TrustProof-Protocol

TrustProof Adoption Guide

TrustProof Protocol defines signed action receipts: compact JWT artifacts (Ed25519/EdDSA) that bind subject + policy snapshot + action + hashed inputs/outputs + timestamp + jti + tamper-evident chain.

A receipt is portable: any verifier with the public key and protocol rules can validate it offline. The protocol is intentionally narrow: it standardizes proof format and verification semantics, not business policy or workflow orchestration.

Adoption Ladder

Level 1: Verify-Only (Lowest Risk)

Goal: validate incoming proofs without changing action execution paths.

Level 2: Emit + Verify (Shadow Mode)

Goal: emit receipts for live actions and verify asynchronously.

Level 3: Enforce (Policy Gate)

Goal: require valid receipts before downstream state transitions.

Level 4: Enterprise Governance (Verdicto Mapping)

Goal: move operational responsibilities to managed governance surfaces.

Protocol remains the source format and verification contract. Verdicto maps to operational capabilities that are out of scope for protocol core:

Minimal Data Model (Store by Default)

Use a receipt index with these fields:

Data minimization default:

Start with one action type (example: payout.initiate or one agent tool action).

  1. Shadow phase (2-4 weeks)
    • emit receipts
    • verify asynchronously
    • measure coverage, verification pass rate, replay hits
  2. Enforce phase
    • gate downstream state changes on verification success
    • enable replay-store checks for jti with TTL
    • keep idempotency keys mandatory on action endpoints
  3. Expand
    • add second action type
    • add chain enforcement for multi-step workflows