CLARIXO Behavior Evidence Export API
Export user-facing AI behavior as traceable, provable, and auditable evidence records.
Built for traceability, proof, and audit without taking over execution control.
A separate outbound evidence layer for user-facing AI behavior
CLARIXO Behavior Evidence Export API turns user-facing AI behavior into standardized evidence records that can be queried, exported, reviewed, and retained across support, audit, dispute, and post-incident workflows.
Track what happened
Capture the event identity, runtime path, model, timestamps, and user-facing summaries needed to reconstruct an AI event.
Preserve record integrity
Include a stable evidence hash generated from normalized core fields so exported records are more than simple log dumps.
Support review and retention
Use evidence records for internal accountability, customer review, post-incident reconstruction, and audit-oriented export workflows.
Start with evidence export before moving into deeper runtime control
CLARIXO Behavior Evidence Export API is the evidence-facing entry for teams that need traceable, provable, and auditable user-facing AI behavior without first placing CLARIXO into the live execution path.
It does not take over runtime control
This API is not CLARIXO’s runtime control layer. It does not sit in the execution path, does not control routing, and does not take on approval, blocking, or enforcement responsibilities.
Not a routing API
It does not decide provider selection, fallback order, or execution-path control between enterprises and external AI providers.
Not an execution-control API
It does not sit inline in the runtime path and does not act as the control plane for model execution decisions.
Not an approval or enforcement API
It does not approve, deny, block, or escalate execution. Its role is evidence export and downstream audit support.
Start with evidence before moving into deeper runtime control
Many AI teams are not ready to hand over runtime control, but they still need reliable evidence of what their systems did for users. This API provides a lightweight path to retain behavior records for dispute review, internal accountability, audit, and post-incident reconstruction.
Choose the right integration entry
CLARIXO Behavior Evidence Export API now has a formal integration entry. Start with the Evidence API start page when you need trial access, the first write, and the first read closure. Use the Integration Protocol when you need the contract, role, scope, and boundary first.
/?action=evidence-events is the live submission and retrieval handler for the minimum Behavior Evidence Export API surface.CLARIXO Behavior Evidence Export API Integration Protocol
Defines the formal evidence export contract, including role, scope, boundary, minimum evidence record, and integrity rule. Use this document when you need to understand what this API is, what it is not, how evidence_hash is defined, and why this API remains separate from CLARIXO Core Runtime API.
Contract, Role, and Boundary
Read the ProtocolCLARIXO Behavior Evidence Export API Integration Manual
Explains how to implement the minimum evidence export path in a real system. Use this document when you need to define an evidence event, map fields, normalize a payload, generate evidence_hash, submit records, retrieve records, and verify that the exported result is stable, readable, and operationally useful.
Primary entry for implementation, verification, and rollout
Start Evidence API IntegrationKeep the first export surface intentionally small
The minimum API surface stays intentionally small: one endpoint to write evidence events and one endpoint to query or export them.
POST /v1/evidence/events
Write one or more evidence events after a user-facing AI behavior has been completed and normalized into an evidence payload.
GET /v1/evidence/events
Query or export evidence events by project_id, session_id, event_id, final_status, record_origin, application_id, route_path, recorded_from, recorded_to, and limit.
/?action=evidence-events.project_id, session_id, event_id, final_status, record_origin, application_id, route_path, recorded_from, recorded_to, and limit.
limit=20 when no limit is supplied and caps the maximum returned event count at 100.POST /?action=evidence-events
Content-Type: application/json
{
"project_id": "trial_proj_b17e8105174f862a",
"application_id": "clarixo:assistant:playground_chat",
"event_id": "package_ready_minimal_check",
"session_id": "package_ready_minimal_session",
"output_summary": "package ready minimal post check"
}
GET /?action=evidence-events&limit=5 GET /?action=evidence-events&record_origin=runtime_shadow_export&limit=2 GET /?action=evidence-events&project_id=trial_proj_b17e8105174f862a&final_status=answered&limit=5 GET /?action=evidence-events&application_id=clarixo%3Aassistant%3Aplayground_chat&limit=2 GET /?action=evidence-events&route_path=fixed_reply&limit=2 GET /?action=evidence-events&session_id=en74iel4r4kfk2uc6ekf8inlff&limit=1 GET /?action=evidence-events&recorded_from=2026-04-08T00:00:00Z&recorded_to=2026-04-09T23:59:59Z&limit=10
POST /?action=evidence-events, then immediately query it back with GET /?action=evidence-events&event_id=package_ready_minimal_check&limit=1, and confirm that event_id, output_summary, final_status, and evidence_hash are all present.{
"ok": true,
"boundary_status": "live",
"storage_status": "attached",
"event_count": 1,
"events": [
{
"schema_version": "1.0",
"record_origin": "runtime_shadow_export",
"project_id": null,
"application_id": "tgtracing:assistant:customer_chat",
"event_id": "rt_evt_...",
"session_id": "en74iel4r4kfk2uc6ekf8inlff",
"recorded_at": "2026-04-08T18:02:43+00:00",
"user_ref": null,
"input_summary": "Explain Trace Link in one sentence.",
"output_summary": "Track Link is TGTRACING's shared-link verification module.",
"provider": "clarixo-native",
"model": "runtime-engine",
"route_path": "fixed_reply",
"fallback_used": false,
"guard_flags": ["contract:clean", "normal"],
"confidence_signals": {
"decision_risk": "low-risk",
"decision_stability": "stable-band",
"diagnosis_label": "stable-runtime"
},
"operator_action": "allow",
"final_status": "answered",
"metadata": {
"source": "runtime_shadow_export",
"integration_source": "tgtracing",
"integration_mode": "third_party",
"integration_module": "assistant",
"integration_scene": "customer_chat"
},
"evidence_hash": "sha256:..."
