Releases
PatentChecker releases
Public release notes and artifacts (receipt, cosign bundle, SBOM, provenance) mirrored from omniscoder/patentchecker-releases.
v0.1.30Latestv0.1.30 · Feb 1, 2026
v0.1.30
Latestv0.1.30 · Feb 1, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- demo_offline_packet.zip91 KB · 1 downloads
- demo_offline_packet.zip.sha25692 B · 1 downloads
- example_platform_risk_bundle.v1.zip545 KB · 1 downloads
- example_platform_risk_bundle.v1.zip.sha256104 B · 1 downloads
- example_platform_risk_bundle_low_signal.v1.zip449 KB · 1 downloads
- example_platform_risk_bundle_low_signal.v1.zip.sha256115 B · 1 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- release_assets.sha2561.0 KB · 1 downloads
- release_assets.sha256.cosign.bundle.json10 KB · 1 downloads
- release_manifest.v0.1.cosign.bundle.json10 KB · 1 downloads
- release_manifest.v0.1.json2.9 KB · 1 downloads
- runner_receipt.v0.1.json5.4 KB · 1 downloads
- sbom.spdx.json3.0 MB · 1 downloads
v0.1.28v0.1.28 · Jan 31, 2026
v0.1.28
v0.1.28 · Jan 31, 2026
Changes
- Fix container ENTRYPOINT so
docker run ... -wworks reliably. - Risk plot: explicit font stack + deterministic label spacing to prevent overlapping callouts.
Verify before you buy
No license required to verify these two bundles:
example_platform_risk_bundle.v1.zip(escalation)example_platform_risk_bundle_low_signal.v1.zip(baseline)
Escalation bundle
BashPowerShellPython API (coming)
ogn CLITAG=v0.1.28
MIRROR=omniscoder/patentchecker-releases
ASSET=example_platform_risk_bundle.v1.zip
rm -rf bundle_dir "$ASSET" "$ASSET.sha256"
gh release download "$TAG" -R "$MIRROR" -p "$ASSET" -p "$ASSET.sha256"
sha256sum -c "$ASSET.sha256"
unzip -q "$ASSET" -d bundle_dir
cd bundle_dir
RUNS="$(ls -d run/run_* 2>/dev/null | LC_ALL=C sort | paste -sd, -)"
docker pull ghcr.io/omniscoder/patentchecker:"$TAG"
docker run --rm -v "$PWD:/bundle" -w /bundle \
ghcr.io/omniscoder/patentchecker:"$TAG" \
patentchecker risk verify \
--ontology example_platform_risk_ontology.v0.1.json \
--timeline example_platform_risk_timeline.v0.1.json \
--runs "$RUNS" \
--strict --format jsonLow-signal baseline
BashPowerShellPython API (coming)
ogn CLITAG=v0.1.28
MIRROR=omniscoder/patentchecker-releases
ASSET=example_platform_risk_bundle_low_signal.v1.zip
rm -rf bundle_dir "$ASSET" "$ASSET.sha256"
gh release download "$TAG" -R "$MIRROR" -p "$ASSET" -p "$ASSET.sha256"
sha256sum -c "$ASSET.sha256"
unzip -q "$ASSET" -d bundle_dir
cd bundle_dir
RUNS="$(ls -d run/run_* 2>/dev/null | LC_ALL=C sort | paste -sd, -)"
docker pull ghcr.io/omniscoder/patentchecker:"$TAG"
docker run --rm -v "$PWD:/bundle" -w /bundle \
ghcr.io/omniscoder/patentchecker:"$TAG" \
patentchecker risk verify \
--ontology example_platform_low_signal_risk_ontology.v0.1.json \
--timeline example_platform_low_signal_risk_timeline.v0.1.json \
--runs "$RUNS" \
--strict --format jsonTip: open
risk_cumulative.svg first, then run the verifier.Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- demo_offline_packet.zip49 KB · 3 downloads
- demo_offline_packet.zip.sha25692 B · 2 downloads
- example_platform_risk_bundle.v1.zip537 KB · 6 downloads
- example_platform_risk_bundle.v1.zip.sha256104 B · 6 downloads
- example_platform_risk_bundle_low_signal.v1.zip442 KB · 6 downloads
- example_platform_risk_bundle_low_signal.v1.zip.sha256115 B · 6 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- release_assets.sha2561.0 KB · 1 downloads
- release_assets.sha256.cosign.bundle.json9.9 KB · 1 downloads
- release_manifest.v0.1.cosign.bundle.json9.9 KB · 1 downloads
- release_manifest.v0.1.json2.9 KB · 2 downloads
- runner_receipt.v0.1.json5.4 KB · 1 downloads
- sbom.spdx.json3.0 MB · 1 downloads
v0.1.27v0.1.27 · Jan 31, 2026
v0.1.27
v0.1.27 · Jan 31, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).Verify before you buy
PatentChecker is designed so buyers can verify bundles offline without a license.
