P4 checklist (counsel verification)

Use this as a quick “is the record defensible?” scan. Each item points to the primary place to review.

IDCheckPack page
P4-1Every material claim has at least one primary-source anchor (canonical URL + #:~:text AND Ctrl+F string).(Phase D mapping step)
P4-2Risk landscape lanes match cited evidence (no uncited narrative).landscape.html
P4-3Foreseeable misuse vectors have concrete counsel questions and mitigation levers tied to evidence.foreseeable_misuse.html
P4-4Anthropic distinctives page does not overstate; each distinctive is supported by an evidence pointer.anthropic_distinctives.html
P4-5Acceptance table aligns with counsel work steps and referenced risk controls.acceptance_table.html
P4-6No broken internal navigation or misleading links; pack is reviewable offline.index.html

Definitions & scope

Purpose. The Evidence & Source Integrity (ESI) module is the pack’s verification spine: it defines how claims are traced to evidence, and how reviewers can audit (and challenge) every material statement.

  • Claim ID: a stable identifier (e.g., S1-001) used across pages, the Evidence Ledger, and the Casebook.
  • Material claim: a statement that could plausibly affect counsel’s risk assessment, posture, or recommendations.
  • Canonical URL: the preferred, copy/paste-safe URL to cite for that claim (avoid tracking links and unstable mirrors).
  • Ctrl+F anchor: one or more short strings expected to reliably locate the relevant passage on the canonical page/PDF.
  • Text fragment (#:~:text): optional deep-link target for supported browsers; use in addition to a Ctrl+F anchor.
  • Altitude: how “deep” the capture is in our pipeline (e.g., board → page_raw → stratosphere). Higher altitude generally means more durable verification artifacts.
  • Comprehensive Sources Registry: the single source of truth for all external URLs referenced anywhere in the pack.

Non-goal. ESI does not provide legal advice; it provides defensible traceability and review mechanics.

Primer: how to verify a claim

  1. Start with the Claim ID (from any page) and locate its row in the Evidence Ledger.
  2. Open the canonical URL and confirm it matches what the pack cites (no redirects to unrelated pages).
  3. Use the Ctrl+F anchor(s) from the ledger row to find the relevant passage quickly.
  4. Where appropriate, also validate a text fragment (#:~:text) target to reduce reviewer time.
  5. Record outcomes: verified / ambiguous / missing / drifted. If drifted, capture what changed and when, and consider a re-harvest.
  6. Cross-check the Comprehensive Sources Registry to ensure the canonical URL is registered and discover any related aliases or PDFs.

Availability & drift notes

Some domains may block automated fetching or rate-limit non-browser clients. For example, CourtListener returned 403 Forbidden in our automated fetch environment; reviewers should rely on normal browser access and/or harvested captures when available.

When you encounter access friction (paywalls, bot-blocks, expired PDFs), treat it as evidence risk: record it, and prefer higher-altitude captures or alternate canonical sources where defensible.

Governance: registry closure & transition guardrails

We treat “introducing a new external source” as a governed event. Pack builds enforce a closure step that regenerates the Comprehensive Sources Registry and audits that every external URL in any page appears there.

During masterplan transitions (and other “drift-prone” moments), a ritual-vault check surfaces relevant watchers (e.g., banner/nav unification, link-closure audits, and source-registry closure) so governance does not silently drop between phases.

Demo storyline (6–10 minute walkthrough)

  1. Step 1: Start at Home (what this pack is / what to verify)Set scope; review P4 checklist and walkthrough.
  2. Step 2: Read the Landscape lanesUnderstand the risk surface and the claim IDs that support each lane.
  3. Step 3: Scan Anthropic distinctivesIdentify the program-specific posture and differentiators (with evidence).
  4. Step 4: Work the Foreseeable Misuse tableEvaluate misuse vectors, counsel questions, and available mitigations.
  5. Step 5: Walk the Counsel Work pageTranslate evidence into review tasks and decision points.
  6. Step 6: Confirm Acceptance TableValidate accept/mitigate/decline recommendations and trace to evidence.
  7. Step 7: Backstop with ‘Who’s Who’ if neededAlign stakeholders/roles and escalation paths.

Traceability

Claim IDs referenced on this page (links jump to Evidence Ledger rows).