The missing standard for assurance evidence.
Evidence Packs define a consistent way to package assurance evidence into a single ZIP file, so it's easier to send, easier to review, and easier to compare over time.
Not a platform. Not a portal. Just a ZIP you can store anywhere.
Built on the same cryptographic infrastructure securing software supply chains worldwide.
What it is
Evidence Packs are a standardized "evidence bundle." Instead of every vendor sending assurance evidence in a different shape (portal links, scattered PDFs, spreadsheet attachments), it's packaged the same way every time.
What's in a pack
sha256:a3f2c8...
sha256:7b4e1d...
Attestations let you trace who created or reviewed the evidence. Tools sign automatically; auditors sign after review.
Where this goes
Assurance got stuck chasing collection instead of outcomes. Evidence Packs flips the model: vendors publish their posture on their terms, reviews start with what changed, and teams spend time on judgment instead of logistics. No broad access grants. No surprises from outside-in scans. Rigor becomes visible. Strong security becomes a selling point, not a checkbox.
The path forward
Evidence Packs work with what you have today. But the format is designed for where this is going.
Today
- • PDFs, reports, and policy docs packaged consistently
- • One format across all vendors. Compare apples to apples.
- • Year-over-year comparison: "these files are different"
- • Profile validation. Declare what a pack must contain; tooling checks completeness and content.
- • Share files however you share files today. Google Drive, Box, your trust center, etc.
As tooling matures
- • Machine-readable posture, signed at the source so you know it's real
- • Structured data you can query: compare posture across your entire third-party population
- • Automated collection, vendor-approved release. Evidence stays current instead of going stale between audits.
- • Profile registries. Shared type definitions across organizations; fetch schemas on demand.
The format stays the same. The artifacts inside get richer. Start with documents. Graduate to data.
CLI & SDKGet started
The spec is open and free. Pick your path.
Pick a path based on your role:
Frequently asked questions
Why do we need Evidence Packs when we have AI?
So it's a ZIP and a JSON file. What's the big deal?
How is this different from just sharing a folder?
Why can't buyers just hash whatever vendors send today?
Does this encourage oversharing sensitive documents?
Portals provide watermarking, access logs, and revocation. How does a pack handle that?
What if my vendor won't adopt this?
Who benefits from this?
How is this different from OSCAL, SAF, SARIF, or other machine-readable security formats?
How does signing work? Do I need to manage keys?
Can I generate packs from CI/CD?
What goes in the artifacts folder?
schema field (like github/branch-protection/v1) so tools know how to interpret the data.
How do I know a pack is legitimate?
security@acme.com or their GitHub Actions workflow, and the manifest digest matches, you know it hasn't been tampered with. The transparency log provides non-repudiation: Acme can't deny they signed it.
Initiated by
Locktivity
We built Evidence Packs in the open because portable, verifiable assurance is a problem bigger than any one vendor.