{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:EVMVJGMCU5XAGTYTNMMNE7UG5L","short_pith_number":"pith:EVMVJGMC","canonical_record":{"source":{"id":"2605.15097","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T17:16:11Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"4f70bacdef37437ab92854e06dcfcaf4c9a80b04fa696d367f6942e3f6575df9","abstract_canon_sha256":"84accd98470e101c483a13fb0f5ea76bb86ef4fc104bdc15ebb196ed2a7f717d"},"schema_version":"1.0"},"canonical_sha256":"2559549982a76e034f136b18d27e86eaf504955dd7acd86b866742f8cf44647f","source":{"kind":"arxiv","id":"2605.15097","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.15097","created_at":"2026-05-17T21:18:33Z"},{"alias_kind":"arxiv_version","alias_value":"2605.15097v1","created_at":"2026-05-17T21:18:33Z"},{"alias_kind":"pith_short_12","alias_value":"EVMVJGMCU5XA","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"EVMVJGMCU5XAGTYT","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"EVMVJGMC","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:EVMVJGMCU5XAGTYTNMMNE7UG5L","target":"record","payload":{"canonical_record":{"source":{"id":"2605.15097","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T17:16:11Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"4f70bacdef37437ab92854e06dcfcaf4c9a80b04fa696d367f6942e3f6575df9","abstract_canon_sha256":"84accd98470e101c483a13fb0f5ea76bb86ef4fc104bdc15ebb196ed2a7f717d"},"schema_version":"1.0"},"canonical_sha256":"2559549982a76e034f136b18d27e86eaf504955dd7acd86b866742f8cf44647f","receipt":{"kind":"pith_receipt","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.2","canonical_sha256":"2559549982a76e034f136b18d27e86eaf504955dd7acd86b866742f8cf44647f","last_reissued_at":"2026-05-17T21:57:19.180479Z","signature_status":"unsigned_v0","first_computed_at":"2026-05-17T21:40:25.851786Z"},"source_kind":"arxiv","source_id":"2605.15097","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T21:18:33Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pUi592rFCH30gXnqDCJntjdu2iAkPYDTmFwuEl0ZjG/VPoJDMrRTtKY8qdNHkQ5uVUMFU9VWkzwkRhVNLXPYAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T19:00:22.011023Z"},"content_sha256":"78d125a6b48f45a8cfcf0f45515bd333c06aa878dc1bf58ff40ff5d304b2e4d4","schema_version":"1.0","event_id":"sha256:78d125a6b48f45a8cfcf0f45515bd333c06aa878dc1bf58ff40ff5d304b2e4d4"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:EVMVJGMCU5XAGTYTNMMNE7UG5L","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Veritas: A Semantically Grounded Agentic Framework for Memory Corruption Vulnerability Detection in Binaries","license":"http://creativecommons.org/licenses/by/4.0/","headline":"Veritas detects memory corruption in stripped binaries by grounding LLM reasoning in reconstructed value flows and runtime validation.","cross_cats":["cs.CR"],"primary_cat":"cs.SE","authors_text":"Alfredo Pesoli, Lorenzo Cavallaro, Marco Valleri, Suman Jana, Xinran Zheng","submitted_at":"2026-05-14T17:16:11Z","abstract_excerpt":"Detecting memory corruption vulnerabilities in stripped binaries requires recovering object semantics, interprocedural propagation, and feasible triggers from low-level, lossy representations. Recent LLM-based approaches improve code understanding, but reliable detection still requires grounding in memory-relevant semantics and runtime feasibility evidence. We present Veritas, a semantically grounded framework for binary memory corruption vulnerability detection. Veritas combines a static slicer over RetDec-lifted LLVM IR, a dual-view LLM detector that reasons step by step over grounded flows "},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"Veritas achieves 90% recall on a curated benchmark of real-world binary vulnerability cases, produces no false positives on an exhaustive validation of 623 detector candidates, identifies only two false positives in a larger audit, and discovered a previously unknown Apple vulnerability that was confirmed and assigned a CVE.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"The static slicer over RetDec-lifted LLVM IR can reliably reconstruct value-flow relations, object semantics, and interprocedural propagation from lossy stripped binaries without missing critical paths or introducing semantic mismatches that would invalidate downstream LLM reasoning.