Evidence API

CLARIXO Behavior Evidence Export API

Export user-facing AI behavior as traceable, provable, and auditable evidence records.

Built for traceability, proof, and audit without taking over execution control.

What it is

A separate outbound evidence layer for user-facing AI behavior

CLARIXO Behavior Evidence Export API turns user-facing AI behavior into standardized evidence records that can be queried, exported, reviewed, and retained across support, audit, dispute, and post-incident workflows.

Traceability

Track what happened

Capture the event identity, runtime path, model, timestamps, and user-facing summaries needed to reconstruct an AI event.

Proof

Preserve record integrity

Include a stable evidence hash generated from normalized core fields so exported records are more than simple log dumps.

Audit

Support review and retention

Use evidence records for internal accountability, customer review, post-incident reconstruction, and audit-oriented export workflows.

Page role

Start with evidence export before moving into deeper runtime control

CLARIXO Behavior Evidence Export API is the evidence-facing entry for teams that need traceable, provable, and auditable user-facing AI behavior without first placing CLARIXO into the live execution path.

What this page is
A product and integration entry for CLARIXO evidence export, focused on user-facing records, later review, record integrity, and audit support.
What this page is not
It is not the Core Runtime API page, not the LLM-side execution-path control layer, not the approval or enforcement surface, and not the place where provider routing or governed execution decisions are made.
Why it exists
Many AI teams are not ready to hand over runtime control, but they still need reliable evidence of what their systems did for users. This page exists so teams can start with behavior traceability and audit, then adopt deeper runtime control later when their path is ready.
What it is not

It does not take over runtime control

This API is not CLARIXO’s runtime control layer. It does not sit in the execution path, does not control routing, and does not take on approval, blocking, or enforcement responsibilities.

Not this

Not a routing API

It does not decide provider selection, fallback order, or execution-path control between enterprises and external AI providers.

Not this

Not an execution-control API

It does not sit inline in the runtime path and does not act as the control plane for model execution decisions.

Not this

Not an approval or enforcement API

It does not approve, deny, block, or escalate execution. Its role is evidence export and downstream audit support.

Why it exists

Start with evidence before moving into deeper runtime control

Many AI teams are not ready to hand over runtime control, but they still need reliable evidence of what their systems did for users. This API provides a lightweight path to retain behavior records for dispute review, internal accountability, audit, and post-incident reconstruction.

Position
CLARIXO Core Runtime API is the LLM-side runtime layer between AI enterprises and external AI providers. Evidence API focuses on exported user-facing behavior records between AI enterprises and end users.
Problem solved
Core Runtime API helps control how AI runs. Behavior Evidence Export API helps prove what AI did for users.
Adoption path
Teams can start with evidence export, traceability, and audit, then move into deeper runtime control when their integration path is ready.
Documentation

Choose the right integration entry

CLARIXO Behavior Evidence Export API now has a formal integration entry. Start with the Evidence API start page when you need trial access, the first write, and the first read closure. Use the Integration Protocol when you need the contract, role, scope, and boundary first.

Formal entry
The Evidence API start page is the main start point for a real integration. The base Evidence API remains free as the open evidence-entry layer. The start page leads into bootstrap access, first-key delivery, first write, first read, and the initial working closure before deeper rollout work begins. Bootstrap keys are project-bound, so the submitted project_id must match the project bound to the supplied key.
Live handler path
/?action=evidence-events is the live submission and retrieval handler for the minimum Behavior Evidence Export API surface.
Quick split
Read the Protocol for contract, role, and boundary. Use the start page for access bootstrap and first closure. Use the Manual for implementation, verification, rollout, and live integration work, including project-bound trial key usage and mismatch troubleshooting.
Protocol

CLARIXO Behavior Evidence Export API Integration Protocol

Defines the formal evidence export contract, including role, scope, boundary, minimum evidence record, and integrity rule. Use this document when you need to understand what this API is, what it is not, how evidence_hash is defined, and why this API remains separate from CLARIXO Core Runtime API.

Contract, Role, and Boundary

Read the Protocol
Manual

CLARIXO Behavior Evidence Export API Integration Manual

Explains how to implement the minimum evidence export path in a real system. Use this document when you need to define an evidence event, map fields, normalize a payload, generate evidence_hash, submit records, retrieve records, and verify that the exported result is stable, readable, and operationally useful.

Primary entry for implementation, verification, and rollout

Start Evidence API Integration
Why two documents
This split is intentional. The Protocol is the source of truth for contract, role, boundary, minimum schema, and integrity rule. The Manual is the source of truth for implementation path, payload construction, submission flow, retrieval flow, verification flow, and rollout discipline.
Boundary reminder
Behavior Evidence Export API is for post-behavior traceability, proof, and audit. It is not the runtime control API for routing, fallback, guard behavior, approval, or execution governance.
Different role
Need the evidence export contract? Read the Integration Protocol. Ready to implement against the live evidence handler? Start with the Integration Manual. Need runtime routing, fallback, guard behavior, approval, or execution governance? Use CLARIXO Core Runtime API.
Minimal API surface

Keep the first export surface intentionally small

The minimum API surface stays intentionally small: one endpoint to write evidence events and one endpoint to query or export them.

