ProvenantProvenant
Verification infrastructure

Proof of real skill
in the AI era.

Provenant replaces resumes and staged assessments with verifiable, longitudinal evidence of how candidates actually think, build, and reason over time.

CANDIDATE-CONTROLLED · LOCAL-FIRST · SOURCE-VERIFIED

The problem

Every hiring signal is now a staged snapshot.

Resumes, coding tests, and personality assessments all assume the candidate works alone, under artificial conditions, for a fixed window. AI quietly broke that assumption — and the signals that depended on it.

01

Resumes

Self-reported proximity to expertise.

A third party attests to titles and dates — never to whether the underlying skill is real.

02

Coding interviews

Now measure prompting fluency, not depth.

With AI in the loop, timed coding snapshots no longer separate understanding from performance.

03

Personality tests

Weak, gameable, and detached from real work.

Marginally predictive at best, and increasingly challenged on bias and legal compliance.

Snapshots can be rehearsed. Longitudinal reasoning is much harder to fake.

Core insight

AI commoditized output. Demonstrated judgment became the scarce signal.

Anyone can generate a polished answer in seconds. Far fewer can steer intelligence toward something true — questioning assumptions, recognising a wrong turn, and recovering from it.

That capability is not visible in a single test. It surfaces across months of real work: in the questions asked, the errors caught, the tradeoffs made under pressure.

Reasoning trajectory
session · 0x4f…ec1
  1. Promptfirst attempt
  2. Refinementnarrowing scope
  3. Debuggingtracing a failure
  4. Correctionchallenging the model

    ↳ candidate questioned model output;
    recognised failure mode unprompted.

  5. Tradeoffarchitectural choice

    ↳ candidate questioned model output;
    recognised failure mode unprompted.

  6. Outcomedeployed
captured locally · committedverified
How it works

A three-stage, candidate-controlled pipeline.

The candidate's device is untrusted by design. Evidence is verified against third parties they do not control, and raw history never leaves their machine.

01

Extract & verify

The candidate's agent surfaces evidence. Provenant independently verifies each artifact at source — not on the candidate's machine.

  • Code, design & contribution history
  • Live deployments and shipped artifacts
  • Filings, registries, peer-reviewed work
  • Cryptographic provenance at capture
02

Longitudinal assessment

A neutral model assesses depth of reasoning across the verified history — mapped to the specific role and its requirements.

  • Reasoning depth across months
  • Debugging patterns under uncertainty
  • Architectural consistency over time
  • Learning trajectory and self-correction
03

Live adaptive defense

An adaptive examiner asks the candidate to extend and defend their own past reasoning — in real time.

  • Probes prior decisions, not new puzzles
  • Detects curated or generated profiles
  • Confirms the thinking is genuinely theirs
  • Outputs a single evidence-anchored score
Raw history remains candidate-controlled and processed locally.
Verification, end-to-end

How we know the history wasn’t fabricated.

A concrete walkthrough for a single engineer — the launch wedge. Every line is checked against a third party the candidate does not control, then committed to a tamper-evident root before assessment runs. The same model extends to any profession with externally verifiable evidence.

provenant.trace · cand:0x71a3…d4f · role:sec-eng
  1. 01
    github.com / {handle}

    Repository commits

    Commits cross-checked against external contributors and merge history — never just the candidate's self-attestation.

    commits384·repos12·span14 mo
    sig 0x9a4f…ec1
  2. 02
    pull-request discussions

    Review comments & decisions

    Review threads cross-referenced with reviewer accounts the candidate does not control.

