Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Verification Inventory

This page is the authoritative inventory for verification counts. Only counts that are stable enough to check automatically are tracked here.

The goal is to track coverage of key system properties and regression gates, not raw unit-test volume.

When one of these values changes legitimately:

  1. update the underlying source of truth,
  2. refresh this page,
  3. rerun just check-verification-inventory.

The numeric rows in this section are source-derived and checked by toolkit/xtask/src/checks/verification_inventory.rs.

MetricValueSource
Lean core-library files701lean/CODE_MAP.md total row
Lean core-library lines141,990lean/CODE_MAP.md total row
Lean-backed search fairness inventory entries56lean/Runtime/Proofs/Search/Inventory.lean
Ownership contract gate commands6just check-ownership-contracts
Aura-derived boundary checks9just check-aura-borrowed-lints
Explicit failure/timeout observable event kinds5rust/machine/src/engine/protocol_machine_config.rs (ObsEvent)
Macro UI pass fixtures11rust/macros/tests/macro_ui.rs
Macro UI compile-fail fixtures13rust/macros/tests/macro_ui.rs
Property buckets with executable assurance suites22Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Property buckets currently lacking executable assurance suites0Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Authority and ownership semantic assurance suites2Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Lean-backed correspondence strict suites8Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Identity and replay semantic assurance suites5Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Commitment and progress semantic assurance suites4Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Cross-mode semantic parity suites4Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Fail-closed lowering and admission gate suites5Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Structural locality and reconfiguration executable assurance suites5Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Semantic lifecycle invariant suites1Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Deterministic adversarial lifecycle scenarios10Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
End-to-end DSL runtime semantic conformance suites1Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Simulator semantic contract categories enforced automatically6Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Theorem-pack and admission executable assurance suites4Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Distributed and topology semantic harness suites3Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Agreement and composition runtime semantic suites4Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Extension and middleware semantic hardening suites2Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Generated topology and transport public-path suites1Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Runtime substrate boundary assurance suites2Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Handler contract boundary assurance suites2Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Long-horizon recovery differential harness suites1Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Artifact and release assurance suites4Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Mutation fail-closed assurance suites2Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Concrete protocol-machine refinement suites3Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Compiler and serialization pipeline suites5Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Deadlock automation fragment assurance suites3Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Docs-as-contract assurance suites3Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Deterministic scale and budget assurance suites1Curated property-suite map in toolkit/xtask/src/checks/verification_inventory.rs
Explicit unsupported or fail-closed property notes0Curated unsupported-surface note list in toolkit/xtask/src/checks/verification_inventory.rs

Current Formal Verification Claim

Telltale is formally verified for the declared shipped surface documented in this inventory, under the assumptions listed in the public TCB ledger below.

The exact public claim is:

Telltale is formally verified for its declared shipped surface: the Lean session-type, projection, protocol-machine, and conservation-property models and theorems, the theorem-defined Rust↔Lean protocol-machine runtime correspondence core for the audited supported corpus, the shipped first-party handler/transport boundary as documented by machine-checkable contract profiles, and the shipped first-party crate artifacts through the audited artifact-correspondence pipeline.

This does not mean every Rust API, compiler helper, macro path, plugin, or third-party integration is mechanically proved. Anything outside the declared shipped surface is listed explicitly below and is not part of the formal claim.

The runtime heap now has a focused Lean parity lane for canonical bytes, tagged preimages, ordering, proof-path structure, and deterministic replay. Its digest algorithm remains an operational conformance surface checked through published vectors and runtime tests rather than a first-class Lean hash model.

The simulator assurance story now includes explicit exact-backend parity, canonical replay reproduction, exact checkpoint resume, durable WAL fault injection and crash/recovery matrices, batch-order reproducibility, fail-closed theorem-classification matrices, approximation admissibility gates, nested distributed invariance, and helper-surface non-authoritativeness checks. These remain executable assurance lanes rather than part of the current mechanized formal claim.

