{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.24028","arxiv_id":"2604.24028","integrity":{"available":true,"endpoint":"/pith/2604.24028/integrity.json","summary":{"critical":0,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":0,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-21T07:39:53.916274Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T22:31:46.658682Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SP46215.2023.00035.Wang) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/SP46215.2023.00035.Wang","detected_arxiv_id":null,"ref_index":2,"audited_at":"2026-05-19T22:31:46.658682Z"}],"snapshot_sha256":"bdbdecee2cf649bc7dcd633e59750712bc4fedb00b1ed78d200e4a1f0254525e"},"events":[{"event_id":3388,"event_type":"pith.integrity.v1","payload_sha256":"af7d52d0692d213926b6dc4cbfcb5f271b9415cbfd085637eecd7681cf8d2b75","signature_b64":"K4eS20fF99jtpOykRJdF/GtvYklIDmdJNdF4cvWRLZrBS8sEMOmbXxvRkpq/vUeUFKAoBZO8B9pldmUW6kvzDw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:32:25.328040+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SP46215.2023.00035.Wang) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Automated unearthing of dangerous issue reports, in: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 834–846. Peters, F., Tun, T.T., Yu, Y., Nuseibeh, ","arxiv_id":"2604.24028","detector":"doi_compliance","evidence":{"ref_index":2,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Automated unearthing of dangerous issue reports, in: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 834–846. Peters, F., Tun, T.T., Yu, Y., Nuseibeh, ","reconstructed_doi":"10.1109/SP46215.2023.00035.Wang"},"severity":"advisory","ref_index":2,"audited_at":"2026-05-19T22:31:46.658682Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/SP46215.2023.00035.Wang","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"d0054005d65a0ce59d8857d2f3f6e95f48186dc135bc1196006a71f9b7f8818b","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.24028/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}