    PRs47·comments211·reviewers19
    sig 0x4b2c…7a5
  3. 03
    live deployments

    Service endpoints

    Production URLs pinged at fixed addresses to confirm authorship and continuity.

    services6·regions3·uptime span31 mo
    sig 0xa8f1…d22
  4. 04
    npm · pypi · crates.io

    Package releases

    Publish events bound to candidate identity at the registry level.

    releases8·registries4·downloads412k
    sig 0x12be…99e
  5. 05
    reasoning history

    Timestamps & session integrity

    Conversation history committed in a tamper-evident merkle structure — cannot be backdated or rewritten.

    sessions183·span14 mo·rootm:7e3…b08
    root committed
  6. 06
    adaptive defense

    Authorship confirmed live

    Candidate is asked to extend and defend their own past reasoning in real time. A curated or generated profile cannot survive it.

    probes14·passed14·contradiction0%
    profile genuine
trace rootm:7e3…b08
verified by 4 independent registries·ready for assessment

A note on scope. Provenant verifies job-relevant demonstrated capability against artifacts the candidate has chosen to disclose. It is not a personality, culture-fit, or psychometric assessment.

Scope

Engineering today. Every verifiable profession next.

We launch where the artifacts are already API-accessible and structured at scale — engineering, in every discipline that produces public evidence. The same verification model extends to any profession whose work the world can independently check.

Expansion path
beachhead → universal
  1. Now
    Engineering

    Software, hardware, security, infrastructure, data — disciplines whose work already lives on the verifiable web.

  2. Next
    Law, Accounting & Finance

    Regulated professions where filings, signed reports, and registries make evidence externally checkable.

  3. Beyond
    Research, Design, Medicine

    Any profession that produces work the world can independently confirm.

The cryptographic verification primitives don’t change across professions — only the source registries do.

Sample evidence map

Engineering

· live

Software, hardware, security, infrastructure, data — wherever work produces externally verifiable artifacts.

contribution history
live deployments
package & design releases
peer review threads
01/05rotating
Defensibility

The moat is cryptographic provenance.

We treat the candidate's device as untrusted, and never accept self-report as evidence. The verification layer is a cryptography problem — not a feature an HR-software incumbent can bolt on.

Tamper-evident history

Conversation history is committed in a Merkle-style structure. Records cannot be backdated or rewritten without breaking the chain.

Source-verified artifacts

Repos, deployments, packages and filings are checked against third parties the candidate does not control — never via local software.

Adversarial live defense

A curated or AI-generated profile collapses the moment the adaptive examiner asks the candidate to extend their own reasoning.

Local-first privacy

The full pipeline runs on the candidate's machine. The employer receives a privacy-preserving report, never the raw history.

Verification pipeline
trust = ∏ third-party attestations
SIG
0x9a4f…ec1
ROOT
m:7e3…b08
VERIFY
✓ ok
Example report

What an employer actually receives.

An evidence-anchored screen, mapped to the specific role. Each claim links back to a verifiable source the candidate chose to disclose.

provenant.report · cand:0x71a3…d4f
Role · Senior Security Engineer

Candidate match · evidence-anchored

Strong technical depth in distributed cryptographic systems. Limited evidence of large-team coordination.

86
overall match
high confidence; backed by 183 verified sessions.

Detected strengths

  • Distributed systems reasoning92
  • Cryptographic protocol depth88
  • Debugging persistence85
  • Architectural tradeoff awareness81

Notable gaps

  • Frontend architecture depth34
  • Large-team coordination41

Evidence base

Verified sessions
183
Repositories
12
External attestations
47
Security reviews observed
21
Span of evidence
14 mo
Adaptive defense
passed

Observed work patterns

  • Conducts unprompted security review on own changes
  • Recovers from incorrect model output without prompting
  • Challenges assumptions in design-doc threads

Live defense

Passed

Defended 14 of 14 prior reasoning checkpoints under adaptive probing.

probes14
median latency4.2s
contradiction rate0.0%
profile authorshipgenuine
Candidate sees this report first. They choose what to share.

The future of hiring is proof, not performance.

Provenant is currently rolling out to a small cohort of engineering teams and design partners. Request access to put verified longitudinal evidence in front of your next hire.

INVITES SENT WEEKLY · NO MARKETING EMAILS · UNSUBSCRIBE ANYTIME