{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:M3QSQLEWIVASO2HZ4FC6ZTNR5U","short_pith_number":"pith:M3QSQLEW","canonical_record":{"source":{"id":"2605.20788","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-20T06:34:22Z","cross_cats_sorted":[],"title_canon_sha256":"021c18d99b4e85af022f2bcb0a6655a1e2c9cbb392a8180815a554b082d4d0da","abstract_canon_sha256":"b04e5ff04bf1b47a6f30ee566fdbc91e054314e24cd26a94f6225e70df864005"},"schema_version":"1.0"},"canonical_sha256":"66e1282c9645412768f9e145eccdb1ed071968adba38e34777f4977f6807e01a","source":{"kind":"arxiv","id":"2605.20788","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20788","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20788v1","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20788","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"pith_short_12","alias_value":"M3QSQLEWIVAS","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"pith_short_16","alias_value":"M3QSQLEWIVASO2HZ","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"pith_short_8","alias_value":"M3QSQLEW","created_at":"2026-05-21T01:04:54Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:M3QSQLEWIVASO2HZ4FC6ZTNR5U","target":"record","payload":{"canonical_record":{"source":{"id":"2605.20788","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-20T06:34:22Z","cross_cats_sorted":[],"title_canon_sha256":"021c18d99b4e85af022f2bcb0a6655a1e2c9cbb392a8180815a554b082d4d0da","abstract_canon_sha256":"b04e5ff04bf1b47a6f30ee566fdbc91e054314e24cd26a94f6225e70df864005"},"schema_version":"1.0"},"canonical_sha256":"66e1282c9645412768f9e145eccdb1ed071968adba38e34777f4977f6807e01a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-21T01:04:54.443200Z","signature_b64":"4ZwaZIQtpF2gVSmTccA8rgHFUCxtr94+ldRk6y7suztnJeb37YDMgNT0D4Y8uPhWxmWuP1yNLlE/9M9w79ISDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"66e1282c9645412768f9e145eccdb1ed071968adba38e34777f4977f6807e01a","last_reissued_at":"2026-05-21T01:04:54.442383Z","signature_status":"signed_v1","first_computed_at":"2026-05-21T01:04:54.442383Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.20788","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:04:54Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"gbHeL5XT/Y6Dj3jywr8vD4X1ytN2HOv1aIiA6L4HA3SaddowStLjH78UfRZY3y7qctfYojk2chWTOl+MwStsBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T16:08:44.758051Z"},"content_sha256":"849f3e95314568a34b11d5d7f7f8f2ddb0ab769690148e38d48e5c0defc7ad1e","schema_version":"1.0","event_id":"sha256:849f3e95314568a34b11d5d7f7f8f2ddb0ab769690148e38d48e5c0defc7ad1e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:M3QSQLEWIVASO2HZ4FC6ZTNR5U","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"BioDefect: The First Dataset for Defect Detection in Bioinformatics Software","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SE","authors_text":"Hangyu Cheng, Jiayin Wang, Tianxiang Xu, Xiaoyan Zhu, Xin Lai, Xin Lian","submitted_at":"2026-05-20T06:34:22Z","abstract_excerpt":"Software defect detection is a critical task in software engineering. However, no prior studies have specifically addressed defect detection in bioinformatics software. Given that the performance of defect detection tasks is primarily influenced by both models and datasets, our experiments controlled for model-related factors and confirmed the limitations of existing datasets in bioinformatics software. To address this issue, we introduce BioDefect, the first dataset specifically designed for defect detection in bioinformatics software, aiming to overcome the limitations of existing datasets i"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20788","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.20788/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:04:54Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"s/JXS7ASEcnsSaYJnUqW8G2jbCEm6bta9bGdRgmOlkj6qdo+j9bSIkaLOCLxqt8CUfxsJay7dvCY1lkrA765CQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T16:08:44.758766Z"},"content_sha256":"786f8e38e536245d66b5ceabdacf073cfccebdac3cd19798fe0438e03b24edd4","schema_version":"1.0","event_id":"sha256:786f8e38e536245d66b5ceabdacf073cfccebdac3cd19798fe0438e03b24edd4"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/M3QSQLEWIVASO2HZ4FC6ZTNR5U/bundle.json","state_url":"https://