Skip to content
Releases

PatentChecker releases

Public release notes and artifacts (receipt, cosign bundle, SBOM, provenance) mirrored from omniscoder/patentchecker-releases.

v0.1.30
Latest
v0.1.30 · Feb 1, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).
Assets
v0.1.28
v0.1.28 · Jan 31, 2026

Changes

  • Fix container ENTRYPOINT so docker run ... -w works reliably.
  • Risk plot: explicit font stack + deterministic label spacing to prevent overlapping callouts.

Verify before you buy

No license required to verify these two bundles:
  • example_platform_risk_bundle.v1.zip (escalation)
  • example_platform_risk_bundle_low_signal.v1.zip (baseline)

Escalation bundle

BashPowerShellPython API (coming)
ogn CLI
TAG=v0.1.28
MIRROR=omniscoder/patentchecker-releases
ASSET=example_platform_risk_bundle.v1.zip

rm -rf bundle_dir "$ASSET" "$ASSET.sha256"
gh release download "$TAG" -R "$MIRROR" -p "$ASSET" -p "$ASSET.sha256"
sha256sum -c "$ASSET.sha256"

unzip -q "$ASSET" -d bundle_dir
cd bundle_dir

RUNS="$(ls -d run/run_* 2>/dev/null | LC_ALL=C sort | paste -sd, -)"
docker pull ghcr.io/omniscoder/patentchecker:"$TAG"
docker run --rm -v "$PWD:/bundle" -w /bundle \
  ghcr.io/omniscoder/patentchecker:"$TAG" \
  patentchecker risk verify \
    --ontology example_platform_risk_ontology.v0.1.json \
    --timeline example_platform_risk_timeline.v0.1.json \
    --runs "$RUNS" \
    --strict --format json

Low-signal baseline

BashPowerShellPython API (coming)
ogn CLI
TAG=v0.1.28
MIRROR=omniscoder/patentchecker-releases
ASSET=example_platform_risk_bundle_low_signal.v1.zip

rm -rf bundle_dir "$ASSET" "$ASSET.sha256"
gh release download "$TAG" -R "$MIRROR" -p "$ASSET" -p "$ASSET.sha256"
sha256sum -c "$ASSET.sha256"

unzip -q "$ASSET" -d bundle_dir
cd bundle_dir

RUNS="$(ls -d run/run_* 2>/dev/null | LC_ALL=C sort | paste -sd, -)"
docker pull ghcr.io/omniscoder/patentchecker:"$TAG"
docker run --rm -v "$PWD:/bundle" -w /bundle \
  ghcr.io/omniscoder/patentchecker:"$TAG" \
  patentchecker risk verify \
    --ontology example_platform_low_signal_risk_ontology.v0.1.json \
    --timeline example_platform_low_signal_risk_timeline.v0.1.json \
    --runs "$RUNS" \
    --strict --format json
Tip: open risk_cumulative.svg first, then run the verifier.
Assets
v0.1.27
v0.1.27 · Jan 31, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).

Verify before you buy

PatentChecker is designed so buyers can verify bundles offline without a license.

Risk bundle (escalation)

BashPowerShellPython API (coming)
ogn CLI
set -euo pipefail

TAG=v0.1.27
MIRROR_REPO=omniscoder/patentchecker-releases

rm -rf bundle_dir example_platform_risk_bundle.v1.zip example_platform_risk_bundle.v1.zip.sha256

gh release download "$TAG" -R "$MIRROR_REPO" \
  -p example_platform_risk_bundle.v1.zip \
  -p example_platform_risk_bundle.v1.zip.sha256

sha256sum -c example_platform_risk_bundle.v1.zip.sha256

mkdir -p bundle_dir
unzip -q example_platform_risk_bundle.v1.zip -d bundle_dir

# Verify using the signed runner image (no local install required)
docker pull ghcr.io/omniscoder/patentchecker:"$TAG"
docker run --rm \
  -v "$PWD/bundle_dir:/bundle" -w /bundle \
  ghcr.io/omniscoder/patentchecker:"$TAG" \
  bash VERIFY_BUNDLE.sh
Open risk_cumulative.svg (audit), risk_cumulative.png (share), or risk_cumulative.pdf (print). The provenance footer is embedded.

