metadata.

Recommended fields:

3. Provenance chain

Capture the lifecycle of the finding across automated and human steps.

Recommended fields:

4. Reproduction and review state

Record how the platform or reviewer validated the claim.

Recommended fields:

5. Redaction and sensitive-data handling

Record what was redacted and why.

Recommended fields:

6. Downstream exports

Track handoff to other systems without severing provenance.

Recommended fields:

Example YAML Manifest

engagement_id: eng-2026-001
finding_id: apt-find-001
finding_title: Example authenticated path traversal
severity: high
confidence: 0.92
scope_reference: roe-2026-001
summary: |
  The finding was confirmed through a bounded authenticated request sequence and
  independently reproduced before report generation.

artifacts:
  - id: ev-001
    type: http_request_response
    path: evidence/ev-001.http
    media_type: text/plain
    sha256: 6b7c9f7de1b0d9d91234567890abcdef1234567890abcdef1234567890abcd
    captured_at: 2026-04-18T12:00:00Z
    captured_by: platform-http-recorder
    sensitivity: confidential
  - id: ev-002
    type: screenshot
    path: evidence/ev-002.png
    media_type: image/png
    sha256: 9df55d9e0f1c2b3a1234567890abcdef1234567890abcdef1234567890abcd
    captured_at: 2026-04-18T12:01:10Z
    captured_by: browser-capture-service
    sensitivity: restricted

provenance:
  - event: discovery
    actor: autonomous-agent
    audit_log_id: log-123
    timestamp: 2026-04-18T12:00:00Z
    result: suspected
  - event: reproduction
    actor: replay-runner
    audit_log_id: log-456
    timestamp: 2026-04-18T12:10:00Z
    result: reproduced
  - event: human_review
    actor: reviewer-01
    audit_log_id: log-789
    timestamp: 2026-04-18T12:30:00Z
    result: approved

reproduction_attempts:
  - timestamp: 2026-04-18T12:10:00Z
    actor: replay-runner
    status: reproduced
    notes: request sequence replay matched original evidence

human_review:
  reviewer: reviewer-01
  reviewed_at: 2026-04-18T12:30:00Z
  decision: approved
  notes: evidence complete and sufficient for customer verification

redaction:
  redaction_status: partially_redacted
  redacted_fields:
    - session_cookie
    - internal_user_email
  handling_notes: customer-approved redaction policy applied before report export

exports:
  - system: ticketing
    external_id: SEC-123
    exported_at: 2026-04-18T13:00:00Z
    export_hash: 727f49aa1234567890abcdef1234567890abcdef1234567890abcdef1234

Example JSON Shape

{
  "engagement_id": "eng-2026-001",
  "finding_id": "apt-find-001",
  "finding_title": "Example authenticated path traversal",
  "severity": "high",
  "confidence": 0.92,
  "artifacts": [
    {
      "id": "ev-001",
      "type": "http_request_response",
      "path": "evidence/ev-001.http",
      "sha256": "6b7c9f7de1b0d9d91234567890abcdef1234567890abcdef1234567890abcd"
    }
  ],
  "provenance": [
    {
      "event": "discovery",
      "audit_log_id": "log-123",
      "timestamp": "2026-04-18T12:00:00Z",
      "result": "suspected"
    }
  ]
}

Field Mapping to APTS Requirements

Manifest area Primary requirements
Artifact paths and hashes APTS-AR-010, APTS-RP-005
Chain of custody and transfers APTS-AR-011, APTS-AR-012
Evidence sensitivity and redaction APTS-AR-015, APTS-RP-001
Finding provenance and verification APTS-RP-001, APTS-RP-002, APTS-RP-004
Machine-readable reporting handoff APTS-RP-011, APTS-RP-015
Export integrity to downstream systems APTS-RP-015, APTS-TP-014

Validation Guidance for Customers and Reviewers

When evaluating a platform's evidence handling, ask:

Implementation Notes

Recommended implementation practices:

Non-goals

This appendix does not:

Use this appendix as an implementation and review aid for evidence integrity and finding reproducibility.