Risk bundle (escalation)
BashPowerShellPython API (coming)
ogn CLIset -euo pipefail
TAG=v0.1.27
MIRROR_REPO=omniscoder/patentchecker-releases
rm -rf bundle_dir example_platform_risk_bundle.v1.zip example_platform_risk_bundle.v1.zip.sha256
gh release download "$TAG" -R "$MIRROR_REPO" \
-p example_platform_risk_bundle.v1.zip \
-p example_platform_risk_bundle.v1.zip.sha256
sha256sum -c example_platform_risk_bundle.v1.zip.sha256
mkdir -p bundle_dir
unzip -q example_platform_risk_bundle.v1.zip -d bundle_dir
# Verify using the signed runner image (no local install required)
docker pull ghcr.io/omniscoder/patentchecker:"$TAG"
docker run --rm \
-v "$PWD/bundle_dir:/bundle" -w /bundle \
ghcr.io/omniscoder/patentchecker:"$TAG" \
bash VERIFY_BUNDLE.shOpen
risk_cumulative.svg (audit), risk_cumulative.png (share), or risk_cumulative.pdf (print). The provenance footer is embedded.Risk bundle (low-signal baseline)
BashPowerShellPython API (coming)
ogn CLIset -euo pipefail
TAG=v0.1.27
MIRROR_REPO=omniscoder/patentchecker-releases
rm -rf bundle_dir example_platform_risk_bundle_low_signal.v1.zip example_platform_risk_bundle_low_signal.v1.zip.sha256
gh release download "$TAG" -R "$MIRROR_REPO" \
-p example_platform_risk_bundle_low_signal.v1.zip \
-p example_platform_risk_bundle_low_signal.v1.zip.sha256
sha256sum -c example_platform_risk_bundle_low_signal.v1.zip.sha256
mkdir -p bundle_dir
unzip -q example_platform_risk_bundle_low_signal.v1.zip -d bundle_dir
docker pull ghcr.io/omniscoder/patentchecker:"$TAG"
docker run --rm \
-v "$PWD/bundle_dir:/bundle" -w /bundle \
ghcr.io/omniscoder/patentchecker:"$TAG" \
bash VERIFY_BUNDLE.shWhat’s in this release
patentchecker risk compile|verify|plot: deterministic risk timeline compiler + offline verifier + SVG/PNG/PDF charts.- Public, buyer-neutral reference bundles (escalation + low-signal baseline), mirrored to
omniscoder/patentchecker-releases.
Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- demo_offline_packet.zip49 KB · 1 downloads
- demo_offline_packet.zip.sha25692 B · 1 downloads
- example_platform_risk_bundle.v1.zip535 KB · 2 downloads
- example_platform_risk_bundle.v1.zip.sha256104 B · 2 downloads
- example_platform_risk_bundle_low_signal.v1.zip442 KB · 1 downloads
- example_platform_risk_bundle_low_signal.v1.zip.sha256115 B · 1 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- release_assets.sha2561.0 KB · 1 downloads
- release_assets.sha256.cosign.bundle.json10 KB · 1 downloads
- release_manifest.v0.1.cosign.bundle.json9.9 KB · 1 downloads
- release_manifest.v0.1.json2.9 KB · 1 downloads
- runner_receipt.v0.1.json5.4 KB · 1 downloads
- sbom.spdx.json3.0 MB · 1 downloads
v0.1.26v0.1.26 · Jan 30, 2026
v0.1.26
v0.1.26 · Jan 30, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- demo_offline_packet.zip49 KB · 2 downloads
- demo_offline_packet.zip.sha25692 B · 2 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- release_assets.sha256629 B · 2 downloads
- release_assets.sha256.cosign.bundle.json9.9 KB · 1 downloads
- release_manifest.v0.1.cosign.bundle.json9.8 KB · 1 downloads
- release_manifest.v0.1.json2.1 KB · 2 downloads
- runner_receipt.v0.1.json5.0 KB · 2 downloads
- sbom.spdx.json2.9 MB · 1 downloads
v0.1.24v0.1.24 · Jan 29, 2026
v0.1.24
v0.1.24 · Jan 29, 2026
Mirror of private artifacts for v0.1.24.\n\n- legal-events: add sources[].fileset_policy and optional sources[].fileset_hash for snapshot completeness\n- legal-events: fail closed on duplicate evidence bytes across different artifact_path\n- contract/tooling bump to v0.1.24 (schemas/examples/tests updated)
Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- release_assets.sha256442 B · 1 downloads
- release_assets.sha256.cosign.bundle.json9.8 KB · 1 downloads
- release_manifest.v0.1.cosign.bundle.json9.7 KB · 1 downloads
- release_manifest.v0.1.json1.8 KB · 1 downloads
- runner_receipt.v0.1.json3.5 KB · 1 downloads
- sbom.spdx.json2.9 MB · 1 downloads
v0.1.23v0.1.23 · Jan 29, 2026
v0.1.23
v0.1.23 · Jan 29, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).v0.1.23 release notes
Release pipeline proof-point: no hidden artifact uploads
- Disables Docker build summary /
*.dockerbuildbuild record uploads in the release workflow (preventsCreateArtifactwarnings when Actions artifact storage quota is saturated).
No product changes
- No schema or runtime behavior changes; this is release hygiene only.
Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- release_assets.sha256442 B · 1 downloads
- release_assets.sha256.cosign.bundle.json9.7 KB · 1 downloads
- release_manifest.v0.1.cosign.bundle.json9.6 KB · 1 downloads
- release_manifest.v0.1.json1.8 KB · 1 downloads
- runner_receipt.v0.1.json3.4 KB · 2 downloads
- sbom.spdx.json2.9 MB · 1 downloads
v0.1.22v0.1.22 · Jan 29, 2026
v0.1.22
v0.1.22 · Jan 29, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).v0.1.22 release notes
Release pipeline hardening (no product behavior change)
- Release workflow uses GHCR registry-backed build cache (
:buildcache) instead of GitHub Actions storage. - Release workflow prints a deterministic “build inputs” summary (cache refs, configured platforms, runner arch) to simplify incident/debug review.
- CI workflows avoid GitHub Actions cache/artifact storage that can trigger “Failed to CreateArtifact” quota warnings.
Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- release_assets.sha256442 B · 1 downloads
- release_assets.sha256.cosign.bundle.json9.8 KB · 1 downloads
- release_manifest.v0.1.cosign.bundle.json9.8 KB · 1 downloads
- release_manifest.v0.1.json1.8 KB · 1 downloads
- runner_receipt.v0.1.json3.4 KB · 1 downloads
- sbom.spdx.json2.9 MB · 1 downloads
v0.1.21v0.1.21 · Jan 28, 2026
v0.1.21
v0.1.21 · Jan 28, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).v0.1.21 release notes
Legal events (v0.1) — evidence binding is now testable
- Ships tiny sample evidence bytes under
examples/legal-event-set.sample.assets/. - Adds a unit test that recomputes
artifact_sha256from those bytes and asserts:events[].evidence_refs[].artifact_sha256matches the file bytesevents[].event_idcontains the samesha256:…(weak-but-auditable v0.1 binding rule)
Release hygiene
- Disables npm cache in the release workflow to avoid GitHub Actions artifact quota failures.
Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- release_assets.sha256442 B · 1 downloads
- release_assets.sha256.cosign.bundle.json9.7 KB · 1 downloads
- release_manifest.v0.1.cosign.bundle.json9.8 KB · 1 downloads
- release_manifest.v0.1.json1.8 KB · 1 downloads
- runner_receipt.v0.1.json3.4 KB · 1 downloads
- sbom.spdx.json2.9 MB · 1 downloads
v0.1.20v0.1.20 · Jan 28, 2026
v0.1.20
v0.1.20 · Jan 28, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).v0.1.20 release notes
Supply-chain hardening
- Digest-pins the Docker base image (
Dockerfile FROM …@sha256:…). - Release manifest now records the base image ref+digest under
container.base_image.