Risk bundle (low-signal baseline)

BashPowerShellPython API (coming)
ogn CLI
set -euo pipefail

TAG=v0.1.27
MIRROR_REPO=omniscoder/patentchecker-releases

rm -rf bundle_dir example_platform_risk_bundle_low_signal.v1.zip example_platform_risk_bundle_low_signal.v1.zip.sha256

gh release download "$TAG" -R "$MIRROR_REPO" \
  -p example_platform_risk_bundle_low_signal.v1.zip \
  -p example_platform_risk_bundle_low_signal.v1.zip.sha256

sha256sum -c example_platform_risk_bundle_low_signal.v1.zip.sha256

mkdir -p bundle_dir
unzip -q example_platform_risk_bundle_low_signal.v1.zip -d bundle_dir

docker pull ghcr.io/omniscoder/patentchecker:"$TAG"
docker run --rm \
  -v "$PWD/bundle_dir:/bundle" -w /bundle \
  ghcr.io/omniscoder/patentchecker:"$TAG" \
  bash VERIFY_BUNDLE.sh

What’s in this release

  • patentchecker risk compile|verify|plot: deterministic risk timeline compiler + offline verifier + SVG/PNG/PDF charts.
  • Public, buyer-neutral reference bundles (escalation + low-signal baseline), mirrored to omniscoder/patentchecker-releases.
Assets
v0.1.26
v0.1.26 · Jan 30, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).
Assets
v0.1.24
v0.1.24 · Jan 29, 2026
Mirror of private artifacts for v0.1.24.\n\n- legal-events: add sources[].fileset_policy and optional sources[].fileset_hash for snapshot completeness\n- legal-events: fail closed on duplicate evidence bytes across different artifact_path\n- contract/tooling bump to v0.1.24 (schemas/examples/tests updated)
Assets
v0.1.23
v0.1.23 · Jan 29, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).

v0.1.23 release notes

Release pipeline proof-point: no hidden artifact uploads

  • Disables Docker build summary / *.dockerbuild build record uploads in the release workflow (prevents CreateArtifact warnings when Actions artifact storage quota is saturated).

No product changes

  • No schema or runtime behavior changes; this is release hygiene only.
Assets
v0.1.22
v0.1.22 · Jan 29, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).

v0.1.22 release notes

Release pipeline hardening (no product behavior change)

  • Release workflow uses GHCR registry-backed build cache (:buildcache) instead of GitHub Actions storage.
  • Release workflow prints a deterministic “build inputs” summary (cache refs, configured platforms, runner arch) to simplify incident/debug review.
  • CI workflows avoid GitHub Actions cache/artifact storage that can trigger “Failed to CreateArtifact” quota warnings.
Assets
v0.1.21
v0.1.21 · Jan 28, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).

v0.1.21 release notes

  • Ships tiny sample evidence bytes under examples/legal-event-set.sample.assets/.
  • Adds a unit test that recomputes artifact_sha256 from those bytes and asserts:
    • events[].evidence_refs[].artifact_sha256 matches the file bytes
    • events[].event_id contains the same sha256:… (weak-but-auditable v0.1 binding rule)

Release hygiene

  • Disables npm cache in the release workflow to avoid GitHub Actions artifact quota failures.
Assets
v0.1.20
v0.1.20 · Jan 28, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).

v0.1.20 release notes

Supply-chain hardening

  • Digest-pins the Docker base image (Dockerfile FROM …@sha256:…).
  • Release manifest now records the base image ref+digest under container.base_image.
Adds a new offline, deterministic schema + sample for clinical-stage IP risk “legal event” monitoring:
  • Schema: schemas/legal-event-set.v0.1.schema.json
  • Example: examples/legal-event-set.sample.v0.1.json
No breaking changes to the existing watchlist / diff engine schemas (schema_version: 0.1).
Assets
v0.1.19
v0.1.19 · Jan 28, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).

v0.1.19 release notes

Release integrity (new)

Policy (effective v0.1.19): release tags are immutable. If a release needs changes, we cut a new tag (no force-moving tags).
Why v0.1.19 exists: the v0.1.18 tag was repointed once. v0.1.19 is the stable, buyer-safe replacement.
Positioning: v0.1.19 is the first audit-grade release.
Canonical identifiers (tag-independent):
  • Container image digest (see runner_receipt.v0.1.json).
  • Signed release manifest: release_manifest.v0.1.json + release_manifest.v0.1.cosign.bundle.json.
  • Signed release checksums: release_assets.sha256 + release_assets.sha256.cosign.bundle.json.
Verification is offline-capable: the bundles include the signing certificate chain.

What changed

  • Adds signed, deterministic release integrity artifacts:
    • release_assets.sha256 (sha256 checksums for release assets)
    • release_manifest.v0.1.json (binds tag, git_sha, tool_version, contract_hash, schema_digest, container digest, and per-asset hashes)
    • Cosign keyless signature bundles for both files.
  • No watchlist schema changes (schema_version: 0.1). See v0.1.18 notes for product behavior changes.