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"Veritas detects memory corruption vulnerabilities in stripped binaries by combining static value-flow slicing, dual-view LLM reasoning, and multi-agent runtime validation, reporting 90% recall, zero false positives on 623 exhaustive cases, and discovery of a real Apple CVE.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"Veritas detects memory corruption in stripped binaries by grounding LLM reasoning in reconstructed value flows and runtime validation.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"7f631a3b21fa163be626151579a2917d8c8903269f36efd58698f7f45258b12f"},"source":{"id":"2605.15097","kind":"arxiv","version":1},"verdict":{"id":"be90cac4-1aa0-44bb-ae2e-ddf87f9f81c2","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-15T13:57:29.593973Z","strongest_claim":"Veritas achieves 90% recall on a curated benchmark of real-world binary vulnerability cases, produces no false positives on an exhaustive validation of 623 detector candidates, identifies only two false positives in a larger audit, and discovered a previously unknown Apple vulnerability that was confirmed and assigned a CVE.","one_line_summary":"Veritas detects memory corruption vulnerabilities in stripped binaries by combining static value-flow slicing, dual-view LLM reasoning, and multi-agent runtime validation, reporting 90% recall, zero false positives on 623 exhaustive cases, and discovery of a real Apple CVE.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"The static slicer over RetDec-lifted LLVM IR can reliably reconstruct value-flow relations, object semantics, and interprocedural propagation from lossy stripped binaries without missing critical paths or introducing semantic mismatches that would invalidate downstream LLM reasoning.","pith_extraction_headline":"Veritas detects memory corruption in stripped binaries by grounding LLM reasoning in reconstructed value flows and runtime validation."},"references":{"count":60,"sample":[{"doi":"","year":2025,"title":"0xdea. 2025. semgrep-rules. https://github.com/0xdea/semgrep-rules. [Online; accessed 29-Jan-2025]","work_id":"83e5429d-550f-4fb3-a2fb-2365715f2810","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":null,"title":"Talor Abramovich, Meet Udeshi, Minghao Shao, Kilian Lieret, Haoran Xi, Kim- berly Milner, Sofija Jancheska, John Yang, Carlos E Jimenez, Farshad Khorrami, et al. [n. d.]. EnIGMA: Interactive Tools Sub","work_id":"1726d905-cff9-4a08-a21d-3e93f708c634","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2024,"title":"Jimenez, Farshad Khorrami, Prashanth Krishnamurthy, Brendan Dolan-Gavitt, Muhammad Shafique, Karthik Narasimhan, Ramesh Karri, and Ofir Press","work_id":"4b1b0dec-1561-43a4-8302-ab9120d831bf","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2023,"title":"AFL++ Team. 2023. AFL++: Combining Incremental Steps of Fuzzing Research. https://github.com/AFLplusplus/AFLplusplus. Accessed: 2026-01-20","work_id":"3dbb5e11-3282-460f-9996-cb6be4b6daac","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2026,"title":"Anthropic. [n. d.]. Claude Code Overview. https://code.claude.com/docs/en/ overview. Claude Code Docs, accessed April 6, 2026","work_id":"ad9dc128-5160-4335-8c5e-9ee8783c9bbe","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":60,"snapshot_sha256":"206f9a8b6aa8e28eb9ce4e4ee617ee3f51502b4bfa1ebe6770f6a74578ccec54","internal_anchors":1},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"be90cac4-1aa0-44bb-ae2e-ddf87f9f81c2"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T21:57:19Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"7RvYX3+IEG3VutlM3/RMMzUSgGgMA9pVbM43ptH16DhvGbLmPMsbLYhQKQgiS50cvjSsBes2JANAJ3UsN34PCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T19:00:22.011571Z"},"content_sha256":"b0aea91138892e645642db280b39656e12bd504c68c45104ae7a75c444de5f70","schema_version":"1.0","event_id":"sha256:b0aea91138892e645642db280b39656e12bd504c68c45104ae7a75c444de5f70"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/EVMVJGMCU5XAGTYTNMMNE7UG5L/bundle.json