{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:CIHSYREYA42HDU23UST4B663LA","short_pith_number":"pith:CIHSYREY","canonical_record":{"source":{"id":"2605.21532","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2026-05-19T21:12:45Z","cross_cats_sorted":["cs.SE"],"title_canon_sha256":"7ede8c5036974381bb3d76f9951610622243fa69b96803d0636658c7d8fc542b","abstract_canon_sha256":"6b085d69a12d470725609cce75e3de6b58291a7b916686869c0706076bd9de38"},"schema_version":"1.0"},"canonical_sha256":"120f2c4498073471d35ba4a7c0fbdb580fc63a30f63a7d91e2248baf654664f2","source":{"kind":"arxiv","id":"2605.21532","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.21532","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"arxiv_version","alias_value":"2605.21532v1","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.21532","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"pith_short_12","alias_value":"CIHSYREYA42H","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"pith_short_16","alias_value":"CIHSYREYA42HDU23","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"pith_short_8","alias_value":"CIHSYREY","created_at":"2026-05-22T00:02:27Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:CIHSYREYA42HDU23UST4B663LA","target":"record","payload":{"canonical_record":{"source":{"id":"2605.21532","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2026-05-19T21:12:45Z","cross_cats_sorted":["cs.SE"],"title_canon_sha256":"7ede8c5036974381bb3d76f9951610622243fa69b96803d0636658c7d8fc542b","abstract_canon_sha256":"6b085d69a12d470725609cce75e3de6b58291a7b916686869c0706076bd9de38"},"schema_version":"1.0"},"canonical_sha256":"120f2c4498073471d35ba4a7c0fbdb580fc63a30f63a7d91e2248baf654664f2","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-22T00:02:27.797049Z","signature_b64":"7UuwMWh6OydL0vq4UpEzaMg20qHB79qX2KOyGd2VQzzcCu66AsbvwkZYPkVsCKe/3/NvBCsQJfvOXFkckLaBDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"120f2c4498073471d35ba4a7c0fbdb580fc63a30f63a7d91e2248baf654664f2","last_reissued_at":"2026-05-22T00:02:27.796565Z","signature_status":"signed_v1","first_computed_at":"2026-05-22T00:02:27.796565Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.21532","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-22T00:02:27Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Ji7QasqD+ohWv6VXbBw/gjfl2WG1rIf3guhCTdNY7+RdKrpSfGPukw5zhTljt1/5RodvPxb8v62Iv+1HwDYMAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T21:56:44.540018Z"},"content_sha256":"006f37284df265e78e7ce6954dafdedad35c12571c38ba797158b6309342bc4a","schema_version":"1.0","event_id":"sha256:006f37284df265e78e7ce6954dafdedad35c12571c38ba797158b6309342bc4a"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:CIHSYREYA42HDU23UST4B663LA","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Contract Based Verification of Non-functional Requirements for Embedded Automotive C Code","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.SE"],"primary_cat":"cs.PL","authors_text":"Jesper Amilon, Karl Palmskog, Mattias Nyberg, Merlijn Sevenhuijsen","submitted_at":"2026-05-19T21:12:45Z","abstract_excerpt":"Code contracts provide a robust way to specify functional requirements of safety-critical software in embedded systems. For example, the ANSI/ISO C Specification Language (ACSL) can be used to specify the functional behavior of C code that is then formally verified by the Frama-C framework's Wp plugin. However, non-functional requirements, such as restrictions on control flow and data flow, are also important for embedded systems safety. Untrusted code developed by subcontractors, junior developers, or generated by large language models, can be verified by Wp but may nevertheless call unsafe f"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.21532","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.21532/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-22T00:02:27Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"dASFpkSo+IaYOG40/l+mMh0DidNKde9lxr6BXiHVgh/V4ayR5srsb24SuGt0b3cXIwZuJsE6mLTjpM8P6xYoBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T21:56:44.540693Z"},"content_sha256":"73744d7d7e21c513d960e900bdad19d61ea44de6baa63d62cb9c88e8b489bf30","schema_version":"1.0","event_id":"sha256:73744d7d7e21c513d960e900bdad19d61ea44de6baa63d62cb9c88e8b489bf30"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:CIHSYREYA42HDU23UST4B663LA","target":"integrity","payload":{"note":"Identifier '10.5555/3692070.3692991' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Kambhampati, S., Valmeekam, K., Guan, L., Verma, M., Stechly, K., Bhambri, S., Saldyt, L., Murthy, A.: Position: LLMs can’t plan, but can help planning in LLM- modulo frameworks. In: International Conference on Machine Learning. ICML’24, JM","arxiv_id":"2605.21532","detector":"doi_compliance","evidence":{"doi":"10.5555/3692070.3692991","arxiv_id":null,"ref_index":22,"raw_excerpt":"Kambhampati, S., Valmeekam, K., Guan, L., Verma, M., Stechly, K., Bhambri, S., Saldyt, L., Murthy, A.: Position: LLMs can’t plan, but can help planning in LLM- modulo frameworks. In: International Conference on Machine Learning. ICML’24, JMLR.org (2024). https://doi.org/10.5555/3692070.3692991","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":22,"audited_at":"2026-05-22T01:11:08.067568Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/3692070.3692991","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"fd28e08a520489787a219f5975f50c358642e6ee6a99436bcb59a68e4972e89f","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":6129,"payload_sha256":"1cdcfe25d608ce14db32b75284c2f9f3376f59a186fe6d01ebbc64be72291b9a","signature_b64":"qhL8KEbKct37CNCIDIInqTkJpxkD38pOKuonLsZbnYT4e1SbRxdVc0hjC1ZgpQn4E2lq2hos4068XWI+7aBEAA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-22T01:15:20Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"rRFtpq4fjFufnw3XvyImtko5g0xZtsWz9uGQJNcWYccz7bQtcLXTCr9Az+Qeot7DWJyeW6qHAbWTPF1eUZorAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T21:56:44.542156Z"},"content_sha256":"ee4530d422ac3753054bdced5907261c56a496e8b9e4e642c7b47b82fe5d005e","schema_version":"1.0","event_id":"sha256:ee4530d422ac3753054bdced5907261c56a496e8b9e4e642c7b47b82fe5d005e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/CIHSYREYA42HDU23UST4B663LA/bundle.json","state_url":"https://pith.science/pith/CIHSYREYA42HDU23UST4B663LA/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/CIHSYREYA42HDU23UST4B663LA/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T21:56:44Z","links":{"resolver":"https://pith.science/pith/CIHSYREYA42HDU23UST4B663LA","bundle":"https://pith.science/pith/CIHSYREYA42HDU23UST4B663LA/bundle.json","state":"https://pith.science/pith/CIHSYREYA42HDU23UST4B663LA/state.json","well_known_bundle":"https://pith.science/.well-known/pith/CIHSYREYA42HDU23UST4B663LA/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:CIHSYREYA42HDU23UST4B663LA","merge_version":"pith-open-graph-merge-v1","event_count":3,"valid_event_count":3,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"6b085d69a12d470725609cce75e3de6b58291a7b916686869c0706076bd9de38","cross_cats_sorted":["cs.SE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2026-05-19T21:12:45Z","title_canon_sha256":"7ede8c5036974381bb3d76f9951610622243fa69b96803d0636658c7d8fc542b"},"schema_version":"1.0","source":{"id":"2605.21532","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.21532","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"arxiv_version","alias_value":"2605.21532v1","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.21532","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"pith_short_12","alias_value":"CIHSYREYA42H","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"pith_short_16","alias_value":"CIHSYREYA42HDU23","created_at":"2026-05-22T00:02:27Z"},{"alias_kind":"pith_short_8","alias_value":"CIHSYREY","created_at":"2026-05-22T00:02:27Z"}],"graph_snapshots":[{"event_id":"sha256:73744d7d7e21c513d960e900bdad19d61ea44de6baa63d62cb9c88e8b489bf30","target":"graph","created_at":"2026-05-22T00:02:27Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2605.21532/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Code contracts provide a robust way to specify functional requirements of safety-critical software in embedded systems. For example, the ANSI/ISO C Specification Language (ACSL) can be used to specify the functional behavior of C code that is then formally verified by the Frama-C framework's Wp plugin. However, non-functional requirements, such as restrictions on control flow and data flow, are also important for embedded systems safety. Untrusted code developed by subcontractors, junior developers, or generated by large language models, can be verified by Wp but may nevertheless call unsafe f","authors_text":"Jesper Amilon, Karl Palmskog, Mattias Nyberg, Merlijn Sevenhuijsen","cross_cats":["cs.SE"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2026-05-19T21:12:45Z","title":"Contract Based Verification of Non-functional Requirements for Embedded Automotive C Code"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.21532","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:006f37284df265e78e7ce6954dafdedad35c12571c38ba797158b6309342bc4a","target":"record","created_at":"2026-05-22T00:02:27Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"6b085d69a12d470725609cce75e3de6b58291a7b916686869c0706076bd9de38","cross_cats_sorted":["cs.SE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2026-05-19T21:12:45Z","title_canon_sha256":"7ede8c5036974381bb3d76f9951610622243fa69b96803d0636658c7d8fc542b"},"schema_version":"1.0","source":{"id":"2605.21532","kind":"arxiv","version":1}},"canonical_sha256":"120f2c4498073471d35ba4a7c0fbdb580fc63a30f63a7d91e2248baf654664f2","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"120f2c4498073471d35ba4a7c0fbdb580fc63a30f63a7d91e2248baf654664f2","first_computed_at":"2026-05-22T00:02:27.796565Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-22T00:02:27.796565Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"7UuwMWh6OydL0vq4UpEzaMg20qHB79qX2KOyGd2VQzzcCu66AsbvwkZYPkVsCKe/3/NvBCsQJfvOXFkckLaBDg==","signature_status":"signed_v1","signed_at":"2026-05-22T00:02:27.797049Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.21532","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:006f37284df265e78e7ce6954dafdedad35c12571c38ba797158b6309342bc4a","sha256:73744d7d7e21c513d960e900bdad19d61ea44de6baa63d62cb9c88e8b489bf30","sha256:ee4530d422ac3753054bdced5907261c56a496e8b9e4e642c7b47b82fe5d005e"],"state_sha256":"faf675d550b6ca4c33605b8b2f65e379ebad863b873c90af354d81f11dafb95b"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"z0ul00g745ZMYLItEEaK6LtSgnEAP2B7FqZLQoTMLrY8+tUg1MMGZreJ89E31yGdKWp7Ts4uqiTTAi18tPPwBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T21:56:44.546939Z","bundle_sha256":"eb83ab5c0fe0a5a8a8a7bb83380e5fd510ca5c77f58978613db6ed9845fa979c"}}