The search crate now has a scoped Lean fairness lane as well. The current proved search fairness surface is:

  • canonical serial search is exact one-step fair for the current legal min-key batch
  • canonical serial search now has an executable reduced machine semantics plus an explicit reduced Rust-facing state/artifact projection boundary
  • canonical serial search now also has an executable full-machine semantics, an exported full-state artifact projection, and premise-scoped full-step refinement contracts back into the reduced executable lane
  • canonical serial search now also has a reduced machine-level invariant and projection layer, including executable machine-step invariant preservation, executable trace refinement into the packaged machine theorem surface, and a machine-trace restatement of current min-key eventual service
  • canonical serial search also has a dynamic liveness theorem under an explicit stability premise: if an entry remains continuously eligible and no strictly better entry appears, it is eventually serviced
  • canonical serial search has a fixed-phase termination theorem under an explicit finite reachable-node premise bundle
  • canonical serial search also has a rebuild-aware ARA-style termination theorem under an explicit lexicographic phase/work measure premise bundle
  • canonical serial search has both bounded strict-preemption and finite better-entry exhaustion theorems for entries that are not initially in the current min-key batch
  • canonical serial search now also has a scheduler-facing non-min service theorem whose public statement no longer exposes bounded-better-arrival or finite-better-universe terminology
  • canonical serial search has both frontier-level and machine-level witness-path goal-reachability theorems for the reduced model
  • canonical serial search now also has a graph-reachability-driven completeness theorem under explicit reachable-path, finiteness, and heuristic premises
  • canonical serial search now also has a raw-successor-semantics completeness theorem whose public statement quantifies over the domain successor contract instead of a user-supplied ready-path witness
  • canonical serial search also has an explicit machine-level bridge from goal reachability to incumbent publication under a publication premise bundle
  • canonical serial search now also has an eventual optimal-goal publication theorem under explicit admissibility and consistency premises
  • threaded exact single-lane search has the same exact one-step fairness through reduced one-step, commit-trace, state-slice, and observation-slice refinement theorems to canonical serial search
  • batched exact search has a certified-window fairness theorem with explicit premises plus a bounded dynamic starvation-freedom theorem under an explicit bounded-preemption premise, and its theorem-pack/export surface now also carries explicit support-class metadata alongside the certified multi-step window-trace validity theorem
  • envelope-bounded batched search now also has a certified-window theorem surface, theorem-backed normalized-commit observables, and a runtime certificate/export path aligned with the theorem pack

These search fairness claims are exposed operationally through the SearchFairnessArtifact and SearchFairnessCertificate runtime surfaces and checked by the dedicated just check-search-fairness gate, the Rust↔Lean search parity suite, and the verification-inventory gate. The current theorem pack is a first-class Lean artifact under Runtime.Proofs.Search.TheoremPack, with a mirrored Rust SearchTheoremPackArtifact for release-facing inventory export, now including per-theorem support classes that distinguish executable-semantics theorems, refinement corollaries, and premise-scoped theorems. Exact runtime runs now also export SearchStateArtifact plus per-round state/certificate traces. They also export SearchRouteBoundArtifact, whose current discovery surface is an observed run-scoped bound to first candidate publication, an observed recovery bound after the latest epoch transition, and a theorem-backed one-step goal-window service bound from the fairness certificate surface, now packaged as a structured SearchRouteDiscoveryCertificate and attached to the exact observed goal-window and publication steps for that run. The selected-route summary also carries a stable generic metric list alongside its scalar convenience fields. Its current quality surface remains profile-scoped rather than a separate Lean end-to-end discovery theorem. The release/provenance lane records the generated target/search-theorem-pack/search-theorem-pack.json artifact plus the generated canonical vector artifact target/search-artifacts/search-vectors-v1.json and the generated recovery vector artifact target/search-artifacts/search-recovery-vectors-v1.json. These claims are also backed by source-controlled search artifact vectors checked by the search_vectors and search_recovery_vectors conformance tests. They are still narrower than a blanket proof of fairness and completeness for all future frontier growth, all rebuild schedules, and all parallel modes without premises.

Claimed Surface

The current proved or proof-backed claimed surface is:

  • the Lean SessionTypes, SessionCoTypes, Choreography, Protocol, and Runtime models and theorem libraries
  • the strict Rust↔Lean correspondence corpora and comparison contracts tracked in the Lean correspondence rows below
  • the first-class protocol-critical capability/finalization/transition model carried by the Lean capability-model surface and its strict Rust↔Lean bridge correspondence suite
  • the packaged first-party crates and binaries only at the level of operationally checked artifact/release assurance, not full mechanized proof

Compiler and Macro Claim Boundary

The current public formal-verification claim does not include any Rust parser, lowering, projection, import/export, or macro-expansion entry path. More concretely: the current public formal-verification claim does not include any Rust parser, lowering, projection, import/export, or macro-expansion entry path.