New schema: legal events (v0.1)
Adds a new offline, deterministic schema + sample for clinical-stage IP risk “legal event” monitoring:
- Schema:
schemas/legal-event-set.v0.1.schema.json - Example:
examples/legal-event-set.sample.v0.1.json
No breaking changes to the existing watchlist / diff engine schemas (
schema_version: 0.1).Assets
- cosign.bundle.json10 KB · 0 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 0 downloads
- provenance.slsa.json1.1 KB · 0 downloads
- release_assets.sha256442 B · 0 downloads
- release_assets.sha256.cosign.bundle.json9.8 KB · 0 downloads
- release_manifest.v0.1.cosign.bundle.json9.9 KB · 0 downloads
- release_manifest.v0.1.json1.8 KB · 0 downloads
- runner_receipt.v0.1.json3.4 KB · 0 downloads
- sbom.spdx.json2.9 MB · 0 downloads
v0.1.19v0.1.19 · Jan 28, 2026
v0.1.19
v0.1.19 · Jan 28, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).v0.1.19 release notes
Release integrity (new)
Policy (effective v0.1.19): release tags are immutable. If a release needs changes, we cut a new tag (no force-moving tags).
Why v0.1.19 exists: the
v0.1.18 tag was repointed once. v0.1.19 is the stable, buyer-safe replacement.Positioning: v0.1.19 is the first audit-grade release.
Canonical identifiers (tag-independent):
- Container image digest (see
runner_receipt.v0.1.json). - Signed release manifest:
release_manifest.v0.1.json+release_manifest.v0.1.cosign.bundle.json. - Signed release checksums:
release_assets.sha256+release_assets.sha256.cosign.bundle.json.
Verification is offline-capable: the bundles include the signing certificate chain.
What changed
- Adds signed, deterministic release integrity artifacts:
release_assets.sha256(sha256 checksums for release assets)release_manifest.v0.1.json(bindstag,git_sha,tool_version,contract_hash,schema_digest, container digest, and per-asset hashes)- Cosign keyless signature bundles for both files.
- No watchlist schema changes (
schema_version: 0.1). Seev0.1.18notes for product behavior changes.
Air-gapped verification after mirroring (enclave)
This section is intentionally split from “download” steps. Once you have copied release assets + mirrored the image digest into your enclave, you can verify using local files.
| Item | Verified offline? | How |
|---|---|---|
release_manifest.v0.1.json | yes | cosign verify-blob --bundle release_manifest.v0.1.cosign.bundle.json … |
release_assets.sha256 | yes | cosign verify-blob --bundle release_assets.sha256.cosign.bundle.json … |
| Release asset bytes | yes | sha256sum -c release_assets.sha256 |
| Image digest is signed | yes | cosign verify-blob-attestation --bundle cosign.bundle.json --digest … |
Minimal enclave steps (assumes assets already copied in, and the image digest is mirrored into an internal registry):
BashPowerShellPython API (coming)
ogn CLIset -euo pipefail
ASSET_DIR=/mnt/patentchecker/v0.1.19
INTERNAL_REGISTRY=registry.internal.example.com/omniscoder/patentchecker
cd "$ASSET_DIR"
export DIGEST="$(jq -r '.runner.image.digest' runner_receipt.v0.1.json)" # sha256:<64>
export IDENTITY="$(jq -r '.signing.identity' runner_receipt.v0.1.json)"
export ISSUER="$(jq -r '.signing.issuer' runner_receipt.v0.1.json)"
# Verify signed release manifest + checksums (file-only)
cosign verify-blob --bundle release_manifest.v0.1.cosign.bundle.json \
--certificate-identity "$IDENTITY" --certificate-oidc-issuer "$ISSUER" \
release_manifest.v0.1.json
cosign verify-blob --bundle release_assets.sha256.cosign.bundle.json \
--certificate-identity "$IDENTITY" --certificate-oidc-issuer "$ISSUER" \
release_assets.sha256
sha256sum -c release_assets.sha256
# Pull the exact image bytes by digest (internal registry)
docker pull "${INTERNAL_REGISTRY}@${DIGEST}"
# Prove “this digest is signed by this identity” offline (file-only signature bundle)
cosign verify-blob-attestation \
--bundle cosign.bundle.json \
--certificate-identity "$IDENTITY" \
--certificate-oidc-issuer "$ISSUER" \