Air-gapped verification after mirroring (enclave)

This section is intentionally split from “download” steps. Once you have copied release assets + mirrored the image digest into your enclave, you can verify using local files.
ItemVerified offline?How
release_manifest.v0.1.jsonyescosign verify-blob --bundle release_manifest.v0.1.cosign.bundle.json …
release_assets.sha256yescosign verify-blob --bundle release_assets.sha256.cosign.bundle.json …
Release asset bytesyessha256sum -c release_assets.sha256
Image digest is signedyescosign verify-blob-attestation --bundle cosign.bundle.json --digest …
Minimal enclave steps (assumes assets already copied in, and the image digest is mirrored into an internal registry):
BashPowerShellPython API (coming)
ogn CLI
set -euo pipefail

ASSET_DIR=/mnt/patentchecker/v0.1.19
INTERNAL_REGISTRY=registry.internal.example.com/omniscoder/patentchecker

cd "$ASSET_DIR"

export DIGEST="$(jq -r '.runner.image.digest' runner_receipt.v0.1.json)" # sha256:<64>
export IDENTITY="$(jq -r '.signing.identity' runner_receipt.v0.1.json)"
export ISSUER="$(jq -r '.signing.issuer' runner_receipt.v0.1.json)"

# Verify signed release manifest + checksums (file-only)
cosign verify-blob --bundle release_manifest.v0.1.cosign.bundle.json \
  --certificate-identity "$IDENTITY" --certificate-oidc-issuer "$ISSUER" \
  release_manifest.v0.1.json
cosign verify-blob --bundle release_assets.sha256.cosign.bundle.json \
  --certificate-identity "$IDENTITY" --certificate-oidc-issuer "$ISSUER" \
  release_assets.sha256
sha256sum -c release_assets.sha256

# Pull the exact image bytes by digest (internal registry)
docker pull "${INTERNAL_REGISTRY}@${DIGEST}"

# Prove “this digest is signed by this identity” offline (file-only signature bundle)
cosign verify-blob-attestation \
  --bundle cosign.bundle.json \
  --certificate-identity "$IDENTITY" \
  --certificate-oidc-issuer "$ISSUER" \
  --digest "${DIGEST#sha256:}" \
  --digestAlg sha256
Assets
v0.1.18
v0.1.18 · Jan 28, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).

v0.1.18 release notes

Erratum (release integrity)

The v0.1.18 tag was repointed once. Do not treat v0.1.18 as an immutable reference; use v0.1.19 instead.

What changed

  • Verifier summary is now “inescapable”: verify:run prints a mandatory VERIFICATION SUMMARY including scope policy + a Scope decision (PASS/FAIL), adapter identity, and embedded execution authorization (license receipt) details.
  • Evidence bundles include a reviewer-friendly guide: every run directory now includes README_FOR_REVIEWERS.md explaining what the bundle proves / does not prove, how to verify, and how to interpret scope warnings (explicitly NOT FTO / clearance).
  • Scope governance is explicit and testable:
    • exact policy fails closed when the adapter’s observed scope exceeds watchlist requirements.
    • superset_ok policy records a machine-readable scope_exceeded block and verifier output echoes it.
    • Run manifest records a corpus.scope_decision object for auditability.
  • Module adapter integrity is enforced at runtime (pre-import):
    • watchlist.engine.adapter.config.module_sha256 is required for module adapters.
    • --root containment is enforced using realpath (symlink escapes fail closed).
    • Failures are attributable with stable, one-line policy errors.
  • Adapter identity is always in the signed manifest (all lanes), removing ambiguity about what was executed.

Notes / compatibility

  • Watchlist schema remains v0.1 (schema_version: 0.1).
  • Module-adapter runs require module_sha256 in the watchlist adapter config; existing module watchlists must add it.
Assets
v0.1.17
v0.1.17 · Jan 27, 2026
Mirror notice: These are public release artifacts for omniscoder/patentchecker (private source repo).

v0.1.17 release notes

Workflow (new)

  1. Edit watchlist.yaml and sequences.tsv
  2. Compile to schema-validated, canonical watchlist.v0.1.json:
BashPowerShellPython API (coming)
ogn CLI
patentchecker watchlist compile \
  --spec watchlist.yaml \
  --sequences sequences.tsv \
  --out watchlist.v0.1.json
  1. Run using the emitted watchlist.v0.1.json (the runner consumes JSON only).

Safety guarantees

  • Determinism: compiler output is canonical JSON bytes (stable key sorting + stable array ordering + fixed newline). CI includes a hard gate that compiles twice in fresh temp dirs and asserts byte-identical output.
  • Stable UX output: patentchecker watchlist compile prints a single-line, canonical JSON summary (hash-friendly in CI/logs).
  • Fail-closed path rebasing: file / file_fixture / module adapter paths are validated, must exist, must not escape --root (including via symlinks), and are rebased relative to the emitted JSON with POSIX / separators.

Backwards compatibility

  • v0.1.16 runner accepts watchlist.v0.1.json only (no compiler).
  • v0.1.17 adds the compiler, but the output schema stays watchlist.v0.1 (schema_version: 0.1), so existing JSON watchlists continue to work.

Docs and examples

  • Authoring docs: docs/watchlist-authoring.md
  • Samples: examples/watchlist.sample.yaml, examples/sequences.sample.tsv
Assets