{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:52IGHM4VOCP357G3DHHHJNTUD5","short_pith_number":"pith:52IGHM4V","canonical_record":{"source":{"id":"2605.13918","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-13T12:52:35Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"c82ab882d0584c2c20c679ca7d122672c6f39060a2fb4e46a4b0b079142ba6c0","abstract_canon_sha256":"da6e7a52ec028f434af6eacf5bc284c1aeca146c4ef803fe4943992bcb0e6bbf"},"schema_version":"1.0"},"canonical_sha256":"ee9063b395709fbefcdb19ce74b6741f5efa8d1e0a944eff7bed2d991b74ae38","source":{"kind":"arxiv","id":"2605.13918","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.13918","created_at":"2026-05-17T23:39:18Z"},{"alias_kind":"arxiv_version","alias_value":"2605.13918v1","created_at":"2026-05-17T23:39:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.13918","created_at":"2026-05-17T23:39:18Z"},{"alias_kind":"pith_short_12","alias_value":"52IGHM4VOCP3","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"52IGHM4VOCP357G3","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"52IGHM4V","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:52IGHM4VOCP357G3DHHHJNTUD5","target":"record","payload":{"canonical_record":{"source":{"id":"2605.13918","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-13T12:52:35Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"c82ab882d0584c2c20c679ca7d122672c6f39060a2fb4e46a4b0b079142ba6c0","abstract_canon_sha256":"da6e7a52ec028f434af6eacf5bc284c1aeca146c4ef803fe4943992bcb0e6bbf"},"schema_version":"1.0"},"canonical_sha256":"ee9063b395709fbefcdb19ce74b6741f5efa8d1e0a944eff7bed2d991b74ae38","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:39:18.727155Z","signature_b64":"fmFwEepPj3d3C9FLWulaWqp8KIFs0yivZmT2QOv3Hn3TWhyinG+B9IfhLe/Ky3mj9p7xGfVx+t8vtD9l9LAZCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ee9063b395709fbefcdb19ce74b6741f5efa8d1e0a944eff7bed2d991b74ae38","last_reissued_at":"2026-05-17T23:39:18.726467Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:39:18.726467Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.13918","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"u4tgC0QjESyQXGLOQK6BWNvlrtO/RPQtCzai0WgzYgKekF26vfP68h6q0pzzlo46FOHueRODNKcz/PmOJ457Cg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T09:31:25.946952Z"},"content_sha256":"9eba973b3054c9db89e85729992b7d966889169f63339e4e139c433eb12635a4","schema_version":"1.0","event_id":"sha256:9eba973b3054c9db89e85729992b7d966889169f63339e4e139c433eb12635a4"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:52IGHM4VOCP357G3DHHHJNTUD5","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"CA2: Code-Aware Agent for Automated Game Testing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"Reinforcement learning agents that observe call stack traces test games more effectively than agents limited to game state alone.","cross_cats":["cs.LG"],"primary_cat":"cs.SE","authors_text":"David Meger, Joshua Romoff, Valliappan Chidambaram Adaikkappan, Vincent Martineau","submitted_at":"2026-05-13T12:52:35Z","abstract_excerpt":"Automated game testing is important for verifying game functionality, but it remains a costly and time-consuming process. Manual testing often misses edge cases, and current automated methods struggle to provide full code coverage. Prior work has explored reinforcement learning (RL) for game testing, but without leveraging internal code signals such as the call stack. We present Code Aware Agent (CA2), which uses call stack information to learn effective testing strategies. The agent receives the current function call trace along with the game state and learns to reach specific target function"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"Our results show that incorporating code signals like the call stack enables more effective and targeted game testing.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"That the call stack can be extracted efficiently and that its addition to the observation space produces a genuine policy improvement rather than an artifact of the specific environments or reward design.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"CA2 integrates call stack information into RL agents for game testing and shows consistent gains over baselines that ignore code signals.