","state_url":"https://pith.science/pith/EVMVJGMCU5XAGTYTNMMNE7UG5L/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/EVMVJGMCU5XAGTYTNMMNE7UG5L/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T19:00:22Z","links":{"resolver":"https://pith.science/pith/EVMVJGMCU5XAGTYTNMMNE7UG5L","bundle":"https://pith.science/pith/EVMVJGMCU5XAGTYTNMMNE7UG5L/bundle.json","state":"https://pith.science/pith/EVMVJGMCU5XAGTYTNMMNE7UG5L/state.json","well_known_bundle":"https://pith.science/.well-known/pith/EVMVJGMCU5XAGTYTNMMNE7UG5L/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:EVMVJGMCU5XAGTYTNMMNE7UG5L","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"84accd98470e101c483a13fb0f5ea76bb86ef4fc104bdc15ebb196ed2a7f717d","cross_cats_sorted":["cs.CR"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T17:16:11Z","title_canon_sha256":"4f70bacdef37437ab92854e06dcfcaf4c9a80b04fa696d367f6942e3f6575df9"},"schema_version":"1.0","source":{"id":"2605.15097","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.15097","created_at":"2026-05-17T21:18:33Z"},{"alias_kind":"arxiv_version","alias_value":"2605.15097v1","created_at":"2026-05-17T21:18:33Z"},{"alias_kind":"pith_short_12","alias_value":"EVMVJGMCU5XA","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"EVMVJGMCU5XAGTYT","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"EVMVJGMC","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:b0aea91138892e645642db280b39656e12bd504c68c45104ae7a75c444de5f70","target":"graph","created_at":"2026-05-17T21:57:19Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"Veritas achieves 90% recall on a curated benchmark of real-world binary vulnerability cases, produces no false positives on an exhaustive validation of 623 detector candidates, identifies only two false positives in a larger audit, and discovered a previously unknown Apple vulnerability that was confirmed and assigned a CVE."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"The static slicer over RetDec-lifted LLVM IR can reliably reconstruct value-flow relations, object semantics, and interprocedural propagation from lossy stripped binaries without missing critical paths or introducing semantic mismatches that would invalidate downstream LLM reasoning."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"Veritas detects memory corruption vulnerabilities in stripped binaries by combining static value-flow slicing, dual-view LLM reasoning, and multi-agent runtime validation, reporting 90% recall, zero false positives on 623 exhaustive cases, and discovery of a real Apple CVE."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"Veritas detects memory corruption in stripped binaries by grounding LLM reasoning in reconstructed value flows and runtime validation."}],"snapshot_sha256":"7f631a3b21fa163be626151579a2917d8c8903269f36efd58698f7f45258b12f"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Detecting memory corruption vulnerabilities in stripped binaries requires recovering object semantics, interprocedural propagation, and feasible triggers from low-level, lossy representations. Recent LLM-based approaches improve code understanding, but reliable detection still requires grounding in memory-relevant semantics and runtime feasibility evidence. We present Veritas, a semantically grounded framework for binary memory corruption vulnerability detection. Veritas combines a static slicer over RetDec-lifted LLVM IR, a dual-view LLM detector that reasons step by step over grounded flows ","authors_text":"Alfredo Pesoli, Lorenzo Cavallaro, Marco Valleri, Suman Jana, Xinran Zheng","cross_cats":["cs.CR"],"headline":"Veritas detects memory corruption in stripped binaries by grounding LLM reasoning in reconstructed value flows and runtime validation.","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T17:16:11Z","title":"Veritas: A Semantically Grounded Agentic Framework for Memory Corruption Vulnerability Detection in Binaries"},"references":{"count":60,"internal_anchors":1,"resolved_work":60,"sample":[{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":1,"title":"0xdea. 2025. semgrep-rules. https://github.com/0xdea/semgrep-rules. [Online; accessed 29-Jan-2025]","work_id":"83e5429d-550f-4fb3-a2fb-2365715f2810","year":2025},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":2,"title":"Talor Abramovich, Meet Udeshi, Minghao Shao, Kilian Lieret, Haoran Xi, Kim- berly Milner, Sofija Jancheska, John Yang, Carlos E Jimenez, Farshad Khorrami, et al. [n. d.]