Informative Appendix (non-normative)
This appendix provides an illustrative evidence package manifest for autonomous penetration testing findings and audit artifacts. It is intended to help platform operators, customers, and reviewers connect the Auditability and Reporting requirements into one verifiable handoff artifact. It does not prescribe one mandatory file format.
APTS requires platforms to preserve evidence, hash artifacts, maintain provenance, document chain of custody, and support downstream finding integrity. Those requirements are distributed across multiple domains and can be difficult to implement consistently without a concrete example.
This appendix provides:
A useful evidence package manifest should:
Use stable identifiers so the manifest can be referenced from reports, tickets, and audit logs.
Recommended fields:
engagement_idfinding_idfinding_titleseverityconfidencescope_referenceEach supporting artifact should have a durable identifier and integrity metadata.
Recommended fields:
idtypepathmedia_typesha256captured_atcaptured_bysensitivityCapture the lifecycle of the finding across automated and human steps.
Recommended fields:
eventtimestampactoraudit_log_idresultnotesRecord how the platform or reviewer validated the claim.
Recommended fields:
reproduction_attemptshuman_reviewreview_decisionreviewed_atRecord what was redacted and why.
Recommended fields:
redaction_statusredacted_fieldshandling_notesTrack handoff to other systems without severing provenance.
Recommended fields:
systemexternal_idexported_atexport_hashengagement_id: eng-2026-001
finding_id: apt-find-001
finding_title: Example authenticated path traversal
severity: high
confidence: 0.92
scope_reference: roe-2026-001
summary: |
The finding was confirmed through a bounded authenticated request sequence and
independently reproduced before report generation.
artifacts:
- id: ev-001
type: http_request_response
path: evidence/ev-001.http
media_type: text/plain
sha256: 6b7c9f7de1b0d9d91234567890abcdef1234567890abcdef1234567890abcd
captured_at: 2026-04-18T12:00:00Z
captured_by: platform-http-recorder
sensitivity: confidential
- id: ev-002
type: screenshot
path: evidence/ev-002.png
media_type: image/png
sha256: 9df55d9e0f1c2b3a1234567890abcdef1234567890abcdef1234567890abcd
captured_at: 2026-04-18T12:01:10Z
captured_by: browser-capture-service
sensitivity: restricted
provenance:
- event: discovery
actor: autonomous-agent
audit_log_id: log-123
timestamp: 2026-04-18T12:00:00Z
result: suspected
- event: reproduction
actor: replay-runner
audit_log_id: log-456
timestamp: 2026-04-18T12:10:00Z
result: reproduced
- event: human_review
actor: reviewer-01
audit_log_id: log-789
timestamp: 2026-04-18T12:30:00Z
result: approved
reproduction_attempts:
- timestamp: 2026-04-18T12:10:00Z
actor: replay-runner
status: reproduced
notes: request sequence replay matched original evidence
human_review:
reviewer: reviewer-01
reviewed_at: 2026-04-18T12:30:00Z
decision: approved
notes: evidence complete and sufficient for customer verification
redaction:
redaction_status: partially_redacted
redacted_fields:
- session_cookie
- internal_user_email
handling_notes: customer-approved redaction policy applied before report export
exports:
- system: ticketing
external_id: SEC-123
exported_at: 2026-04-18T13:00:00Z
export_hash: 727f49aa1234567890abcdef1234567890abcdef1234567890abcdef1234
{
"engagement_id": "eng-2026-001",
"finding_id": "apt-find-001",
"finding_title": "Example authenticated path traversal",
"severity": "high",
"confidence": 0.92,
"artifacts": [
{
"id": "ev-001",
"type": "http_request_response",
"path": "evidence/ev-001.http",
"sha256": "6b7c9f7de1b0d9d91234567890abcdef1234567890abcdef1234567890abcd"
}
],
"provenance": [
{
"event": "discovery",
"audit_log_id": "log-123",
"timestamp": "2026-04-18T12:00:00Z",
"result": "suspected"
}
]
}
| Manifest area | Primary requirements |
|---|---|
| Artifact paths and hashes | APTS-AR-010, APTS-RP-005 |
| Chain of custody and transfers | APTS-AR-011, APTS-AR-012 |
| Evidence sensitivity and redaction | APTS-AR-015, APTS-RP-001 |
| Finding provenance and verification | APTS-RP-001, APTS-RP-002, APTS-RP-004 |
| Machine-readable reporting handoff | APTS-RP-011, APTS-RP-015 |
| Export integrity to downstream systems | APTS-RP-015, APTS-TP-014 |
When evaluating a platform's evidence handling, ask:
Recommended implementation practices:
This appendix does not:
Use this appendix as an implementation and review aid for evidence integrity and finding reproducibility.