What a period audit looks like for a PoE deployment.
A third-party audit against Rhodes & Kang (2026) doesn’t audit processes; it audits attestations. The five safety invariants, the two operational constraints, and the cryptographic integrity of the sealed event stream are each directly testable from the trace — sampling is for population coverage, not for evidence availability. The report below is a sample for a hypothetical tenant.
Proof-of-Execution Compliance Audit Report
1Engagement & Scope
2Executive Summary — Key Metrics
3Methodology & Procedures
Population sampling (90 days)
| Stratum | Population | Sample | Coverage |
|---|---|---|---|
| Interactive queries (read-only) | 3,842,177 | 400 | 0.010% |
| Trading execution writes | 218,440 | 218,440 | 100.000% |
| Batch / scheduled jobs | 62,109 | 240 | 0.386% |
| Privileged / admin actions | 5,783 | 5,783 | 100.000% |
| Total | 4,128,509 | 224,863 | 5.45% |
Verification procedures V1–V5
- V1 — Contract Hash Attestation. Sampled EACs; recomputed H(C) and matched against eac.contract_id.
- V2 — Causal Chain Integrity. Recomputed SHA-256 Merkle roots over event streams T.
- V3 — Envelope Closure. Deterministic replay against R; bit-equality assertion on output.
- V4 — Key Provenance. Verified Gateway (Kgw) and Recorder (Krec) certificates against Key Registry.
- V5 — Policy Snapshot. Reconciled policy digests against version-controlled source-of-truth.
4Safety Invariants — Test Results
5Operational Constraints — O1–O2
Cost dimension roll-up
| Cost Dimension | Period Total | % of Spend | Budget Util. | Monotonic |
|---|---|---|---|---|
| LLM tokens | $54,128.17 | 61.6% | 72.4% | ✓ |
| External API (USD) | $17,402.88 | 19.8% | 55.1% | ✓ |
| Tool invocations | $9,418.20 | 10.7% | 41.0% | ✓ |
| Compute-seconds | $3,914.05 | 4.5% | 33.2% | ✓ |
| Storage (GB-month) | $1,822.40 | 2.1% | 22.6% | ✓ |
| Risk units | $987.18 | 1.1% | 81.4% | ✓ |
| Compliance overhead | $240.36 | 0.27% | fixed | ✓ |
| Total | $87,913.24 | 100% | — | ✓ |
6Findings & Corrective Action
7Cryptographic Integrity Verification
8Auditor’s Opinion & Sign-off
Based on procedures performed and evidence obtained, and subject to the findings documented in §6, we express an unqualified opinionthat the Proof-of-Execution attestations issued by the Auditee’s Prime Execution Model during the audit period fairly present compliance of each execution with the invariants (I1–I5a) and operational constraints (O1–O2) specified in Rhodes & Kang (2026) in all material respects.
kid: auditor-erh-2026-04 · ts: 2026-04-24T16:00:00Z
kid: auditor-mjk-2026-04 · ts: 2026-04-24T16:00:00Z
Three things a PoE audit does that a SOC 2 does not.
A traditional controls audit samples processes and documents them. A PoE audit samples executions and verifies them. Three differences are load-bearing.
Attestations, not interviews.
V1–V5 are direct verifications against the sealed trace: contract-hash attestation, Merkle-root recomputation, deterministic replay, key-provenance check, policy-snapshot reconciliation. The auditor reads from the stream; the auditee doesn’t explain.
100% on risky strata.
Interactive reads can be sampled. Effectful writes (trading, privileged admin) are verified at 100%. Because verification is mechanical, coverage is a capacity decision, not a methodology decision.
ECS is one number.
The Execution Compliance Score composes invariant pass rates, operational-constraint adherence, and deployment-failure observations into a single normalized number per period. The board slide is one line.
Want to see what your period report would look like?
The research briefing walks through the V1–V5 procedures against sample traces from your environment — the exact verifications an external auditor would run.