Evalium Master Capability Registry
This registry provides an exhaustive map of Evalium's functional capabilities, linking backend architectural intent to business-facing features and forensic verification. It covers the full lifecycle of a high-stakes assessment, from definition to long-term defensible reporting.
1. Identity & Access Governance
Capability: Granular RBAC & Capability-Based Access
- Intent: Enforce the principle of least privilege while maintaining multi-tenant and intra-tenant (silo) isolation.
- Forensic Invariant: Hard-coded role checks are strictly banned; all authorization logic is centralized in the
authzservice and enforced via PostgreSQL Row-Level Security (RLS). - Verification:
backend/tests/authz_middleware.sh,backend/tests/user_rbac_schema.sh.
Capability: Multi-Layer Session Revocation
- Intent: Immediate "kill-switch" for compromised accounts or suspicious activity across multiple devices.
- Logic: Supports revoking specific sessions (
revokeSession), all other sessions (revokeOtherSessions), or all sessions for a user (revokeAllSessions). - Verification:
backend/tests/auth_sessions_revoke_others.sh.
Capability: Delegated Authority Tracking (Provenance)
- Intent: Non-repudiation of "Acting on Behalf" relationships (e.g., a manager approving a verifier's finding).
- Logic: Records the
actorIDand theauthorityContextfor every mutation in the ledger. - Verification:
backend/tests/defensibility_authority_provenance.sh.
2. Content authoring & Stimulus Management
Capability: Advanced Question Logic (MCQ/MRQ)
- Intent: Support complex knowledge checks with granular grading control and structural validation.
- Granular Logic:
- Grading Modes:
threshold(pass if > N correct),per-choice(points per correct, penalty per incorrect),proportional(normalized score). - Selection Constraints:
minSelect,maxSelect,exactSelectenforced at the moment of submission.
- Grading Modes:
- Verification:
backend/tests/reporting_question_health_mrq.sh.
Capability: Stimulus Management (Passages)
- Intent: Anchor multiple questions to a shared Stimulus (Text/Media) while maintaining version integrity.
- Logic: Question versions are explicitly linked to passage versions; changing a passage requires a deliberate update to the evaluation version.
- Verification:
backend/tests/passages_crud.sh.
Capability: Structural authoring Validation (Hard Gates)
- Intent: Prevent logically invalid evaluations (e.g., unreachable sections or empty buckets) from reaching the field.
- Forensic Invariant: The
Publishevent is blocked if structural errors exist (e.g., a bucket shortfall where only 3 questions exist for a rule requiring 5). - Verification:
backend/tests/evaluations_validate.sh.
Capability: Localisation Contract (BCP-47)
- Intent: Prevent UI drift and text corruption in multi-language environments.
- Logic: Enforces a "Canonical Envelope" (
defaultLocale+locales) across all content APIs. Validates locale tags against BCP-47. - Verification:
backend/tests/test_localisation_all.sh.
3. Library Operations & Portability
Capability: Inventory Views (Virtual Folders)
- Intent: Organize massive question/evaluation banks without the fragility of physical folder structures.
- Logic: A saved-filter engine providing
personalandsharedvisibility, optimized for RLS-scoped search performance. - Verification:
backend/tests/inventory_views_smoke.sh.
Capability: Content Portability & Lineage (Packs)
- Intent: Bundle approved versions for movement between environments (e.g., Global Library to Local Tenant).
- Logic: Records the cryptographic lineage from "Pack Revision" to "Local Install," enabling auditing of where a specific evaluation variant originated.
- Verification:
backend/tests/content_packs.sh.
Capability: High-Volume Bulk Actions
- Intent: Efficient management of library assets (Archive, Restore, Tag Replace).
- Forensic Invariant: Includes a
dryRunmode to audit the "blast radius" of a change across the library before commit. - Verification:
backend/tests/authoring_bulk_actions.sh.
4. Operational Delivery & Field Resilience
Capability: Legally Mandated Accommodations (Overrides)
- Intent: Provide adjustments for specific candidates (extra time/attempts) without altering the authoritative template.
- Logic: Per-user overrides for
extraAttempts,timeLimitExtension, andfeedbackModeOverride. - Verification:
backend/tests/assignments_idempotency.sh.
Capability: Automated Compliance Scheduling
- Intent: Automate recurring certification cycles (e.g., annual safety checks).
- Forensic Invariant: Schedules use an atomic "Locking Gate" to prevent duplicate issuance or missed execution windows.
- Verification:
backend/tests/assignments.sh.
Capability: Environment Lockdown & Telemetry
- Intent: Verify candidate attention and detect cheating via browser behavior monitoring.