}
]
}
Capture the minimum fields needed to describe a user-facing AI event
schema_version defaults to v1, record_origin defaults to manual_post when not supplied, final_status defaults to answered, empty guard_flags become ["none"], empty confidence_signals and empty metadata are returned as {}, and missing event_id or recorded_at are generated automatically.Export after the behavior happens
Your AI system completes a user-facing behavior, normalizes that behavior into an evidence payload, generates an evidence hash, and sends the record to CLARIXO for later query and export.
Complete the user-facing AI behavior
Let the enterprise system finish the user-visible response or result before exporting an evidence record.
Normalize into an evidence payload
Map the event into stable fields such as project scope, summaries, provider, route path, final status, and metadata.
Generate evidence_hash
Generate a SHA-256 evidence hash from normalized core fields for basic record-integrity verification.
Send to CLARIXO
Write the evidence event to CLARIXO for later query, export, dispute review, audit, and post-incident reconstruction.
Use normalized core fields for evidence hashing
sha256:<hex>.evidentiary_strength, degradation_reason, trace_continuity_status, trace_reconstruction_status, attribution_validity, and attribution_strength. These fields are returned by GET and verify, but they are not part of the current evidence_hash canonical core.none for empty guard_flags.Use evidence export where traceability matters first
The minimum version is most useful in workflows where teams need a stable behavior record for later review, customer accountability, dispute handling, or audit-oriented export without changing the live runtime path first.
Customer dispute review
Reconstruct what the AI system showed or returned to a user when support, trust, or escalation teams need a stable event record.
Internal accountability and audit export
Retain normalized evidence events that can be queried or exported during internal review, compliance preparation, or post-incident analysis.
Post-incident reconstruction
Preserve the route path, summaries, final status, and integrity marker needed to reconstruct what happened after a user-facing AI event.
Low-friction first integration
Start with evidence export when a team is not yet ready to move runtime control, routing, or approval behavior into a deeper middleware layer.
Built for teams that need proof before control
This page is aimed at AI enterprises that need a separate outward-facing evidence layer for user-visible AI behavior, especially before they are ready to adopt deeper runtime control or governance infrastructure.
Teams shipping user-facing AI features
Useful for teams that need traceable records of what users experienced without redesigning the execution stack first.
Teams handling review and dispute workflows
Useful for support, trust, operations, and escalation teams that need stable evidence when user-visible AI behavior is questioned later.
Teams moving toward stronger AI governance
Useful for organizations that want to start with evidence export now, then add runtime control, approval, or execution governance later.
A minimal record for one user-facing AI behavior
This example shows a minimum evidence record shaped for later review, reconstruction, and integrity checking.
Minimal exported record
{
"schema_version": "v1",
"project_id": "trial_proj_b17e8105174f862a",
"application_id": "tgtracing:assistant:customer_chat",
"event_id": "evt_20260408_0001",
"session_id": "sess_7c1f3b9d",
"recorded_at": "2026-04-08T17:58:11Z",
"user_ref": "user_anon_1024",
"input_summary": "User asked whether a shared tracking link could reveal location without consent.",
"output_summary": "Assistant explained that consent-based interaction is required and did not claim passive tracking.",
"provider": "enterprise_app",
"model": "gpt-4.1",
"route_path": "direct",
"fallback_used": false,
"guard_flags": ["policy_boundary_explained"],
"confidence_signals": {
"answer_mode": "policy-aligned",
"uncertainty_level": "low"
},
"operator_action": "none",
"final_status": "delivered",
"metadata": {
"locale": "en",
"record_origin": "manual_post"
},
"evidence_hash": "sha256:examplehexvalue"
}
Why this record remains reviewable
event_id uniquely identifies the exported evidence event within the evidence stream.
input_summary and output_summary preserve the user-facing behavior in a reviewable form without requiring a full raw transcript in the minimum version.
route_path, fallback_used, and guard_flags preserve the normalized path and behavior context needed for later reconstruction.
final_status captures the final externally relevant outcome that the user effectively received.
evidence_hash provides a normalized integrity marker so the record can be checked as evidence rather than treated as a simple log entry.