{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.05878","arxiv_id":"2605.05878","integrity":{"available":true,"endpoint":"/pith/2605.05878/integrity.json","summary":{"critical":0,"advisory":3,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":0,"advisory":3,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T13:22:04.455360Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T08:41:21.698675Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T19:31:19.508601Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T13:10:00.480480Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/nist.sp.800-84.url:https://csrc.nist.gov/publications/detail/sp/800-84/final(visited) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.6028/nist.sp.800-84.url:https://csrc.nist.gov/publications/detail/sp/800-84/final(visited","detected_arxiv_id":null,"ref_index":21,"audited_at":"2026-05-19T13:10:00.480480Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.3386/w30048.url:https://www.nber.org/papers/w30048(visited) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.3386/w30048.url:https://www.nber.org/papers/w30048(visited","detected_arxiv_id":null,"ref_index":22,"audited_at":"2026-05-19T13:10:00.480480Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arxiv.2410.14493.url:https://arxiv.org/abs/2410.14493(visited) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arxiv.2410.14493.url:https://arxiv.org/abs/2410.14493(visited","detected_arxiv_id":null,"ref_index":6,"audited_at":"2026-05-19T13:10:00.480480Z"}],"snapshot_sha256":"4df9df2f530a792b2243b5355d40d95b0e0dcd28734b817f8a1d838fb278de3b"},"events":[{"event_id":1432,"event_type":"pith.integrity.v1","payload_sha256":"5fb4028c253cb8e77475b1a07cda560226a13dd6343634862062223030073255","signature_b64":"PClmg49SPlNXTObB+FkEydt0dSxOGApSdZwCRWnjaL/SrwqBJ9MsqTA6pU8z9SCyP2+xGKMBC9Aj1FtNBSIYDw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T13:12:04.578978+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.3386/w30048.url:https://www.nber.org/papers/w30048(visited) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Lin William Cong et al.Crypto Wash Trading. NBER Working Paper 30048. Foundational empirical study of crypto wash-trading patterns; the methodological reference for the sentiment-fusion engine’s grey-literature caveats (Birdeye, DexScreener","arxiv_id":"2605.05878","detector":"doi_compliance","evidence":{"ref_index":22,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Lin William Cong et al.Crypto Wash Trading. NBER Working Paper 30048. Foundational empirical study of crypto wash-trading patterns; the methodological reference for the sentiment-fusion engine’s grey-literature caveats (Birdeye, DexScreener","reconstructed_doi":"10.3386/w30048.url:https://www.nber.org/papers/w30048(visited"},"severity":"advisory","ref_index":22,"audited_at":"2026-05-19T13:10:00.480480Z","event_type":"pith.integrity.v1","detected_doi":"10.3386/w30048.url:https://www.nber.org/papers/w30048(visited","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"ef4deb61837e224ad82bb6032b14cc19e806192a5f9cca1b45b02663e896273f","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1431,"event_type":"pith.integrity.v1","payload_sha256":"bfec242852434833d3a7c35dd2ea0afc031fb900fa2700d5157a63dca49ce27b","signature_b64":"hvVJet1uzKyHPABum29hB614RzjEOClafkklkIh7Hp0fekhvfwdoW5KkPdL3aIY20dGB7mLGzB+tHl5NlUjDDQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T13:12:04.577080+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/nist.sp.800-84.url:https://csrc.nist.gov/publications/detail/sp/800-84/final(visited) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Tim Grance et al.Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities. NIST Special Publication 800-84. Canonical US-government tabletop-exercise framework for cybersecurity contingency planning; the scenario engine’","arxiv_id":"2605.05878","detector":"doi_compliance","evidence":{"ref_index":21,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Tim Grance et al.Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities. NIST Special Publication 800-84. Canonical US-government tabletop-exercise framework for cybersecurity contingency planning; the scenario engine’","reconstructed_doi":"10.6028/nist.sp.800-84.url:https://csrc.nist.gov/publications/detail/sp/800-84/final(visited"},"severity":"advisory","ref_index":21,"audited_at":"2026-05-19T13:10:00.480480Z","event_type":"pith.integrity.v1","detected_doi":"10.6028/nist.sp.800-84.url:https://csrc.nist.gov/publications/detail/sp/800-84/final(visited","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"143775028f105bb6c0b6d0ad057e5f382584722884a608cd53172760bd37c1e2","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1430,"event_type":"pith.integrity.v1","payload_sha256":"da544b35d3a43a0f727b0286e9f7be3a088d3511ed852620deb36c4c34c06207","signature_b64":"7F30pD1g0spnRxR/p0c6cJMrKSKiqduZlo9Cmbm6uneBInWmHoaE8hOKCN8Nk56nk05NfHZXGsA1xFG8dHziCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T13:12:04.575249+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arxiv.2410.14493.url:https://arxiv.org/abs/2410.14493(visited) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Jiajing Wu et al. “Safeguarding Blockchain Ecosystem: Understanding and Detecting Attack Transactions on Cross-chain Bridges”. In:Proceedings of the ACM Web Conference 2025 (WWW ’25). Introduces BridgeGuard, a graph-motif detector trained o","arxiv_id":"2605.05878","detector":"doi_compliance","evidence":{"ref_index":6,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Jiajing Wu et al. “Safeguarding Blockchain Ecosystem: Understanding and Detecting Attack Transactions on Cross-chain Bridges”. In:Proceedings of the ACM Web Conference 2025 (WWW ’25). Introduces BridgeGuard, a graph-motif detector trained o","reconstructed_doi":"10.48550/arxiv.2410.14493.url:https://arxiv.org/abs/2410.14493(visited"},"severity":"advisory","ref_index":6,"audited_at":"2026-05-19T13:10:00.480480Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arxiv.2410.14493.url:https://arxiv.org/abs/2410.14493(visited","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"89498c6de20d6f99ef5b7f363af811c0f795cba65cb80613e06638295da5841e","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.05878/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}