Edit‑agnostic robustness evaluation reports for weight edits (InvarLock framework)
Project description
Edit‑agnostic robustness reports for weight edits
Catch silent quality regressions from quantization, pruning, and weight edits before they ship.
Quantizing, pruning, or otherwise editing a model’s weights can silently degrade quality.
InvarLock compares an edited subject checkpoint against a fixed baseline with paired
evaluation windows, enforces the canonical guard chain (invariants → spectral → RMT
→ variance → invariants), and produces a machine-readable evaluation report you can gate
in CI.
Why InvarLock?
- Quality gates for edited checkpoints: catch regressions before deployment.
- Statistical guarantees: paired primary metrics with confidence intervals.
- Auditable evidence: deterministic pairing metadata + policy digests in
evaluation.report.json. - CI/CD-friendly: stable exit codes,
--jsonoutputs, and portable “proof packs”. - Offline-first: network is disabled by default; enable downloads per command.
Who is this for?
- ML engineers shipping edited model checkpoints, including quantized, pruned, fine-tuned, or otherwise weight-modified variants.
- MLOps and platform teams building CI gates, attested verification, and reviewable evaluation artifacts.
- Researchers validating weight-edit, compression, and model-comparison methods with reproducible paired evaluation across text and image-text workflows supported here.
How it works
┌───────────────────────┐ ┌────────────────────────────────────────────┐
│ Baseline (checkpoint) │────►│ │
└───────────────────────┘ │ invarlock evaluate │
│ ├─► Paired windows (deterministic) │
┌───────────────────────┐ │ ├─► GuardChain pipeline │
│ Subject (checkpoint) │────►│ │ └─► invariants → spectral → RMT → VE │
└───────────────────────┘ │ └─► Emit: evaluation.report.json │
│ │
└────────────────────────────────────────────┘
│
┌───────────────┴───────────────┐
▼ ▼
✅ PASS ❌ FAIL
(ship) (rollback)
Quick start
The minimal install (pip install invarlock) is enough for doctor,
verify, report html, and proof-pack verification from an installed wheel.
Install invarlock[hf] only when you need evaluate to load Hugging Face
models. The secure-default CLI path runs model-loading commands inside the
runtime container and expects an OCI container engine such as podman or
docker.
In a repo checkout, build the local runtime image once with
make runtime-image; InvarLock automatically prefers
invarlock-runtime:local when it is present. Trusted local workflows can opt
into host execution explicitly with --assurance trusted-local on
invarlock evaluate, but the attested verification step below expects
container execution. The quickstart block below assumes a repo checkout; do
not skip make runtime-image if you want the attested container path.
# Repo-checkout quickstart for the attested container path
# HF adapter stack (torch/transformers)
pip install "invarlock[hf]"
# Required in a repo checkout for the attested path; do not skip this step.
make runtime-image
# Version + report schema (when available)
invarlock --version
# Compare baseline vs subject (downloads require explicit network enable)
# Secure-default execution uses the runtime container and writes
# reports/eval/runtime.manifest.json next to evaluation.report.json.
invarlock evaluate --allow-network \
--baseline gpt2 \
--subject distilgpt2 \
--adapter auto \
--profile ci \
--report-out reports/eval \
--quiet
# Validate the attested evaluation report
test -f reports/eval/runtime.manifest.json
invarlock verify --json reports/eval/evaluation.report.json
# Render HTML for sharing
invarlock report html -i reports/eval/evaluation.report.json -o reports/eval/evaluation.html
If you pass a directory to invarlock report generate or
invarlock report explain, it must contain canonical report.json.
invarlock report html expects canonical evaluation.report.json.
invarlock verify accepts directories with canonical report files, but a
directory containing both report.json and evaluation.report.json is
ambiguous and rejected; pass the exact file path instead.
Example output (abridged; counts vary by profile/config):
INVARLOCK v<version> · EVALUATE
Baseline: gpt2 -> Subject: gpt2 · Profile: dev
Status: PASS · Gates: <passed>/<total> passed
Primary metric ratio: <ratio>
Output: reports/eval/evaluation.report.json
Attestation: reports/eval/runtime.manifest.json
Command Surface
- Core workflow:
invarlock evaluate→invarlock verify→invarlock report html. - Report inspection and validation:
invarlock report generate,invarlock report explain, andinvarlock report validate. - Environment and release checks:
invarlock doctorplus the JSON surfaces emitted bydoctor --jsonandadvanced plugins ... --json. - The public contract catalog exposed by those JSON surfaces includes
validation_keys,console_labels, andmetric_kinds. - Advanced workflows:
invarlock advanced proof-pack,invarlock advanced policy,invarlock advanced plugins, andinvarlock advanced calibrate. - Trusted host execution for the core evaluate path uses
--assurance trusted-local. - Optional adapter/backend installs use normal Python extras such as
pip install "invarlock[hf]"rather than CLI install commands.
Proof packs (portable evidence bundles)
Proof packs bundle reports + verification metadata into a distributable artifact.
- Guide: https://github.com/invarlock/invarlock/blob/main/docs/user-guide/proof-packs.md
- Verify from an installed wheel:
invarlock advanced proof-pack verify <dir> --strict - Repo harness alternative:
scripts/proof_packs/verify_pack.sh --pack <dir> --strict
Note: configs/ and most scripts/ remain repo resources and are not included in
wheels. Installed wheels include the public contracts and the
invarlock advanced proof-pack verify verifier, so downstream users can check
bundles without cloning the repository.