For the current claim:

  • parse_choreography_str, parse_choreography_file, choreography_to_global, local_to_local_r, Rust-side projection/codegen/import-export helpers, and tell! macro expansion are outside the formal claim
  • because those entry paths are outside the current formal claim, no compiler-facing theorem-object JSON/import-export path remains on the current claim-critical path
  • those Rust compiler and macro paths are still covered by strict operational gates, especially the compiler-pipeline, projection-equivalence, exact-shape JSON, Lean-validator, and macro-UI suites
  • the exact DSL fragment that would need mechanized compiler proof before the public claim can broaden is the theory-convertible subset already tracked in the property table below: straight-line send/recv, communicated choice, call, counted loop, and guarded recursion
  • par, case/of, timeout, and any other fail-closed or runtime-only forms are outside both the current formal claim and that future proof-target subset

Artifact Correspondence Claim

For the current public claim, the shipped first-party crate artifacts are covered only by operational artifact correspondence, not by mechanized proof.

More concretely, the current release/artifact claim is:

  • every publishable first-party crate tarball for the released version is built from the checked workspace manifests for that version
  • the packaged tarballs compiled by the artifact lane are the same tarballs whose hashes, sizes, git revision, toolchain versions, and critical embedded resource hashes are recorded in the provenance manifest under target/package-artifact-tarballs/provenance.json
  • critical embedded resources on the shipped path, including packaged README files, the embedded runtime grammar, and release metadata like the WASM example lockfile, are part of the audited artifact pipeline rather than an unchecked side channel

This is still narrower than a fully reproduced, mechanically proved binary build pipeline. Cargo, crates.io, git hosting, and the local build toolchain remain explicit external assumptions.

Out of Scope / Assumption Boundaries

First-class protocol-critical capability semantics are in scope. General host application authorization is out of scope.

The current public claim does not include:

  • Rust parser/lowering/projection/import-export and tell! macro expansion
  • user-supplied handlers, transports, plugins, or deployment adapters
  • third-party infrastructure or deployment environments
  • Cargo, crates.io, git hosting, OS, compiler, and toolchain correctness beyond the documented operational checks
  • cryptographic hardness assumptions beyond standard SHA-256-style assumptions
  • a blanket claim that every shipped Rust code path is mechanically proved
  • general host application authorization or arbitrary app-policy capability systems unrelated to protocol-critical semantics

Final Surface Audit

This table is the final public audit of which major surfaces are inside the formal claim and which are deliberately outside it.

SurfaceClaim statusNote
Lean SessionTypes, SessionCoTypes, Choreography, Protocol, and Runtime semantics/theoremsinsideCore mechanized proof surface
Theorem-defined protocol-machine runtime core (ConcreteScheduledStep, claimed state/transition/event slice)insideExact Rust↔Lean refinement/correspondence surface
First-party documented handlers (InMemoryHandler, TelltaleHandler, middleware profiles)insideIncluded through machine-checkable contract profiles
First-party documented transports (InMemoryChannelTransport, runtime topology TCP helper, telltale-transport TCP transport)insideIncluded through machine-checkable contract profiles
First-party packaged crate tarballs and embedded resourcesinsideIncluded through the operational artifact-correspondence and provenance pipeline
Rust parser, lowering, projection, import/export helpersoutsidePublicly supported but outside the formal claim and guarded operationally
tell! and other proc-macro convenience surfacesoutsidePublicly supported but outside the formal claim and guarded operationally
User-supplied third-party handlers, transports, plugins, and deployment adaptersoutsideRemain assumption-boundary integrations unless separately justified
External build/delivery infrastructure (cargo, crates.io, git hosting, toolchains, OS)assumption boundaryExplicit public TCB items rather than proved surfaces

Public TCB Ledger

The current trusted computing base for the public claim is:

ComponentWhy it remains trustedCurrent enforcement
Lean kernel and imported proof librariestheorem checker and proof environmentLean build + code map + proof targets
Lean model definitionstheorems are only as correct as the modeled semanticsLean proof suites and docs inventory
Classical real-analysis APIexternal analytic laws used by transported classical familiesClassicalAnalysisAPI.lean, ClassicalAnalysisInstance.lean, and scripts/lean/check-classical-proof-audit.sh
Rust/Lean bridge normalization and interchangecomparison/equality surface between Rust and Leanjust check-bridge-normalization, strict correspondence suites
Rust runtime implementationshipped executable semantics are still comparison-checked, not fully provedstrict correspondence, semantic assurance, refinement slice
First-party handlers/transportsexternal impurity boundary for the runtimehandler-contract, transport-contract, and runtime-boundary suites
Release/package scripts and generated resourcesartifact identity path from workspace to published cratespackage-artifact, package-provenance, release-recovery, and docs-as-contract gates
Cargo / crates.io / git / toolchainsexternal delivery/build platformoperational checks only

If that TCB shrinks or the claim broadens, this section must be updated before a broader public wording is used.

Final Public Claim Text

Use this exact wording in docs, release material, and summaries:

Telltale is formally verified for the declared shipped surface documented in the verification inventory, under the listed public assumptions and TCB.

Supporting scope statement:

The declared shipped surface includes the Lean semantics/theorems, the theorem-defined Rust↔Lean protocol-machine runtime correspondence core, the shipped first-party handler/transport contract boundary, and the shipped first-party crate artifacts through the audited artifact-correspondence pipeline. It does not include Rust compiler/macro entry paths or third-party integrations unless stated otherwise.

Supporting TCB statement:

The remaining public TCB consists of the Lean kernel and imported proof libraries, the minimized Rust/Lean bridge/interchange layer, the comparison- checked Rust runtime implementation for the claim-critical surface, the documented first-party handler/transport boundary, the audited release/package and generated-resource pipeline, and external build/delivery infrastructure such as Cargo, crates.io, git hosting, and the underlying toolchains.

Refinement Coverage Map

This map names the current protocol-machine state surfaces that matter to the claimed runtime story and shows whether they are already inside the exact Rust↔Lean refinement slice.

Runtime state componentRust surfaceLean surfaceCurrent refinement statusNote
Coroutine identity, program counter, status, owned-endpoint count, progress-token countrust/machine/src/refinement.rs (CoroutineRefinementSlice)lean/Runtime/Proofs/ProtocolMachine/ConcreteRefinement.lean (ConcreteCoroutineSlice)exact sliceCompared exactly across cooperative, Lean, and threaded executions today
Session id, role count, local-type entry count, buffer-edge count, buffered-message count, status tag, epochrust/machine/src/refinement.rs (SessionRefinementSlice)lean/Runtime/Proofs/ProtocolMachine/ConcreteRefinement.lean (ConcreteSessionSlice)exact sliceThe theorem-side session slice now carries the same session-status and buffer-edge surface used by the Rust runtime slice
Scheduler ready queue, blocked-set tags, step countrust/machine/src/refinement.rs (SchedulerRefinementSlice)lean/Runtime/Proofs/ProtocolMachine/ConcreteRefinement.lean (ConcreteSchedulerSlice)exact sliceThe canonical scheduler slice is compared exactly today
Per-step event stream, theorem-defined pre_state/post_state, selected coroutine/type state, session_type_counts, ready_queue, and blocked snapshotsrust/bridge/src/protocol_machine_runner.rs (ProtocolMachineStepState), rust/machine/src/refinement.rs (TransitionRefinementSummary, ClaimedRuntimeCoreBundle)lean/Runtime/Proofs/ProtocolMachine/ConcreteRefinement.lean, lean/Runtime/Tests/ProtocolMachineRunner.lean step-state JSON exporttheorem-defined claimed transition surface with exact strict correspondence to RustThe claim-critical transition object is now defined on the Lean side as a scheduled-step projection carrying pre/post slices, transition summary, and step event projection. Rust is compared against that exact surface, while compiler-layout-specific program counters remain exported for audit/debugging rather than as a separate semantic claim
Effect exchanges and output-condition tracerust/bridge/src/protocol_machine_runner.rs (effect_exchanges, output_condition_trace)Lean runner JSON export and strict bridge suitesoutside the current claim-critical refinement coreCompared in strict lanes, but the current mechanized runtime-refinement claim is intentionally scoped to the theorem-defined protocol-machine state/transition/event surface above
Semantic-object families (handoffs, progress contracts, publications, agreement state, transformation obligations)rust/machine/src/engine/runtime_exec/introspection.rs, rust/machine/src/threaded/runtime_introspection.rslean/Runtime/Proofs/ProtocolMachine/SemanticObjects/*theorem-backed separately, outside the current claim-critical refinement coreConservation theorems and strict comparison exist, but they are tracked as separate theorem families rather than folded into the concrete protocol-machine refinement core

