Build to the regulation. Ship the receipt.
A compliance pack is a versioned bundle of (recipe.json, evidence.md, dpia.md, mrm.md, controls.md). It encodes what your auditor will ask, what the K-score gate must enforce, and what the signed receipt must carry. One file your security review can read end-to-end.
HIPAA Safe Harbor
PHI redactor across 18 ยง164.514(b)(2) identifier categories. Two-hour onboarding from clone to signed artifact.
Fed SR 11-7
Model risk management for transaction classification. Schema-validated outputs, MRM doc maps to development / validation / governance.
SOX-lite ITGC
Disclosure-statement classifier. COSO ITGC test points mapped to receipt fields: change management, access, ops.
From clone to signed artifact in two hours.
The fast path for a health-plan or claims-processing team that needs an on-device PHI redactor with a defensible evidence binder. Synthetic seed corpus ships with the pack; bring your own labeled data when you have it.
Two-hour path
- 00:00. init.
kolm init --pack hipaa-phi-redactorscaffoldskolm.yaml, the synthetic seed corpus, the verifier, and the audit-log shape. - 00:05. data. Drop your own labeled examples into
examples/or skip and use seeds. The 18 Safe Harbor categories are pre-mapped to[NAME],[MRN],[SSN],[PHONE],[EMAIL],[GEO],[DATE],[ACCT],[POLICY],[URL],[IP],[VIN],[DEVICE]. - 00:30. compile.
kolm compile. Pattern path runs in seconds; the LoRA-tier upgrade takes ~45 minutes on a single A10. Gate fires at K-score 0.92. - 01:30. sign.
kolm sign --credentialemits thekolm-credential/0.1provenance credential and signs the artifact body with HMAC-SHA256. - 01:50. inspect.
kolm inspect dist/phi-redactor.kolm --verify on. Receipt body verifies, CID round-trips, credential signature checks. Hand the binder to security review.
The reference build under apps/showcase/healthcare/ is reproducible byte-for-byte: rebuild on your machine and the CID matches.
evidence.md includes scope language you can paste into your DPA.data/compliance-packs/hipaa-phi-redactor/Qwen/Qwen2.5-3B-Instructrecipe.json evidence.md dpia.md mrm.md controls.md examples/seed.jsonl
Schema-locked outputs your validators can replay.
For transaction or counterparty classification under Fed SR 11-7 / OCC 2011-12. Every output is validated against a JSON schema before it leaves the runtime. The MRM doc maps to the three SR 11-7 components: model development, validation, governance.
What the pack enforces
The verifier rejects any output that doesn’t carry category, amount, currency, confidence. The flags array is an enum: aml, ofac, structuring, high-risk-geo, pep, fraud-likely. No free text in the structured fields. Validators replay receipts against the captured schema and the schema CID matches the live runtime, or the call is rejected.
The MRM doc walks each SR 11-7 component with the kolm artifact as evidence:
- Model development.
recipe.json+ training set hash + base model CID + K-score breakdown. - Model validation. Held-out eval set + verifier code + K-score gate logs.
- Model governance. Credential signer + receipt chain + rollback artifact CIDs.
data/compliance-packs/finance-sr11-7/category: string (enum) amount: number currency: string (ISO 4217) confidence: number 0..1 flags: array of enum
recipe.json evidence.md mrm.md controls.md schema.json examples/seed.jsonl
Disclosure classification with a receipt chain auditors can walk.
Routes statements in 10-K / 10-Q filings into forward_looking / historical / risk_factor. Each call emits an HMAC-chained receipt. The controls.md doc maps COSO ITGC test points directly to receipt fields a SOX auditor will look for.
COSO ITGC test points → receipt fields
Three IT general control areas, each mapped to one or more concrete receipt fields:
- Change management. The artifact CID +
manifest.hashesare the immutable evidence of what was in production at any given time. Re-derive the CID from the on-disk artifact; if it doesn’t match the receipt, the change wasn’t logged. - Access.
credential.signeridentifies the principal that signed the deployment. The credential schema binds signer + artifact + CID + signed_at. - Operations.
receipt.chainis the per-call HMAC-SHA256 chain. Any tamper invalidates the chain locally; auditors can replay a sample against the host secret.
data/compliance-packs/sox-lite/forward_looking historical risk_factor
recipe.json evidence.md controls.md examples/seed.jsonl
Bring your own framework.
The three packs above are starting points. A compliance pack is just files in a directory; copy any of them, retarget the verifier and the K threshold, write the evidence doc your reviewers want, and ship. The contract is the artifact, the K-score gate, and the signed receipt. the framing on top is yours.