// TRACE LOOKUP EXAMPLE
// How It Works
Execution Receipts and Independent Verification
Execution receipts are self-contained proof of what TrigGuard evaluated and decided. With cached public keys, verification is local and independent: teams can validate integrity without calling TrigGuard during audits or incident review.
1. Fetch Keys Once
Load public keys from /.well-known/trigguard-keys.json. Cache locally.
2. Parse Receipt
Extract the signature and key_id from the receipt JSON.
3. Verify Receipt
Use Ed25519 to verify the signature against the canonical payload.
4. Check Expiry
Ensure the receipt hasn't expired (check expires_at field).
// Key Discovery
Signature Verification and Integrity
TrigGuard publishes signing keys at a well-known URL so signatures on receipts can be validated cryptographically. Keys rotate periodically while prior keys remain available long enough to verify historical receipts.
GET https://api.trigguardai.com/.well-known/trigguard-keys.json
Key Rotation
Keys are rotated quarterly. Deprecated keys remain available for 90 days after rotation to allow verification of older receipts.
// Trust Model
Why Verification Matters for Automated Decisions
Verification does not require TrigGuard to be online. Your audit trail is cryptographic proof of policy outcome, not a live query to a control plane. This makes execution decisions independently verifiable across CI, runtime, and compliance workflows, aligned with AI decision verification and deterministic authorization under AI execution governance.
DEMO MODE, This page demonstrates the verification flow using example keys. Production verification requires fetching your organization's actual public keys from /.well-known/trigguard-keys.json.
// Related Verification Paths
Receipt model · Verification docs · Gate authorization · Verify product