Installation
# Minimal CLI (no torch/transformers)
pip install invarlock
# HF workflows (torch/transformers)
pip install "invarlock[hf]"
Optional extras: invarlock[probes], invarlock[gpu], invarlock[awq,gptq].
On Python 3.13+ stacks, gptq may still require a vendor wheel or a
supported older interpreter because upstream auto-gptq packaging is narrower
than the core InvarLock support matrix. Full setup:
https://github.com/invarlock/invarlock/blob/main/docs/user-guide/getting-started.md.
The minimal install covers the core verification and reporting flows. Add
invarlock[hf] only for model-loading evaluate runs, and use the installed
wheel's proof-pack verifier when you need to inspect a bundle without cloning
the repository.
Documentation
- Quickstart: https://github.com/invarlock/invarlock/blob/main/docs/user-guide/quickstart.md
- Compare & evaluate (BYOE): https://github.com/invarlock/invarlock/blob/main/docs/user-guide/compare-and-evaluate.md
- Reading a report: https://github.com/invarlock/invarlock/blob/main/docs/user-guide/reading-report.md
- CLI reference: https://github.com/invarlock/invarlock/blob/main/docs/reference/cli.md
- Assurance case: https://github.com/invarlock/invarlock/blob/main/docs/assurance/00-assurance-case.md
- Threat model: https://github.com/invarlock/invarlock/blob/main/docs/security/threat-model.md
Community
- Questions/ideas: https://github.com/invarlock/invarlock/discussions
- Bug reports: https://github.com/invarlock/invarlock/issues
- Contact: mailto:support@invarlock.dev
Citation
If you use InvarLock in scientific work, please cite it (canonical metadata is in CITATION.cff):
@software{invarlock,
title = {InvarLock: Edit-agnostic robustness evaluation reports for weight edits},
author = {{InvarLock}},
url = {https://github.com/invarlock/invarlock},
}
Limitations
- InvarLock evaluates an edited model relative to a baseline under a specific configuration; results are not “global” guarantees.
- Not a content-safety/alignment tool.
- Native Windows is not supported (use WSL2 or Linux).
Support matrix
| Platform | Status | Notes |
|---|---|---|
| Python 3.12+ | ✅ Required | |
| Linux | ✅ Full | Primary dev target |
| macOS (Intel/M-series) | ✅ Full | MPS supported (default on Apple Silicon) |
| Windows | ❌ Not supported | Use WSL2 or a Linux container if required |
| CUDA | ✅ Recommended | For larger models |
| CPU | ✅ Fallback | Slower but functional |
Project status
InvarLock is pre‑1.0. Until 1.0, minor releases may include breaking changes. See CHANGELOG.md.
For guidance on where to ask questions, how to report bugs, and what to expect in terms of response times, see
SUPPORT.md.
Contributing
- Contributing guide: https://github.com/invarlock/invarlock/blob/main/CONTRIBUTING.md
- Fast local checks (repo clone):
maketargets auto-select Python 3.12+, preferring an active 3.12 env,python3.12, then the Conda envinvarlock-py312when present.make dev-installmake testmake lintmake docs-live
License
Apache-2.0 — see LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file invarlock-0.7.1.tar.gz.
File metadata
- Download URL: invarlock-0.7.1.tar.gz
- Upload date:
- Size: 600.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
bd6573bc2d219ee5e842bed27284e933125fa97c05bb1e8a1896535b34c34fe5
|
|
| MD5 |
054c0f355a7d1b7497d57186b8b2a5a1
|
|
| BLAKE2b-256 |
148ceafe4b31a90666520cd62a98d628b9d2d5167fe31409f619dc9a16098924
|
Provenance
The following attestation bundles were made for invarlock-0.7.1.tar.gz:
Publisher:
release.yml on invarlock/invarlock
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
invarlock-0.7.1.tar.gz -
Subject digest:
bd6573bc2d219ee5e842bed27284e933125fa97c05bb1e8a1896535b34c34fe5 - Sigstore transparency entry: 1282572732
- Sigstore integration time:
-
Permalink:
invarlock/invarlock@5c88b1e926e1905f4358ee817e63823236c48d05 -
Branch / Tag:
refs/tags/v0.7.1 - Owner: https://github.com/invarlock
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@5c88b1e926e1905f4358ee817e63823236c48d05 -
Trigger Event:
push
-
Statement type:
File details
Details for the file invarlock-0.7.1-py3-none-any.whl.
File metadata
- Download URL: invarlock-0.7.1-py3-none-any.whl
- Upload date:
- Size: 749.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c6503ea8eaeb18abaac3a6dbc9b498d2fbc8064812eed118d9d34dbc6fcd20ec
|
|
| MD5 |
d016ef9b6d8ae8f11f140463e06400e4
|
|
| BLAKE2b-256 |
0d9d3afbdfa99a7c077603d6f088fa5551fc917b83d9c00d0872787537e0caf9
|
Provenance
The following attestation bundles were made for invarlock-0.7.1-py3-none-any.whl:
Publisher:
release.yml on invarlock/invarlock
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
invarlock-0.7.1-py3-none-any.whl -
Subject digest:
c6503ea8eaeb18abaac3a6dbc9b498d2fbc8064812eed118d9d34dbc6fcd20ec - Sigstore transparency entry: 1282572759
- Sigstore integration time:
-
Permalink:
invarlock/invarlock@5c88b1e926e1905f4358ee817e63823236c48d05 -
Branch / Tag:
refs/tags/v0.7.1 - Owner: https://github.com/invarlock
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@5c88b1e926e1905f4358ee817e63823236c48d05 -
Trigger Event:
push
-
Statement type: