This bundle contains everything needed to evaluate the compute layer before signing a free-pilot Letter of Intent. Walk it in this order.
The bundle ships a precomputed signed manifest. Confirm the verifier works on your hardware before reading anything else:
# Install once (per the repo: pip install -e .)
genomics-verify \
keys/sample-manifest.json \
keys/sample-signature.json \
--public-key keys/genomics-public.pem.example
# Expected: "OK — signature valid for this manifest."
The example public key fingerprint is:
c45fed5f205aea057efa7314515ec3688109aa4f072aa71bd4a7fd4c48db102d
Hash the PEM yourself (sha256sum keys/genomics-public.pem.example)
and confirm it matches. This is the demo-key fingerprint;
production-pilot keys are pinned out-of-band per
SIGNING_KEY_PUBLISHING.md §3.
Every per-sample deliverable ships a JSON QC report alongside the signed manifest. The bundle contains a real one from a 2026-05-10 HG002 30× run on a single NVIDIA GB10:
cat sample-qc-report.json
Expected fields per QC_REPORT_SCHEMA: schema_version, job_id,
sample_id, pipeline_version, generated_at, qc_status ∈
{PASS, WARN, FAIL}, qc_reasons[], metrics{}. The sample
shows PASS with alignment_rate_pct=99.55, mean_coverage=32.49x,
ti_tv_ratio=1.99, het_hom_ratio=1.42, variant_counts=snp=3.9M / indel=0.9M.
Schema-validate it with:
import json
from compute_layer.qc.json_schema import validate_qc_report
validate_qc_report(json.load(open("sample-qc-report.json")))
Open INTENDED_USE.md. It states exactly what we do and do not
claim — secondary analysis only, no interpretation, no diagnosis,
the lab remains the CLIA/CAP lab of record. Read this first; if
the boundary doesn't match what your QMS expects, the rest is moot.
Open VALIDATION_REPORT.md. This is the document your QMS reviewer
signs against to authorize the LOI. It pins the pipeline version,
mirrors the in-scope SNP F1 0.9994 / Indel F1 0.9969 numbers,
documents the exclusion BED rationale, lists the three offline
commands the QMS reviewer reproduces independently, and provides
the sign-off block both Provider and Lab counter-sign.
Open QUALITY_METRICS.md. This is the single source of truth that
the validation report mirrors from. Use it to spot-check any number
the validation report quotes.
Open SIGNING_KEY_PUBLISHING.md. Two things matter for your QMS:
Open API_OPENAPI.json. Frozen schema; LIMS integrators can pin
against it. CI catches drift on every push.
Open LOI_ONEPAGER.md. Populate the placeholders with your lab's
details, sign, and email back. Pilot kickoff sequence is the
provider's responsibility from there.
This bundle is byte-for-byte reproducible from the repo. The CI gate "customer-bundle determinism check" rebuilds it twice on every push and rejects non-matching output, so the SHA-256 you compute locally matches the one your account team gave you out-of-band.
Documented at delivery time in the email body, not embedded here (self-referential hashes are a footgun). Compute with:
sha256sum customer-bundle.tar.gz