Write

POST /v1/evidence/events

Write one or more evidence events after a user-facing AI behavior has been completed and normalized into an evidence payload.

Read

GET /v1/evidence/events

Query or export evidence events by project_id, session_id, event_id, final_status, record_origin, application_id, route_path, recorded_from, recorded_to, and limit.

Current site route
On this CLARIXO site, both the live POST and live GET handler are currently exposed through /?action=evidence-events.
Supported filters
The current GET handler supports project_id, session_id, event_id, final_status, record_origin, application_id, route_path, recorded_from, recorded_to, and limit.
Limit behavior
The current GET handler defaults to limit=20 when no limit is supplied and caps the maximum returned event count at 100.
Minimal POST example
POST /?action=evidence-events
Content-Type: application/json

{
  "project_id": "trial_proj_b17e8105174f862a",
  "application_id": "clarixo:assistant:playground_chat",
  "event_id": "package_ready_minimal_check",
  "session_id": "package_ready_minimal_session",
  "output_summary": "package ready minimal post check"
}
Query examples
GET /?action=evidence-events&limit=5
GET /?action=evidence-events&record_origin=runtime_shadow_export&limit=2
GET /?action=evidence-events&project_id=trial_proj_b17e8105174f862a&final_status=answered&limit=5
GET /?action=evidence-events&application_id=clarixo%3Aassistant%3Aplayground_chat&limit=2
GET /?action=evidence-events&route_path=fixed_reply&limit=2
GET /?action=evidence-events&session_id=en74iel4r4kfk2uc6ekf8inlff&limit=1
GET /?action=evidence-events&recorded_from=2026-04-08T00:00:00Z&recorded_to=2026-04-09T23:59:59Z&limit=10
First verification quick path
Write one known event through POST /?action=evidence-events, then immediately query it back with GET /?action=evidence-events&event_id=package_ready_minimal_check&limit=1, and confirm that event_id, output_summary, final_status, and evidence_hash are all present.
Live response example
{
  "ok": true,
  "boundary_status": "live",
  "storage_status": "attached",
  "event_count": 1,
  "events": [
    {
      "schema_version": "1.0",
      "record_origin": "runtime_shadow_export",
      "project_id": null,
      "application_id": "tgtracing:assistant:customer_chat",
      "event_id": "rt_evt_...",
      "session_id": "en74iel4r4kfk2uc6ekf8inlff",
      "recorded_at": "2026-04-08T18:02:43+00:00",
      "user_ref": null,
      "input_summary": "Explain Trace Link in one sentence.",
      "output_summary": "Track Link is TGTRACING's shared-link verification module.",
      "provider": "clarixo-native",
      "model": "runtime-engine",
      "route_path": "fixed_reply",
      "fallback_used": false,
      "guard_flags": ["contract:clean", "normal"],
      "confidence_signals": {
        "decision_risk": "low-risk",
        "decision_stability": "stable-band",
        "diagnosis_label": "stable-runtime"
      },
      "operator_action": "allow",
      "final_status": "answered",
      "metadata": {
        "source": "runtime_shadow_export",
        "integration_source": "tgtracing",
        "integration_mode": "third_party",
        "integration_module": "assistant",
        "integration_scene": "customer_chat"
      },
      "evidence_hash": "sha256:..."
    }
  ]
}
What you can export

Capture the minimum fields needed to describe a user-facing AI event

Event identity
schema_version, project_id, application_id, event_id, session_id, and recorded_at define which event was exported and when it was recorded.
Behavior summary
user_ref, input_summary, and output_summary capture the user-facing behavior without requiring full raw content in the minimum version.
Runtime path
provider, model, route_path, fallback_used, and guard_flags preserve the path and state needed for audit-oriented reconstruction.
Outcome
confidence_signals, operator_action, final_status, metadata, and evidence_hash preserve the final status and integrity context of the record.
Current POST defaults
In the current handler, schema_version defaults to v1, record_origin defaults to manual_post when not supplied, final_status defaults to answered, empty guard_flags become ["none"], empty confidence_signals and empty metadata are returned as {}, and missing event_id or recorded_at are generated automatically.
Minimal integration

Export after the behavior happens

Your AI system completes a user-facing behavior, normalizes that behavior into an evidence payload, generates an evidence hash, and sends the record to CLARIXO for later query and export.

Step 1

Complete the user-facing AI behavior

Let the enterprise system finish the user-visible response or result before exporting an evidence record.