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"Reinforcement learning agents that observe call stack traces test games more effectively than agents limited to game state alone.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"c59a26ef9101858973497123b842fdd709147c5d1a471a85372062bd04fc6cb1"},"source":{"id":"2605.13918","kind":"arxiv","version":1},"verdict":{"id":"e653964a-7b81-41a9-bfc9-995889f7a68c","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-15T05:49:50.226940Z","strongest_claim":"Our results show that incorporating code signals like the call stack enables more effective and targeted game testing.","one_line_summary":"CA2 integrates call stack information into RL agents for game testing and shows consistent gains over baselines that ignore code signals.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"That the call stack can be extracted efficiently and that its addition to the observation space produces a genuine policy improvement rather than an artifact of the specific environments or reward design.","pith_extraction_headline":"Reinforcement learning agents that observe call stack traces test games more effectively than agents limited to game state alone."},"references":{"count":33,"sample":[{"doi":"","year":2021,"title":"C. Politowski, F. Petrillo, and Y.-G. Guéhéneuc.A Survey of Video Game Testing. 2021. arXiv:2103.06431 [cs.SE].url:https://arxiv.org/abs/2103.06431","work_id":"17cd638a-68fb-40df-b62c-b10fc1b41d5e","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1109/cog57401.2023.10333194","year":2023,"title":"Technical Challenges of Deploying Reinforcement Learning Agents for Game Testing in AAA Games","work_id":"a8a2d7d2-80c8-410e-9264-02bd8ec3d61e","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2013,"title":"Playing Atari with Deep Reinforcement Learning","work_id":"736a8ddf-e365-4940-ad58-4699fddedb86","ref_index":3,"cited_arxiv_id":"1312.5602","is_internal_anchor":true},{"doi":"","year":2024,"title":"Mastering Diverse Domains through World Models","work_id":"6aeb260f-8c7c-4f9c-b98b-067cd7c59acd","ref_index":4,"cited_arxiv_id":"2301.04104","is_internal_anchor":true},{"doi":"","year":2021,"title":"C. Gordillo, J. Bergdahl, K. Tollmar, and L. Gisslén.Improving Playtesting Coverage via Curiosity Driven Reinforcement Learning Agents. 2021. arXiv:2103 . 13798 [cs.LG].url: https://arxiv.org/abs/2103","work_id":"127e40d8-f3d5-417a-844d-8d63e4f1471a","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":33,"snapshot_sha256":"110f0ea419bcc2636c0928a4941cd41fd0781aaf9b950cf6b381a5af1d42e5f6","internal_anchors":9},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"e653964a-7b81-41a9-bfc9-995889f7a68c"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"+wqdbrnnHHRYrE7Xwj1fbq3Jbkd71ZknnVOUYvU1zehkMLkGSaXpS1/ffGmtjd/WXsv12Y/md7XgKn0n4XgzBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T09:31:25.947813Z"},"content_sha256":"49960b2af7c0817cad44422e3b2ce77aededc7f666798fcc46705071393e544a","schema_version":"1.0","event_id":"sha256:49960b2af7c0817cad44422e3b2ce77aededc7f666798fcc46705071393e544a"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:52IGHM4VOCP357G3DHHHJNTUD5","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1609/aiide.v18i1.21958.url:http://dx.doi.org/10.1609/aiide.v18i1.21958) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"P. Le Pelletier de Woillemont, R. Labory, and V. Corruble. “Automated Play-Testing through RL Based Human-Like Play-Styles Generation”. In:Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment18","arxiv_id":"2605.13918","detector":"doi_compliance","evidence":{"ref_index":25,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"P. Le Pelletier de Woillemont, R. Labory, and V. Corruble. “Automated Play-Testing through RL Based Human-Like Play-Styles