- Logic: Continuous recording of
focusLost,fullscreenExit, andnavigationevents into the ledger, summarized in the final result. - Verification:
backend/tests/delivery_session.sh.
Capability: Deterministic Draw (Buckets)
- Intent: Ensure dynamic forms are reconstructable for audit.
- Forensic Invariant: The specific list of
question_version_idsselected for a user via dynamic buckets is frozen inquestion_orderat session start. - Verification:
backend/tests/evaluations_buckets.sh.
5. Observational Assessment & Findings
Capability: Multi-Subject Linkage
- Intent: Support observations where one execution applies to a team, a vehicle, or multiple assets.
- Logic: Associates a single submission with multiple
subjectsvia thesubmission_subjectsdurable link. - Verification:
backend/tests/observation_assignment_multi_subjects.sh.
Capability: Verifier-Led Findings & Evidence Gating
- Intent: Enable verifiers to record defects against subjects with mandatory substantiation.
- Logic Gate: Backend enforces
requiresCommentorrequiresEvidencefor specific findings; approval is blocked until the condition is met. - Verification:
backend/tests/observation_findings_evidence_required.sh.
Capability: Approval Workflows (Four-Eyes)
- Intent: Quality control for high-stakes assessments.
- Logic: Supports
pending_review,approved,rejected, andchanges_requestedstates. Enforces policies requiring review by a different actor than the observer. - Verification:
backend/tests/observation_submission_four_eyes.sh.
6. Results Governance & Remediation
Capability: Forensic Results Remediation (Snap-then-Append)
- Intent: Correct scoring errors (e.g., a bad answer key) without destroying the execution history.
- Forensic Invariant: Version 1 (Execution Truth) is never overwritten. Administrative corrections create Version 2+, maintaining a clear delta between "As Executed" and "As Remediated."
- Verification:
backend/tests/results_remediation_drop_item.sh.
Capability: Dual-Time Policy Enforcement
- Intent: Distinguish between "passed under rules at time of execution" vs "would pass under today's tightened rules."
- Logic: Emits dual-time status codes (
defensibleAtExecutionvsreadyNow) for all submissions. - Verification:
backend/tests/proof_readiness_dual_time_smoke.sh.
Capability: Non-Repudiable Ratification
- Intent: Provide a legally binding sign-off for a submission or engagement milestone.
- Forensic Invariant: Records the state fingerprint/hash, signer identity, and fresh re-authentication (Step-Up) proof in the immutable ledger.
- Verification:
backend/tests/submission_ratification.sh.
7. Defensibility, Reporting & Analytics
Capability: Snapshot-Isolated Projection Engine
- Intent: Guarantee that reporting facts remain constant even if the source library is deleted or renamed.
- Forensic Invariant: Reporting workers are strictly decoupled from live authoring tables; they pull content text and payloads exclusively from the
VersionSnapshot. - Verification:
backend/tests/test_reporting_all.sh.
Capability: Question Health Analytics (Signal Detection)
- Intent: Identify flawed or biased questions via statistical anomalies in field data.
- Metrics: Calculates
Facility(mean score),Omission Rate, andTime on Item(P90/Median). - Verification:
backend/tests/reporting_question_health_all.sh.
Capability: Defensibility Exception Triage
- Intent: Allow admins to acknowledge and document system anomalies (e.g., "Focus loss was caused by an OS update popup").
- Forensic Invariant: Triage status and commentary are recorded in the ledger, providing essential context during an audit.
- Verification:
backend/tests/defensibility_exceptions_smoke.sh.
8. Compliance, Privacy & Data Lifecycle
Capability: Hybrid Scrub (Right to be Forgotten)
- Intent: Satisfy GDPR/PII requests without breaking the "Golden Thread" of assessment proof.
- Logic: Redacts
emailandnamewhile preserving the immutableUUIDand performance records for organizational analytics. - Verification:
backend/tests/compliance_forget.sh.
Capability: Legal Hold Enforcement (Precedence)
- Intent: Prevent data loss during active legal investigations.
- Forensic Invariant: Hold status is verified inside the database transaction of all automated and manual cleanup workers. Holds override all retention policies.
- Verification:
backend/tests/compliance_restrict.sh.
Capability: Data Retention Safety (Dry Run)
- Intent: Safely audit the impact of large-scale data cleanup policies.
- Logic: Mandatory
DryRunmode that calculates and logs eligible records without enqueuing destructive jobs. - Verification:
backend/tests/compliance_retention_incidents.sh.
Capability: Evidence Storage Tiering & Verification
- Intent: Manage the physicality of proof across its lifecycle.
- Logic: Moves artifacts from Hot (MinIO) to Cold (Glacier) storage while maintaining ledger-linked integrity hashes.
- Verification:
backend/tests/evidence_storage_tier_worker.sh.