Turn one sensitive access change into an evidence bundle others can inspect.

One sensitive access change. Five business days. A bounded evidence bundle others can inspect.

WitnessOps packages one access grant, revoke, role change, vendor access review, or admin permission update into a proof-run bundle with authority, source evidence, custody notes, checksums, receipt, verifier notes, and findings.

The active public request lane is the AI Agent Action Proof Run. Access-change scoping is handled by email first so this offer does not send buyers into the AI-agent intake form.

Fixed fee: €2,500.
Payment: 50% upfront, 50% on delivery.
Ask about access-change scoping

Start by email through Support. Do not submit secrets in the first message.

View sample proof run

The public sample shows proof-run shape only, not real customer evidence.

What this proof run answers

A bounded access-change proof run answers one narrow question: Can this specific access-change claim be supported by named authority, source evidence, custody notes, and a replayable inspection path?

It does not try to prove the entire security program. It does not claim broad compliance. It does not replace audit, legal, or certification work.

What you receive

run manifest
authority record
evidence manifest
custody log
checksum-bound receipt
verifier README
findings memo
caveats and failure states
45-minute walkthrough

The output is designed so a founder, CTO, security lead, customer, auditor, or internal reviewer can inspect what was claimed, what evidence was used, and what remains unproven.

Access changes that fit

  1. 01privileged access granted
  2. 02access revoked
  3. 03production role changed
  4. 04contractor access changed
  5. 05vendor access reviewed
  6. 06admin permission updated
  7. 07emergency access approved
  8. 08stale access removed

This is not a good fit if

  1. 01no source evidence exists
  2. 02no approving authority can be named
  3. 03the team wants a broad compliance certification
  4. 04the request requires legal audit opinion
  5. 05the workflow cannot be bounded to one operational action

What the client provides

selected access-change action
relevant source exports, screenshots, logs, tickets, or records
name/title of the approving authority
system or account involved
rough timeline of the action
applicable policy or control text, if available
point of contact for evidence questions

Do not submit secrets through Support or email. Source materials are handled only after scope and intake are agreed.

What the proof run may conclude

The page does not promise a happy result. It promises a bounded process.

  1. 01authority was clear and evidence supports the access-change claim
  2. 02authority existed but execution evidence is incomplete
  3. 03execution evidence exists but authority is missing
  4. 04evidence exists but custody is weak
  5. 05timestamps conflict
  6. 06source artifacts are insufficient
  7. 07the action cannot be proven from available evidence

What is not claimed

Five business days

Day 1
intake, scope, authority boundary
Day 2
source evidence collection and manifest
Day 3
custody log, receipt, and verifier notes
Day 4
findings memo and caveat review
Day 5
final bundle and walkthrough

€2,500 fixed fee.

50% upfront. 50% on delivery. Delivered in 5 business days after source materials are received.

Ask about access-change scoping

Send a short non-secret note through Support with:

Do not submit secrets in the first message. The active public request lane remains the AI Agent Action Proof Run.