Step 2

Normalize into an evidence payload

Map the event into stable fields such as project scope, summaries, provider, route path, final status, and metadata.

Step 3

Generate evidence_hash

Generate a SHA-256 evidence hash from normalized core fields for basic record-integrity verification.

Step 4

Send to CLARIXO

Write the evidence event to CLARIXO for later query, export, dispute review, audit, and post-incident reconstruction.

Basic record integrity

Use normalized core fields for evidence hashing

Hash algorithm
Use SHA-256 and return the output as sha256:<hex>.
Canonical fields
schema_version, project_id, application_id, event_id, session_id, recorded_at, user_ref, input_summary, output_summary, provider, model, route_path, fallback_used, guard_flags, and final_status.
EVIDE-compatible Level 2 fields
For responsibility and evidentiary-strength records, the live handler also supports top-level fields such as evidentiary_strength, degradation_reason, trace_continuity_status, trace_reconstruction_status, attribution_validity, and attribution_strength. These fields are returned by GET and verify, but they are not part of the current evidence_hash canonical core.
Normalization
Use UTF-8, ISO 8601 timestamps, trimmed strings, booleans as true or false, sorted comma-joined arrays, and none for empty guard_flags.
Common use cases

Use evidence export where traceability matters first

The minimum version is most useful in workflows where teams need a stable behavior record for later review, customer accountability, dispute handling, or audit-oriented export without changing the live runtime path first.

Support

Customer dispute review

Reconstruct what the AI system showed or returned to a user when support, trust, or escalation teams need a stable event record.

Audit

Internal accountability and audit export

Retain normalized evidence events that can be queried or exported during internal review, compliance preparation, or post-incident analysis.

Risk

Post-incident reconstruction

Preserve the route path, summaries, final status, and integrity marker needed to reconstruct what happened after a user-facing AI event.

Adoption

Low-friction first integration

Start with evidence export when a team is not yet ready to move runtime control, routing, or approval behavior into a deeper middleware layer.

Who it is for

Built for teams that need proof before control

This page is aimed at AI enterprises that need a separate outward-facing evidence layer for user-visible AI behavior, especially before they are ready to adopt deeper runtime control or governance infrastructure.

AI product teams

Teams shipping user-facing AI features

Useful for teams that need traceable records of what users experienced without redesigning the execution stack first.

Trust & support

Teams handling review and dispute workflows

Useful for support, trust, operations, and escalation teams that need stable evidence when user-visible AI behavior is questioned later.

Adoption path

Teams moving toward stronger AI governance

Useful for organizations that want to start with evidence export now, then add runtime control, approval, or execution governance later.

Example evidence record

A minimal record for one user-facing AI behavior

This example shows a minimum evidence record shaped for later review, reconstruction, and integrity checking.

Example

Minimal exported record

{
  "schema_version": "v1",
  "project_id": "trial_proj_b17e8105174f862a",
  "application_id": "tgtracing:assistant:customer_chat",
  "event_id": "evt_20260408_0001",
  "session_id": "sess_7c1f3b9d",
  "recorded_at": "2026-04-08T17:58:11Z",
  "user_ref": "user_anon_1024",
  "input_summary": "User asked whether a shared tracking link could reveal location without consent.",
  "output_summary": "Assistant explained that consent-based interaction is required and did not claim passive tracking.",
  "provider": "enterprise_app",
  "model": "gpt-4.1",
  "route_path": "direct",
  "fallback_used": false,
  "guard_flags": ["policy_boundary_explained"],
  "confidence_signals": {
    "answer_mode": "policy-aligned",
    "uncertainty_level": "low"
  },
  "operator_action": "none",
  "final_status": "delivered",
  "metadata": {
    "locale": "en",
    "record_origin": "manual_post"
  },
  "evidence_hash": "sha256:examplehexvalue"
}
Field notes

Why this record remains reviewable

event_id uniquely identifies the exported evidence event within the evidence stream.

input_summary and output_summary preserve the user-facing behavior in a reviewable form without requiring a full raw transcript in the minimum version.

route_path, fallback_used, and guard_flags preserve the normalized path and behavior context needed for later reconstruction.

final_status captures the final externally relevant outcome that the user effectively received.

evidence_hash provides a normalized integrity marker so the record can be checked as evidence rather than treated as a simple log entry.

Why it stays separate

Need deeper runtime control?

CLARIXO Core Runtime API is the separate LLM-side runtime control layer for routing, fallback, guard behavior, approval, and execution governance across the AI path between enterprises and external AI providers. Behavior Evidence Export API remains the separate evidence export path for post-behavior traceability, proof, and audit between enterprises and end users.
Review workspace

Need formal review after evidence export?

Audit Workspace follows Evidence API. It turns evidence records into grouped case reading, reviewer context, and structured review export without changing the original evidence, and access to it is unlocked through Responsibility rather than standalone purchase.