Gate Ownership

The verification surface is organized around three canonical just-entry lanes. just ci-dry-run, check.yml, and verify.yml should call these names rather than duplicating their inner gate lists by hand.

GateCanonical entry pointPrimary owning filesLocal run surfaceGitHub run surface
Fast structural verificationjust check-fast-structurejustfile, check-formal-claim-scope, check-ci-assurance-lanes, toolkit/xtask/src/checks/verification_inventory.rs, toolkit/xtask/src/checks/bridge_normalization_ledger.rs, toolkit/xtask/src/checks/fail_closed_mutations.rs, check-source-doc-snippets, toolkit/xtask/src/checks/tooling_convergence.rs, Lean bootstrap scriptsjust check-pr-critical, just ci-dry-run, direct local recipe usecheck.yml, verify.yml
Focused assurancejust check-focused-assurancejustfile, strict Lean bridge suites, compiler pipeline suites, metatheory/refinement/runtime boundary suitesjust check-pr-critical, just ci-dry-run, direct local recipe usecheck.yml, verify.yml
Packaged artifact assurancejust check-package-artifactsjustfile, toolkit/xtask/src/checks/package_artifacts.rs, toolkit/xtask/src/checks/package_provenance.rs, toolkit/xtask/src/checks/durable_boundaries (via _toolkit-check), toolkit/xtask/src/checks/release_recovery.rsjust check-pr-critical, just ci-dry-run, direct local recipe usecheck.yml, verify.yml
PR-critical assurancejust check-pr-criticaljustfile, .github/workflows/check.yml, .github/workflows/verify.ymljust ci-dry-run, direct local recipe usecheck.yml, verify.yml
Scheduled deep assurancejust check-deep-assurancejustfile, .github/workflows/verify.yml, scale-budget and larger-corpus verification lanesjust ci-dry-run full, direct local recipe useverify.yml

For staged diffs restricted to the simulator subsystem, the narrower local gate is now just check-simulator-subsystem-staged. That path is intentionally local-only and does not replace the canonical repo-wide lanes above. It exists so simulator-only staged work still gets formatting, compile, test, and simulator-doc link enforcement without being blocked by unrelated pre-existing breakage elsewhere in the workspace.

The dedicated local search-fairness gate is just check-search-fairness. That gate is intentionally narrower than the canonical repo-wide lanes above and exists to keep the Lean theorem-pack, parity fixture, and inventory rows aligned while working inside telltale-search.

Property Coverage Baseline

This baseline records whether each conserved-property bucket has at least one high-signal executable assurance suite today. It is intentionally curated. The aim is to make gaps explicit rather than to produce vanity totals.