Generation”. In:Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment18","reconstructed_doi":"10.1609/aiide.v18i1.21958.url:http://dx.doi.org/10.1609/aiide.v18i1.21958"},"severity":"advisory","ref_index":25,"audited_at":"2026-05-19T06:32:14.336488Z","event_type":"pith.integrity.v1","detected_doi":"10.1609/aiide.v18i1.21958.url:http://dx.doi.org/10.1609/aiide.v18i1.21958","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"e049ca3251f0e5c65da1bb2a191a5e883d4945cca565ca889fbe691425a299b2","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":160,"payload_sha256":"1584da10591270a006b2bdfef2d17b1aeab8ddc2f11f290df3a5cb2188842b4b","signature_b64":"8vk2q+RQBUnuBY6ANs0VlrtwxeFk8Fltd/FyKkB2er9r7b1xzfWP78dBWBKzJOckEjaxtkAO4SgxBbpjb1rwBg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-19T06:36:53Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"U/inX7iHVO8YvsDoOYPu+v8Q8ykZBoIBV0fCevPgpMpMYQDSYuPVKVDC9ocIoLQAXVA29YT1oJHs9+arGUDlAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T09:31:25.948966Z"},"content_sha256":"00c3c5bf351ed12ed58ec4f87762f8b17b3e86b0cb2f43890cec992cbf7d017e","schema_version":"1.0","event_id":"sha256:00c3c5bf351ed12ed58ec4f87762f8b17b3e86b0cb2f43890cec992cbf7d017e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/52IGHM4VOCP357G3DHHHJNTUD5/bundle.json","state_url":"https://pith.science/pith/52IGHM4VOCP357G3DHHHJNTUD5/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/52IGHM4VOCP357G3DHHHJNTUD5/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T09:31:25Z","links":{"resolver":"https://pith.science/pith/52IGHM4VOCP357G3DHHHJNTUD5","bundle":"https://pith.science/pith/52IGHM4VOCP357G3DHHHJNTUD5/bundle.json","state":"https://pith.science/pith/52IGHM4VOCP357G3DHHHJNTUD5/state.json","well_known_bundle":"https://pith.science/.well-known/pith/52IGHM4VOCP357G3DHHHJNTUD5/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:52IGHM4VOCP357G3DHHHJNTUD5","merge_version":"pith-open-graph-merge-v1","event_count":3,"valid_event_count":3,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"da6e7a52ec028f434af6eacf5bc284c1aeca146c4ef803fe4943992bcb0e6bbf","cross_cats_sorted":["cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-13T12:52:35Z","title_canon_sha256":"c82ab882d0584c2c20c679ca7d122672c6f39060a2fb4e46a4b0b079142ba6c0"},"schema_version":"1.0","source":{"id":"2605.13918","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.13918","created_at":"2026-05-17T23:39:18Z"},{"alias_kind":"arxiv_version","alias_value":"2605.13918v1","created_at":"2026-05-17T23:39:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.13918","created_at":"2026-05-17T23:39:18Z"},{"alias_kind":"pith_short_12","alias_value":"52IGHM4VOCP3","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"52IGHM4VOCP357G3","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"52IGHM4V","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:49960b2af7c0817cad44422e3b2ce77aededc7f666798fcc46705071393e544a","target":"graph","created_at":"2026-05-17T23:39:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"Our results show that incorporating code signals like the call stack enables more effective and targeted game testing."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"That the call stack can be extracted efficiently and that its addition to the observation space produces a genuine policy improvement rather than an artifact of the specific environments or reward design."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"CA2 integrates call stack information into RL agents for game testing and shows consistent gains over baselines that ignore code signals."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"Reinforcement learning agents that observe call stack traces test games more effectively than agents limited to game state alone."}],"snapshot_sha256":"c59a26ef9101858973497123b842fdd709147c5d1a471a85372062bd04fc6cb1"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Automated game testing is important for verifying game functionality, but it remains a costly and time-consuming process. Manual testing often misses edge cases, and current automated methods struggle to provide full code coverage. Prior work has explored reinforcement learning (RL) for game testing, but without leveraging internal code signals such as the call stack. We present Code Aware Agent (CA2), which uses call stack information to learn effective testing strategies. The agent receives the current function call trace along with the game state and learns to reach specific target function","authors_text":"David Meger, Joshua Romoff, Valliappan Chidambaram Adaikkappan, Vincent Martineau","cross_cats":["cs.LG"],"headline":"Reinforcement learning agents that observe call stack traces test games more effectively than agents limited to game state alone.","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-13T12:52:35Z","title":"CA2: Code-Aware Agent for Automated Game Testing"},"references":{"count":33,"internal_anchors":9,"resolved_work":33,"sample":[{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":1,"title":"C. Politowski, F. Petrillo, and Y.