pith.science/pith/M3QSQLEWIVASO2HZ4FC6ZTNR5U/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/M3QSQLEWIVASO2HZ4FC6ZTNR5U/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T16:08:44Z","links":{"resolver":"https://pith.science/pith/M3QSQLEWIVASO2HZ4FC6ZTNR5U","bundle":"https://pith.science/pith/M3QSQLEWIVASO2HZ4FC6ZTNR5U/bundle.json","state":"https://pith.science/pith/M3QSQLEWIVASO2HZ4FC6ZTNR5U/state.json","well_known_bundle":"https://pith.science/.well-known/pith/M3QSQLEWIVASO2HZ4FC6ZTNR5U/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:M3QSQLEWIVASO2HZ4FC6ZTNR5U","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"b04e5ff04bf1b47a6f30ee566fdbc91e054314e24cd26a94f6225e70df864005","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-20T06:34:22Z","title_canon_sha256":"021c18d99b4e85af022f2bcb0a6655a1e2c9cbb392a8180815a554b082d4d0da"},"schema_version":"1.0","source":{"id":"2605.20788","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20788","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20788v1","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20788","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"pith_short_12","alias_value":"M3QSQLEWIVAS","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"pith_short_16","alias_value":"M3QSQLEWIVASO2HZ","created_at":"2026-05-21T01:04:54Z"},{"alias_kind":"pith_short_8","alias_value":"M3QSQLEW","created_at":"2026-05-21T01:04:54Z"}],"graph_snapshots":[{"event_id":"sha256:786f8e38e536245d66b5ceabdacf073cfccebdac3cd19798fe0438e03b24edd4","target":"graph","created_at":"2026-05-21T01:04:54Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2605.20788/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Software defect detection is a critical task in software engineering. However, no prior studies have specifically addressed defect detection in bioinformatics software. Given that the performance of defect detection tasks is primarily influenced by both models and datasets, our experiments controlled for model-related factors and confirmed the limitations of existing datasets in bioinformatics software. To address this issue, we introduce BioDefect, the first dataset specifically designed for defect detection in bioinformatics software, aiming to overcome the limitations of existing datasets i","authors_text":"Hangyu Cheng, Jiayin Wang, Tianxiang Xu, Xiaoyan Zhu, Xin Lai, Xin Lian","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-20T06:34:22Z","title":"BioDefect: The First Dataset for Defect Detection in Bioinformatics Software"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20788","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:849f3e95314568a34b11d5d7f7f8f2ddb0ab769690148e38d48e5c0defc7ad1e","target":"record","created_at":"2026-05-21T01:04:54Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"b04e5ff04bf1b47a6f30ee566fdbc91e054314e24cd26a94f6225e70df864005","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-20T06:34:22Z","title_canon_sha256":"021c18d99b4e85af022f2bcb0a6655a1e2c9cbb392a8180815a554b082d4d0da"},"schema_version":"1.0","source":{"id":"2605.20788","kind":"arxiv","version":1}},"canonical_sha256":"66e1282c9645412768f9e145eccdb1ed071968adba38e34777f4977f6807e01a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"66e1282c9645412768f9e145eccdb1ed071968adba38e34777f4977f6807e01a","first_computed_at":"2026-05-21T01:04:54.442383Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-21T01:04:54.442383Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"4ZwaZIQtpF2gVSmTccA8rgHFUCxtr94+ldRk6y7suztnJeb37YDMgNT0D4Y8uPhWxmWuP1yNLlE/9M9w79ISDw==","signature_status":"signed_v1","signed_at":"2026-05-21T01:04:54.443200Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.20788","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:849f3e95314568a34b11d5d7f7f8f2ddb0ab769690148e38d48e5c0defc7ad1e","sha256:786f8e38e536245d66b5ceabdacf073cfccebdac3cd19798fe0438e03b24edd4"],"state_sha256":"4ae1a9588867fb52e57f8be10e559b68ddbe7d5fe0e42302f2a7e1a1495bd0d3"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Cddukdqy2T+idehA0n3ELLY0e1zr61Ufe2x97WMFW5O9MbaBHg6RKxhzT+M2QhABRxSE2yK0ABpwbVOIxuG6AA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T16:08:44.762180Z","bundle_sha256":"4fc8931e04c54711095c5ef7ad3ef58a67d82fd7d56f9f9b148cb33bdb6a14e9"}}