Property bucketExecutable statusHigh-signal suitesCurrent note
EvidenceSpot checksrust/machine/tests/ownership_contracts.rs, rust/machine/tests/conformance_lean.rsEvidence-bearing paths are exercised directly in runtime and Lean-backed spot checks. The current theorem-focused authority slice starts from authoritative reads plus canonical publication/materialization and the explicit finalization/canonical-handle subsystem rather than the whole authority lifecycle family
AuthorityCross-path checksrust/machine/tests/ownership_contracts.rs, rust/simulator/tests/ownership_faults.rsThe supported authority theorem slice is now explicit: evidence-bearing reads, transfer receipts, semantic handoff, and canonical publication/materialization are justified at the semantic-object and lifecycle layer, while broader host-policy lifecycle surfaces still rely on the wider protocol-machine conservation theorems
Lean correspondenceStrict executable validation checksrust/bridge/tests/lean_trace_validation.rs, rust/bridge/tests/property_tests.rs, rust/bridge/tests/protocol_bundle_admission_contracts.rs, rust/bridge/tests/protocol_machine_correspondence_tests.rs, rust/bridge/tests/protocol_machine_differential_steps.rs, rust/bridge/tests/capability_model_correspondence.rs, rust/bridge/tests/heap_lean_parity.rs, rust/simulator/tests/lean_reference_parity.rsvalidateTrace, validateSimulationTrace, runSimulation, verifyProtocolBundle, deterministic reconfiguration-transition validation, epoch-aware multi-step reconfiguration phase validation, explicit capability/finalization/transition-model correspondence, exact normalized simulator-trace parity, heap canonical-byte and replay parity, full protocol-machine event-stream parity, session-status parity, and step-indexed scheduler-state parity now execute in strict deterministic lanes for the supported corpus
IdentityCross-path checksrust/machine/tests/serialization_replay.rs, rust/machine/tests/replay_persistence_identity.rs, rust/bridge/tests/semantic_object_roundtrip.rs, rust/bridge/tests/protocol_machine_cross_target_tests.rs, rust/bridge/tests/reconfiguration_recovery_harness.rsReplay, snapshot/restore, canonical fragment roundtrip, semantic-object identity, ownership-transfer replay artifacts, and bridge-exported reconfiguration snapshot identity are now checked as one differential family across multiple surfaces
CommitmentSpot + path checksrust/machine/tests/unit/protocol_machine/tests_semantic_state.rs, rust/machine/tests/conformance_lean.rs, rust/machine/tests/threaded_equivalence.rs, rust/machine/src/runtime_contracts.rsProgress and terminalization are covered across runtime contracts, lifecycle harnesses, and cross-driver parity
CommitmentDeterministic lifecycle harnessrust/machine/src/engine/runtime_exec/semantic_state.rsSeeded lifecycle and adversarial corpus now exercise terminalization, invalidation, proof-gaps, and progress escalation as one semantic state machine
StructureDeterministic runtime structure suiterust/machine/src/engine/runtime_exec/semantic_state.rs, rust/machine/tests/ownership_contracts.rs, rust/machine/src/composition.rs, rust/bridge/tests/protocol_bundle_admission_contracts.rs, rust/runtime/tests/generated_topology_public_path.rsStructural handoff locality, transformation obligations, pre-transfer witness invalidation, generated topology validation, executable region inheritance/conflict checks, bridge-to-runtime reconfiguration admission, atomic multi-step plan execution, canonical placement/transport-boundary phase artifacts, deterministic reconfiguration history, snapshot/restore state, and Lean-validated transition artifacts are now exercised on executable runtime paths
PremiseFail-closed + admission checksrust/machine/src/runtime_contracts.rs, rust/machine/src/composition.rs, rust/language/src/compiler/parser/mod.rs, rust/runtime/tests/authority_compile_fail.rs, rust/runtime/tests/authority_control_flow_corpus.rsAssumption-heavy paths are rejected or gated, and the authority/control-flow boundary is now exercised with deterministic accepted/rejected .tell and tell! fixtures
PremiseEnd-to-end supported/fail-closed loweringrust/tests/dsl_runtime_semantics_tests.rsThe theory-backed supported subset is explicit and executable: choice, call, counted loop, and recursion remain parser -> projection -> theory-conversion -> protocol-machine clean. par, case/of, and timeout stay outside that theory-convertible subset and are covered through the executable/runtime and boundary suites above
AdmissionTheorem-pack and bundle assurancerust/bridge/tests/protocol_bundle_admission_contracts.rs, rust/bridge/tests/invariant_verification.rs, rust/machine/src/runtime_contracts.rs, rust/tests/dsl_runtime_semantics_tests.rsProof-bundle declarations, capability drops, admission-gated runtime requests, and the explicit transported-theorem boundary ledger are now exercised end to end with stable diagnostics. Runtime-critical instantiated premises are separated from Lean-only assumption boundaries and black-box/background theorem inventory
Distributed topologyDeterministic harnessrust/simulator/tests/distributed.rs, rust/machine/tests/topology_effect_ingress.rs, rust/runtime/tests/generated_topology_public_path.rsDistributed replay, ordered topology ingress, generated helpers, and invalid placement rejection now run through executable runtime paths without ambient network dependency
Simulator replay and classification assuranceDeterministic executable regression netrust/simulator/tests/correctness_regression.rs, rust/simulator/tests/threaded_backend.rs, rust/simulator/tests/classification_assurance.rs, rust/simulator/tests/environment_models.rs, rust/simulator/tests/distributed.rs, rust/simulator/tests/durable_assurance.rsCanonical exact, threaded exact, canonical replay, exact checkpoint resume, durable WAL fault injection, crash/recovery coverage matrices, write-ahead and evidence-consistency monitors, fail-closed theorem eligibility, approximation admissibility, normalized observability boundaries, observed-only distributed manifests, and non-authoritative helper surfaces are now checked together as one simulator-facing assurance family
AgreementRuntime commitment semanticsrust/machine/src/effect/core_types.rs, rust/machine/src/semantic_objects.rs, rust/machine/tests/threaded_equivalence.rs, rust/tests/dsl_runtime_semantics_tests.rsAgreement profiles and child-effect rollups are checked as runtime semantics across scenario tables, lowering, and cross-driver parity
