Determinism & Salt
Determinism mode and host anonymization salt are the two controls that make AI workflows reproducible without exposing real hostnames in STRICT mode.
Determinism Mode
When Determinism Mode is enabled:
context bundles are ordered consistently,
repeated runs over the same selection produce stable prompt structure,
audit hash comparison across runs becomes meaningful.
This is useful for:
compliance audits,
evidence review,
regression checks on prompt behavior.
What Determinism Guarantees
Determinism guarantees stable ordering and stable anonymization mappings for equal inputs and equal settings.
It does not guarantee:
identical model answers (provider-side randomness can still exist),
identical scanner timing,
identical external network behavior.
Host Anonymization Salt
The Host Anonymization Salt is used in STRICT mode to produce deterministic pseudonyms.
Same hostname + same salt -> same pseudonym.
Same hostname + different salt -> different pseudonym.
Example:
Salt Rotation Guidance
Rotate salt when:
starting a new engagement,
changing client or environment boundary,
sharing artifacts with a different audience.
Keep salt unchanged when:
reproducing findings inside the same engagement,
comparing deterministic bundles across test runs.
Interaction with Audit Logging
With Audit Logging + Determinism enabled:
prompt bundles are easier to compare,
payload hash differences usually indicate real input/policy changes,
host pseudonyms remain stable for that salt lifecycle.
This combination is recommended for regulated workflows.
Recommended Defaults
Cloud backend + sensitive target:
STRICT+ Determinism ON + unique per-engagement salt.Local backend + low sensitivity:
BALANCED+ Determinism optional.Internal lab only:
OFFonly if raw context sharing is acceptable.
Common Mistakes
Reusing the same salt across unrelated client engagements.
Assuming determinism means model output is always identical.
Forgetting that active scanner requests still hit real targets.
Related Pages
Last updated