--digest "${DIGEST#sha256:}" \
--digestAlg sha256Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- release_assets.sha256442 B · 1 downloads
- release_assets.sha256.cosign.bundle.json10.0 KB · 1 downloads
- release_manifest.v0.1.cosign.bundle.json9.9 KB · 1 downloads
- release_manifest.v0.1.json1.6 KB · 1 downloads
- runner_receipt.v0.1.json3.2 KB · 1 downloads
- sbom.spdx.json2.9 MB · 1 downloads
v0.1.18v0.1.18 · Jan 28, 2026
v0.1.18
v0.1.18 · Jan 28, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).v0.1.18 release notes
Erratum (release integrity)
The
v0.1.18 tag was repointed once. Do not treat v0.1.18 as an immutable reference; use v0.1.19 instead.What changed
- Verifier summary is now “inescapable”:
verify:runprints a mandatory VERIFICATION SUMMARY including scope policy + a Scope decision (PASS/FAIL), adapter identity, and embedded execution authorization (license receipt) details. - Evidence bundles include a reviewer-friendly guide: every run directory now includes
README_FOR_REVIEWERS.mdexplaining what the bundle proves / does not prove, how to verify, and how to interpret scope warnings (explicitly NOT FTO / clearance). - Scope governance is explicit and testable:
exactpolicy fails closed when the adapter’s observed scope exceeds watchlist requirements.superset_okpolicy records a machine-readablescope_exceededblock and verifier output echoes it.- Run manifest records a
corpus.scope_decisionobject for auditability.
- Module adapter integrity is enforced at runtime (pre-import):
watchlist.engine.adapter.config.module_sha256is required formoduleadapters.--rootcontainment is enforced usingrealpath(symlink escapes fail closed).- Failures are attributable with stable, one-line policy errors.
- Adapter identity is always in the signed manifest (all lanes), removing ambiguity about what was executed.
Notes / compatibility
- Watchlist schema remains
v0.1(schema_version: 0.1). - Module-adapter runs require
module_sha256in the watchlist adapter config; existing module watchlists must add it.
Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz2.6 KB · 1 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- runner_receipt.v0.1.json3.2 KB · 1 downloads
- sbom.spdx.json2.9 MB · 1 downloads
v0.1.17v0.1.17 · Jan 27, 2026
v0.1.17
v0.1.17 · Jan 27, 2026
Mirror notice: These are public release artifacts for
omniscoder/patentchecker (private source repo).v0.1.17 release notes
Workflow (new)
- Edit
watchlist.yamlandsequences.tsv - Compile to schema-validated, canonical
watchlist.v0.1.json:
BashPowerShellPython API (coming)
ogn CLIpatentchecker watchlist compile \
--spec watchlist.yaml \
--sequences sequences.tsv \
--out watchlist.v0.1.json- Run using the emitted
watchlist.v0.1.json(the runner consumes JSON only).
Safety guarantees
- Determinism: compiler output is canonical JSON bytes (stable key sorting + stable array ordering + fixed newline). CI includes a hard gate that compiles twice in fresh temp dirs and asserts byte-identical output.
- Stable UX output:
patentchecker watchlist compileprints a single-line, canonical JSON summary (hash-friendly in CI/logs). - Fail-closed path rebasing:
file/file_fixture/moduleadapter paths are validated, must exist, must not escape--root(including via symlinks), and are rebased relative to the emitted JSON with POSIX/separators.
Backwards compatibility
v0.1.16runner acceptswatchlist.v0.1.jsononly (no compiler).v0.1.17adds the compiler, but the output schema stayswatchlist.v0.1(schema_version: 0.1), so existing JSON watchlists continue to work.
Docs and examples
- Authoring docs:
docs/watchlist-authoring.md - Samples:
examples/watchlist.sample.yaml,examples/sequences.sample.tsv
Assets
- cosign.bundle.json10 KB · 1 downloads
- demo_crispr_ip_drift_inputs.tgz117 KB · 1 downloads
- provenance.slsa.json1.1 KB · 1 downloads
- runner_receipt.v0.1.json3.2 KB · 1 downloads
- sbom.spdx.json2.9 MB · 1 downloads