Extension boundaryDeterministic parse-to-runtime dispatch + middleware stacksrust/runtime/tests/extension_integration.rs, rust/runtime/tests/middleware_semantic_hardening.rsRegistered statement rules now parse into Protocol::Extension, lower into runtime extension effects, execute through deterministic extensible handlers, fail with stable diagnostics when handlers are missing or payloads are malformed, and remain middleware-safe under retry, metrics, trace, and seeded fault injection
Generated deployment pathPublic helper end-to-end executionrust/runtime/tests/generated_topology_public_path.rshandler(...), with_topology(...), and named inline topology helpers are exercised as public surfaces with real loopback remote transport, negative validation coverage, executable region semantics, preservation of inline role-family constraints, and a transport-agnostic runtime topology API
Runtime substrateTarget-aware wrapper contractsrust/runtime/tests/runtime_substrate_contracts.rs, rust/runtime/tests/wasm_compat.rsNative and WASM wrapper seams now have direct regression coverage for spawn, spawn_local, and deterministic clock/RNG discipline, and deterministic assurance suites are guarded against accidental SystemClock / SystemRng drift
Handler contract boundaryMachine-checkable contract profiles for first-party handlers and transports, plus fail-closed extension dispatchrust/runtime/tests/handler_contracts.rs, rust/runtime/tests/transport_contracts.rsChoreoHandler and the first-party transport families now have explicit machine-checkable contract ledgers that separate protocol-semantic obligations from policy choices, validate shipped production and harness profiles mechanically, and prove deterministic registered-only extension dispatch plus fail-closed unregistered behavior through runtime tests. User-supplied third-party handlers/transports remain outside the formal claim unless they separately satisfy the same contract
RecoveryLong-horizon differential harnessrust/bridge/tests/reconfiguration_recovery_harness.rsOwnership-transfer replay artifacts, bridge export/import, topology-derived placement artifacts, atomic multi-step reconfiguration plans, snapshot/restore recovery, and deterministic suffix replay now execute as one end-to-end recovery family with explicit divergence detection
Artifact / releasePackaged-crate, provenance, and resume verificationtoolkit/xtask/src/checks/package_artifacts.rs, toolkit/xtask/src/checks/package_provenance.rs, toolkit/xtask/src/checks/durable_boundaries (via _toolkit-check), toolkit/xtask/src/checks/release_recovery.rsEvery publishable crate now goes through the cargo publish --dry-run --locked --no-verify packaging path, package-manifest resource paths are checked before packaging, the full packaged crate set is compiled from extracted tarballs, critical embedded resources are compared byte-for-byte against source, external consumer canaries for telltale, telltale-runtime, and telltale-bridge run outside the workspace layout with exact last-line stdout assertions, a provenance manifest records tarball hashes plus source/resource/toolchain metadata for the packaged set, package-root resource escapes are fail-closed, the packaged WASM and embedded-grammar surfaces are verified explicitly, and release resume behavior is exercised under a deterministic fake cargo/git harness
Mutation pressureDirect fail-closed perturbation suitesrust/machine/src/runtime_contracts.rs, toolkit/xtask/src/checks/fail_closed_mutations.rsRepresentative bridge payload, theorem-boundary, source-derived docs-row, package-registry, package-manifest, package-resource, and inventory mutations are injected directly against the narrow owning gates so drift is rejected before broader integration lanes run
Concrete refinementExact cooperative/Lean/threaded state-slice parity plus Lean proof-connected slicerust/bridge/tests/protocol_machine_differential_steps.rs, rust/machine/tests/lean_protocol_machine_equivalence.rs, rust/machine/tests/threaded_equivalence.rsThe first concrete protocol-machine refinement slice now compares coroutine/session/scheduler state exactly across Rust, Lean, and canonical threaded execution, exports bounded u64 bridge fields fail-closed, and is connected to dedicated Lean refinement theorems over the same slice
Compiler / serialization pipelineStrict DSL-to-theory lowering, exact-shape JSON bridge, and Lean-backed projection acceptancerust/bridge/tests/compiler_pipeline_conformance.rs, rust/bridge/tests/projection_equivalence.rs, rust/bridge/tests/proptest_json_roundtrip.rs, rust/bridge/tests/lean_integration_tests.rs, rust/bridge/tests/merge_semantics_tests.rsThis pipeline is operationally checked, not part of the current formal claim: the supported DSL subset runs through parser -> protocol_to_global() / local_to_local_r() -> exact-shape import/export -> Lean projection export and validator acceptance in deterministic strict lanes, and bridge import rejects unknown fields fail-closed so schema drift cannot hide behind permissive parsing
Deadlock automationLean-sound regular-fragment checker mirrored into Rust diagnosticsrust/types/src/local.rs, rust/bridge/tests/regular_practical_fragment_checks.rs, rust/tests/dsl_runtime_semantics_tests.rsThe automatic deadlock-discharge fragment is now mechanically characterized as closed + contractive projected locals whose full unfold exposes send/recv, checked first in Lean on SessionTypes.LocalTypeR, mirrored in Rust only for macro/proof-status diagnostics, and exercised end to end through bridge parity and generated proof_status surfaces
Public docs as contractSource-derived capability/admission, authority-support, and trust-surface tablesrust/bridge/tests/docs_contract_tests.rs, toolkit/xtask/src/checks/verification_inventory.rs, toolkit/xtask/src/checks/bridge_normalization_ledger.rsThe highest-value public verification/capability docs now separate source-derived tables from explanatory prose, and those rows are checked mechanically against runtime-contract, DSL-tier, and bridge-ledger facts
Deterministic scale budgetsLarger supported corpora with structural size envelopesrust/bridge/tests/scale_budget_contracts.rsLarger lowering/projection corpora, longer record/replay histories, larger reconfiguration snapshots, and larger Lean bridge payloads now run as deterministic structural-budget gates with exact replay/snapshot equality and explicit serialized-size envelopes rather than ambient wall-clock benchmarks