-G. Guéhéneuc.A Survey of Video Game Testing. 2021. arXiv:2103.06431 [cs.SE].url:https://arxiv.org/abs/2103.06431","work_id":"17cd638a-68fb-40df-b62c-b10fc1b41d5e","year":2021},{"cited_arxiv_id":"","doi":"10.1109/cog57401.2023.10333194","is_internal_anchor":false,"ref_index":2,"title":"Technical Challenges of Deploying Reinforcement Learning Agents for Game Testing in AAA Games","work_id":"a8a2d7d2-80c8-410e-9264-02bd8ec3d61e","year":2023},{"cited_arxiv_id":"1312.5602","doi":"","is_internal_anchor":true,"ref_index":3,"title":"Playing Atari with Deep Reinforcement Learning","work_id":"736a8ddf-e365-4940-ad58-4699fddedb86","year":2013},{"cited_arxiv_id":"2301.04104","doi":"","is_internal_anchor":true,"ref_index":4,"title":"Mastering Diverse Domains through World Models","work_id":"6aeb260f-8c7c-4f9c-b98b-067cd7c59acd","year":2024},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":5,"title":"C. Gordillo, J. Bergdahl, K. Tollmar, and L. Gisslén.Improving Playtesting Coverage via Curiosity Driven Reinforcement Learning Agents. 2021. arXiv:2103 . 13798 [cs.LG].url: https://arxiv.org/abs/2103","work_id":"127e40d8-f3d5-417a-844d-8d63e4f1471a","year":2021}],"snapshot_sha256":"110f0ea419bcc2636c0928a4941cd41fd0781aaf9b950cf6b381a5af1d42e5f6"},"source":{"id":"2605.13918","kind":"arxiv","version":1},"verdict":{"created_at":"2026-05-15T05:49:50.226940Z","id":"e653964a-7b81-41a9-bfc9-995889f7a68c","model_set":{"reader":"grok-4.3"},"one_line_summary":"CA2 integrates call stack information into RL agents for game testing and shows consistent gains over baselines that ignore code signals.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"Reinforcement learning agents that observe call stack traces test games more effectively than agents limited to game state alone.","strongest_claim":"Our results show that incorporating code signals like the call stack enables more effective and targeted game testing.","weakest_assumption":"That the call stack can be extracted efficiently and that its addition to the observation space produces a genuine policy improvement rather than an artifact of the specific environments or reward design."}},"verdict_id":"e653964a-7b81-41a9-bfc9-995889f7a68c"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:9eba973b3054c9db89e85729992b7d966889169f63339e4e139c433eb12635a4","target":"record","created_at":"2026-05-17T23:39:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"da6e7a52ec028f434af6eacf5bc284c1aeca146c4ef803fe4943992bcb0e6bbf","cross_cats_sorted":["cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-13T12:52:35Z","title_canon_sha256":"c82ab882d0584c2c20c679ca7d122672c6f39060a2fb4e46a4b0b079142ba6c0"},"schema_version":"1.0","source":{"id":"2605.13918","kind":"arxiv","version":1}},"canonical_sha256":"ee9063b395709fbefcdb19ce74b6741f5efa8d1e0a944eff7bed2d991b74ae38","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"ee9063b395709fbefcdb19ce74b6741f5efa8d1e0a944eff7bed2d991b74ae38","first_computed_at":"2026-05-17T23:39:18.726467Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:39:18.726467Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"fmFwEepPj3d3C9FLWulaWqp8KIFs0yivZmT2QOv3Hn3TWhyinG+B9IfhLe/Ky3mj9p7xGfVx+t8vtD9l9LAZCw==","signature_status":"signed_v1","signed_at":"2026-05-17T23:39:18.727155Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.13918","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:9eba973b3054c9db89e85729992b7d966889169f63339e4e139c433eb12635a4","sha256:49960b2af7c0817cad44422e3b2ce77aededc7f666798fcc46705071393e544a","sha256:00c3c5bf351ed12ed58ec4f87762f8b17b3e86b0cb2f43890cec992cbf7d017e"],"state_sha256":"28ac4084c2f7513a07c9096ce30fd41f41ecc3ef36866f4e8358a601838d707d"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"e2LG/edbv2MOTQ+EbzhWrD67KXsqhWQBam3oxvYFvi5zVYSwmbFPGW/ti8H5Ke6YI2fWYcubKXjiA648EpWnDA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T09:31:25.952711Z","bundle_sha256":"ad584418431edec44f2861fe4bf4a282c3b2becae99f57ecc1f508c05a277338"}}