Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

Website: https://trustsignal.dev

TrustSignal is evidence integrity infrastructure for existing workflows. It acts as an integrity layer that returns signed verification receipts, verification signals, verifiable provenance metadata, and later verification capability without replacing the upstream system of record.
TrustSignal is evidence-integrity infrastructure that operates as an integrity layer for existing workflows. It issues **signed verification receipts**, verification signals, and verifiable provenance metadata — enabling **later verification** and auditability without replacing the upstream system of record. TrustSignal’s public integration boundary intentionally avoids exposing signing internals or proof internals and focuses on returning durable verification artifacts that integrators can store alongside their own evidence.

## Problem

Expand Down
38 changes: 13 additions & 25 deletions docs/public-private-boundary.md
Original file line number Diff line number Diff line change
@@ -1,34 +1,22 @@
# Public / Private Boundary

This repository is currently a single codebase, but it is being organized so a
future split into:
This codebase is organized to make it straightforward to operate a **public integration layer** and a **private verification engine** with a narrow engine interface.

- a public integration-layer repository
- a private verification-engine repository or service
## Public integration layer
The public integration layer contains API, SDK, public docs, and public route/middleware code. It is responsible for:
- Authentication and authorization
- Request validation and tenant scoping
- Rate limiting and exposure controls
- Response shaping and partner-facing contracts

is straightforward.
Public code must not import or orchestrate engine-private helpers or signing internals.

## Public-Oriented Surfaces
## Private verification engine
The private verification engine owns proof orchestration, signing internals, revocation/anchoring workflows, ZKP/circuits, and compliance evaluation. Engine code is intentionally internal; integrators should depend on the API contract and receipt model rather than internal implementation details.

These directories are intended to remain part of the public integration layer:

- `api/`
- `sdk/`
- `docs/`
- `security/`
- `apps/web/`
- `apps/watcher/`
- `packages/public-contracts/`
- public-facing route, middleware, and response-mapping code in `apps/api/src/`

Public code should own:

- authentication and authorization
- request validation
- tenant scoping
- rate limiting
- idempotency and request lifecycle concerns
- response shaping and partner-facing contracts
## Guardrails
- Route handlers must call the narrow engine interface and must not import engine internals directly.
- Public gateway code uses import restrictions and checks (e.g., `npm run check:api-boundary`) to prevent accidental leakage of private engine code.
Comment on lines +18 to +19
Copy link

Copilot AI Mar 25, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The doc claims a npm run check:api-boundary guardrail, but there is no check:api-boundary script anywhere in the repo (root package.json and apps/* package.json files). This makes the stated enforcement mechanism misleading; either add the script (and document where it runs) or remove/replace the reference with the actual enforced check(s).

Copilot uses AI. Check for mistakes.
Comment on lines +17 to +19
Copy link

Copilot AI Mar 25, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This adds a second "## Guardrails" section near the top of the document, but the file already has an existing "## Guardrails" section later. The duplicate headings make the structure ambiguous; consider merging these guardrails into a single section or renaming one of the headings so there is a single source of truth.

Copilot uses AI. Check for mistakes.

## Private Engine Candidates

Expand Down
15 changes: 6 additions & 9 deletions docs/security-summary.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,15 @@
# TrustSignal Public Security Summary

> TrustSignal is evidence integrity infrastructure for signed verification receipts and later verification.
TrustSignal provides a public-safe security posture at the integration boundary: scoped API authentication, request validation and rate-limiting at the API gateway, server-side persistence of artifact receipts, fail-closed production defaults, and a claims boundary that avoids exposing signing internals or proof internals.

Short description:
This public-safe security summary explains the TrustSignal integration boundary, security posture, and claims boundary without exposing non-public implementation details.

Audience:
- partner security reviewers
- evaluators
- developers
## Audience
- Partner security reviewers
- Evaluators
- Developers

## Problem / Context

Partners and evaluators need a public-safe security summary that explains the attack surface without exposing internal implementation details. In high-stakes workflows, evidence can be challenged after collection through tampered evidence, provenance loss, artifact substitution, or stale records that are no longer independently verifiable.
Partners and evaluators need a public-safe security summary that explains the attack surface and the integration-facing guarantees without exposing non-public implementation details.

## Integrity Model

Expand Down
Loading