Bridge Normalization Trust Surface

The Lean bridge still contains a small amount of trusted normalization logic. That logic is intentionally narrow and is audited explicitly in CI by just check-bridge-normalization. The rows in this table are source-derived and checked by telltale_bridge::bridge_normalization_ledger() via toolkit/xtask/src/checks/bridge_normalization_ledger.rs.

SurfaceNormalization ruleClassificationWhy permitted
semantic-audit tick normalizationNormalize only tick, and only per extracted session idirreducible trusted comparison logicAbsolute cross-session scheduling order is not semantic protocol truth. Per-session observable order is.

Enforcing artifacts:

  • rust/bridge/src/protocol_machine_trace.rs
  • rust/bridge/tests/protocol_machine_correspondence_tests.rs
  • rust/bridge/tests/protocol_machine_differential_steps.rs Session-status ordering is no longer part of the trusted comparison surface. Both the Lean runner and Rust-side correspondence harness now emit session rows in canonical sid order, so comparison is exact rather than normalized.

The older schema_version backfill helper remains only as a test-only compatibility shim for legacy fixture coverage. It is outside the claim-critical bridge surface and must not synthesize semantic content.

Explicit Unsupported / Fail-Closed Notes

No explicit unsupported or fail-closed implementation-gap notes remain in the tracked inventory. New notes should be added here only for intentional, documented non-goals or for temporary regressions that are not yet executable.

The inventory deliberately does not track raw unit-test totals, assertion counts, or line counts for tests.