Essay
Compliance needs an open proof layer.
An open, limitation-aware verification tool would improve the industry even before it covered every control, because the semantic layer itself would finally become inspectable.
Drafted for eventual publication and kept here as part of the public product explanation.
Compliance today sits in an awkward middle ground. There is a lot of process, a lot of paperwork, and a great deal of theatre. But there is also a real hard core: some controls are objective enough to verify mechanically, while others depend on testimony, judgment, and institutional discretion. The mistake the industry keeps making is flattening those categories into one thing.
An open tool like OpenCompliance would matter not because it solves all of compliance, but because it forces sharper distinctions. It says: these controls were proved from machine evidence; these were supported by signed attestations; these remain judgment calls; these were excluded. That is already a meaningful improvement over a large amount of current practice, where every green checkmark appears equally authoritative even when the reasoning underneath is radically different.
The public good is the semantic layer
The most valuable open-source artifact here is probably not the interface. It is the mapping from standards into formal representations, the type system for evidence claims, the overlap model between frameworks, and the public record of where interpretation is easy versus where it is genuinely contested.
If that work is done in the open, the whole industry gets a better language for arguing about compliance. A control mapping stops being consultant folklore and becomes a versioned object with explicit semantics and explicit proof boundaries.
Incomplete does not mean useless
A limitation-aware tool still helps if it is honest. It can start with the technical corridor that is most defensible: access control, MFA enforcement, repository protections, CI guarantees, cryptographic settings, logging, retention, and configuration invariants.
For everything else, the right response is not bluff. It is signed attestation slots, explicit review queues, and visible exclusions. Progress comes from sharper boundaries, not from pretending every boundary has disappeared.
Clearer audits are a deeper change than they sound
A clearer audit localizes disagreement. If an auditor disputes a result, the argument becomes structured: is the control mapping wrong, is the evidence stale, did the signer lack authority, is the theorem correct but the interpretation wrong, or is the scope wrong? That is far better than arguing over a static PDF whose reasoning has been flattened into prose.
The point of an open proof layer is not to eliminate disagreement. It is to give disagreement a legible shape.
Make shortcutting noisy
If the path from evidence to verdict is opaque, the system can still be gamed. So the artifacts should be signed. Their digests should go into an append-only public log. The verifier should be reproducible. Proof bundles should be replayable by third parties. Revocations should be visible. Silent mutation should be difficult, detectable, and expensive.
This is the useful part of the smart-contract analogy: not tokens, but public state transitions and replayable enforcement.
Do it in the open
A private vendor can ship some of these ideas alone. The industry changes faster if the core artifacts are public. Open mappings, public examples, mirrored proof corpora, and independent witnesses make weak semantics easier to challenge and strong semantics easier to reuse.
The right ambition is not “replace auditors.” It is “change what a respectable audit artifact looks like.”