Releases
This section is a hub for versioned releases, changelog, migration, and distribution artifacts.
Download Latest Release
GitHub Releases — this is the single source of truth for "latest" release. The site path /latest/ redirects to the same version.
Verification procedure (permanent web page)
The full auditor verification procedure (download assets, verify checksums, optional build provenance) is available as a permanent page and is not PDF-only:
- Standard → Versions → Verification Procedure — step-by-step checksum verification (Linux/macOS/Windows) and build provenance attestation.
Use this page when you need to verify release assets or document your verification steps in audit deliverables.
Release Assets
Each official release (vX.Y.Z tag) includes:
| Asset | Description |
|---|---|
trust_package.pdf |
English Trust Package — auditor-ready assurance materials |
trust_package.ja.pdf |
Japanese Trust Package |
aimo-standard-artifacts.zip |
Schemas, templates, examples, validator rules |
SHA256SUMS.txt |
SHA-256 checksums for all assets |
Verifying Downloads
After downloading, verify file integrity using checksums:
=== "Linux"
```bash
# Download the checksums file
curl -LO https://github.com/billyrise/aimo-standard/releases/latest/download/SHA256SUMS.txt
# Verify a specific file
sha256sum -c SHA256SUMS.txt --ignore-missing
# Or verify manually:
sha256sum trust_package.pdf
# Compare output with SHA256SUMS.txt
```
=== "macOS"
```bash
# Download the checksums file
curl -LO https://github.com/billyrise/aimo-standard/releases/latest/download/SHA256SUMS.txt
# Verify a specific file
shasum -a 256 -c SHA256SUMS.txt
# Or verify manually:
shasum -a 256 trust_package.pdf
# Compare output with SHA256SUMS.txt
```
=== "Windows (PowerShell)"
```powershell
# Download the checksums file
Invoke-WebRequest -Uri "https://github.com/billyrise/aimo-standard/releases/latest/download/SHA256SUMS.txt" -OutFile SHA256SUMS.txt
# Verify a specific file
Get-FileHash .\trust_package.pdf -Algorithm SHA256
# Compare the Hash output with SHA256SUMS.txt
Get-Content .\SHA256SUMS.txt
```
Artifacts Zip Contents
The aimo-standard-artifacts.zip contains:
schemas/jsonschema/*— JSON Schemas for validationtemplates/ev/*— Evidence templates (JSON + Markdown)examples/*— Sample evidence bundlescoverage_map/coverage_map.yaml— External standards mappingvalidator/rules/*— Validation rule definitionsVERSIONING.md,GOVERNANCE.md,SECURITY.md, etc.
Resources
- Version History Table: Standard > Versions — version table with direct links to all release assets (PDF, ZIP, SHA256)
- Changelog (spec): Standard > Current > Changelog — normative and non-normative change history.
- Release process: tagging
vX.Y.Z, CI build, PDF underdist/, checksums, GitHub Release assets. See GOVERNANCE.md and VERSIONING.md in the repository. - Migration guide: MIGRATION.md — upgrade paths for breaking changes.
For governance and versioning policy, see Governance.
Preparing your submission package
When preparing evidence for audit submission:
- Create your Evidence Bundle: Follow Evidence Bundle and Minimum Evidence Requirements to create EV records, Dictionary, Summary, and Change Log.
- Run the Validator: Execute
python validator/src/validate.py bundle/root.jsonto check structural consistency. Fix all errors before proceeding. -
Generate Checksums: Create SHA-256 checksums for verification:
=== "Linux"
```bash sha256sum *.json *.pdf > SHA256SUMS.txt ```=== "macOS"
```bash shasum -a 256 *.json *.pdf > SHA256SUMS.txt ```=== "Windows (PowerShell)"
```powershell Get-ChildItem *.json, *.pdf | ForEach-Object { $hash = (Get-FileHash $_.FullName -Algorithm SHA256).Hash.ToLower() "$hash $($_.Name)" } | Out-File SHA256SUMS.txt -Encoding UTF8 ```- Package: Create a zip archive of your bundle directory.
- Document version alignment: Note which AIMO Standard release (e.g.,
v1.0.0) your evidence aligns with. - Deliver: Provide the package, checksums, and version reference to your auditor.
For the complete preparation guide, see Trust Package.
For auditors: Verification procedure
Auditors receiving evidence submissions should verify integrity and structure:
- Verify checksums: Run checksum verification (Linux:
sha256sum -c, macOS:shasum -a 256 -c, Windows:Get-FileHash) to confirm file integrity - Run validator: Execute
python validator/src/validate.py bundle/root.jsonto check structure - Confirm version: Verify the stated AIMO Standard version exists at GitHub Releases
!!! tip "Obtain tools independently" Auditors should download the validator and schemas directly from the official AIMO Standard release, not from the submitting party.
For the full verification procedure (checksums, attestation, step-by-step), see Standard → Versions → Verification Procedure. See also Trust Package for auditor-ready materials.
Non-overclaim statement
!!! warning "Important" The AIMO Standard supports explainability and evidence readiness. It does not provide legal advice, guarantee compliance, or certify conformity to any regulation or framework. Adopters must verify claims against authoritative texts and obtain professional advice as appropriate.
See Responsibility Boundary for scope, assumptions, and adopter responsibilities.