I didn’t put it in the witness in this post because otherwise a malicious prover can reuse any other signature signed by this public key. I couldn’t come up with a way to fix that. Specifically, if we expect the user to sign both receive logic and intent logic, the signatures can be reused. I believe in the function privacy case this won’t leak information, but I agree that exposing the signature is bad. Do you see a way around it?