NOTHING EXECUTES WITHOUT AUTHORIZATION
TrigGuard is a pre-execution safety gate that determines whether automated systems are allowed to act.
Evaluate → PERMIT, DENY, or SILENCE → enforce before irreversible work.
Receipts are signed; outcomes are verifiable offline.
TrigGuard is a verification layer: your application or agent uses the SDK to reach the authority API; only actions backed by a valid PERMIT receipt should run.
No execution without verification.
Between intent and execution: deterministic policy, verifiable receipts, no irreversible action without authorization.
Governance and configuration above; real-time authorization on the hot path.
Integrate TrigGuard in seconds.
const response = await fetch("https://trigguardai.com/protocol/verify-receipt", {
method: "POST",
headers: { "Content-Type": "application/json" },
body: JSON.stringify({
decision: "PERMIT",
timestamp: new Date().toISOString()
})
});
const data = await response.json();
// Protocol rule: ignore unknown JSON keys — read only what you need
if (data.valid === true && data.type === "verify_receipt") {
executeAction();
}
Responses are extensible: protocol, protocol_version, and type identify the contract; new fields may appear anytime. See Documentation.
Blocks unsafe automated actions before execution occurs.
All execution decisions resolve to PERMIT or DENY (or SILENCE when no authorization is issued).
If policy cannot be evaluated, execution is denied.
Every action produces a verifiable record. Receipts carry decisions only; runtimes record enforcement (EXECUTED / BLOCKED).
[ EXECUTION TRACE ]
TRACE_ID: TG-A7C192B
ACTOR: finance-bot
ACTION: transfer_funds
AMOUNT: $50,000
↓
DECISION: DENY
ENFORCEMENT: BLOCKED
RECEIPT_STATUS: SIGNED
SILENCE means no authorization was issued. Without authorization, execution cannot proceed. (Incomplete evaluation—still explicit non-permission.)
Decisions DENY. Systems BLOCK.
TrigGuard produces the decision. Your systems enforce the outcome.
// SYSTEM BOUNDARY
Managed service or private deployment—same fail-closed contract: no PERMIT, no execution.
Evaluate → PERMIT · DENY · SILENCE
Finite execution outcomes.
// GET STARTED
Wire POST /execute before commit in minutes. One authoritative evaluation: execution does not proceed until policy returns PERMIT.