Why this matters
Security and integrity checks reduce production risk from compromised or unverified artifacts.Verification workflow
Recommended controls
- Integrity checks
- Validate checksum or signature for local artifacts.
- Source trust
- Restrict URL/disk onboarding to approved origins.
- Scan evidence
- Review issue severity and impacted files before approval.
- Change accountability
- Keep ownership and update records current.
Operational runbook
- Open model details.
- Review verification status.
- Run or review security scan results.
- Resolve issues with medium/high/critical impact.
- Re-run checks until model is marked ready.
Common failure patterns
Scan status remains pending
Scan status remains pending
Check ingestion completion and retry scan once artifacts are fully available.
Verification fails after update
Verification fails after update
Revalidate source path/URI and metadata consistency, then resubmit.
Model is visible but not approved
Model is visible but not approved
Confirm governance and evaluation requirements for your team are complete.