. EnIGMA: Interactive Tools Sub","work_id":"1726d905-cff9-4a08-a21d-3e93f708c634","year":null},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":3,"title":"Jimenez, Farshad Khorrami, Prashanth Krishnamurthy, Brendan Dolan-Gavitt, Muhammad Shafique, Karthik Narasimhan, Ramesh Karri, and Ofir Press","work_id":"4b1b0dec-1561-43a4-8302-ab9120d831bf","year":2024},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":4,"title":"AFL++ Team. 2023. AFL++: Combining Incremental Steps of Fuzzing Research. https://github.com/AFLplusplus/AFLplusplus. Accessed: 2026-01-20","work_id":"3dbb5e11-3282-460f-9996-cb6be4b6daac","year":2023},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":5,"title":"Anthropic. [n. d.]. Claude Code Overview. https://code.claude.com/docs/en/ overview. Claude Code Docs, accessed April 6, 2026","work_id":"ad9dc128-5160-4335-8c5e-9ee8783c9bbe","year":2026}],"snapshot_sha256":"206f9a8b6aa8e28eb9ce4e4ee617ee3f51502b4bfa1ebe6770f6a74578ccec54"},"source":{"id":"2605.15097","kind":"arxiv","version":1},"verdict":{"created_at":"2026-05-15T13:57:29.593973Z","id":"be90cac4-1aa0-44bb-ae2e-ddf87f9f81c2","model_set":{"reader":"grok-4.3"},"one_line_summary":"Veritas detects memory corruption vulnerabilities in stripped binaries by combining static value-flow slicing, dual-view LLM reasoning, and multi-agent runtime validation, reporting 90% recall, zero false positives on 623 exhaustive cases, and discovery of a real Apple CVE.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"Veritas detects memory corruption in stripped binaries by grounding LLM reasoning in reconstructed value flows and runtime validation.","strongest_claim":"Veritas achieves 90% recall on a curated benchmark of real-world binary vulnerability cases, produces no false positives on an exhaustive validation of 623 detector candidates, identifies only two false positives in a larger audit, and discovered a previously unknown Apple vulnerability that was confirmed and assigned a CVE.","weakest_assumption":"The static slicer over RetDec-lifted LLVM IR can reliably reconstruct value-flow relations, object semantics, and interprocedural propagation from lossy stripped binaries without missing critical paths or introducing semantic mismatches that would invalidate downstream LLM reasoning."}},"verdict_id":"be90cac4-1aa0-44bb-ae2e-ddf87f9f81c2"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:78d125a6b48f45a8cfcf0f45515bd333c06aa878dc1bf58ff40ff5d304b2e4d4","target":"record","created_at":"2026-05-17T21:18:33Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"84accd98470e101c483a13fb0f5ea76bb86ef4fc104bdc15ebb196ed2a7f717d","cross_cats_sorted":["cs.CR"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T17:16:11Z","title_canon_sha256":"4f70bacdef37437ab92854e06dcfcaf4c9a80b04fa696d367f6942e3f6575df9"},"schema_version":"1.0","source":{"id":"2605.15097","kind":"arxiv","version":1}},"canonical_sha256":"2559549982a76e034f136b18d27e86eaf504955dd7acd86b866742f8cf44647f","receipt":{"builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"2559549982a76e034f136b18d27e86eaf504955dd7acd86b866742f8cf44647f","first_computed_at":"2026-05-17T21:40:25.851786Z","kind":"pith_receipt","last_reissued_at":"2026-05-17T21:57:19.180479Z","receipt_version":"0.2","signature_status":"unsigned_v0"},"source_id":"2605.15097","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:78d125a6b48f45a8cfcf0f45515bd333c06aa878dc1bf58ff40ff5d304b2e4d4","sha256:b0aea91138892e645642db280b39656e12bd504c68c45104ae7a75c444de5f70"],"state_sha256":"ae5147580872998c704653d47feb37f5cc1aef229f584ba161b73c0291283e6a"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"fMj67dJKkU2BbdhwXPksMI4oH2Jt17+8mlVgAQIjgMkB7ajPx/rVgJRBYRNZIAxHmFQWHS2uf9AL9qR1SMl/DA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T19:00:22.013985Z","bundle_sha256":"216ac5d42aad4f403cbf0d6eb51dfcecaa8eb8eea5240faf967ae38e36f9a48b"}}