Verify Diligence Pack (offline)

No uploads • No network calls • Deterministic PASS / FAIL / HOLD • Requires secure context (https:// or localhost)

Tip: open once → airplane mode → verify. Diligence commitments overviewOrg approval policy specTicket binding spec

Verify your files

Default: pinned trust anchors v1.0.0 (public‑safe demo). We do not fetch anything.
If enabled, provide both the commitment log JSON + signed head DSSE for non‑demo packs. We do not fetch anything.
ComputedValue
ZIP sha256
ZIP bytes
Computed commitment
Air‑gap guard
Commitment log
Log head
Commitment ↔ log
Log head DSSE
Receipt pack_version
DSSE

Export verification receipt (for procurement / legal)

Generates a deterministic JSON receipt (hashes + verdicts + policy) that you can attach to internal review. Reviewer‑generated; you may optionally countersign locally below to produce a signed internal approval record.

Receipt fieldValue
Artifact fingerprint
Verification run id

Countersign receipt (internal approval certificate)

Optionally countersign the latest verification receipt using your org/reviewer key locally. This produces a signed approval record you can attach to procurement/legal tickets. No key material is uploaded and the verifier makes no network calls.

Recommended: use your org-managed signing key. Demo keys are for testing only.
Key fingerprint:
Hardware‑backed countersign (WebAuthn / Passkey)

Optional: countersign the receipt using a hardware‑backed key via WebAuthn (platform TPM/Secure Enclave or security key). The verifier remains fully offline (no uploads, no network calls). If your environment supports it, you can include attestation evidence (public‑safe; trust evaluation is your org’s responsibility). See hardware attestation spec.

Note: some browsers/authenticators will return no attestation even when requested.
FieldValue
Public key fingerprint
Authenticator attachment
Attestation fmt
AAGUID
Evidence sha256
Evidence checks
WebAuthn requires a secure context (HTTPS). This feature does not “prove identity” by itself; it produces cryptographic evidence that an authenticator signed the receipt payload digest.
Enables offline verification without separate key files.
Ticket fields are included inside the signed payload. The verifier remains fully offline.
Used for local threshold policy evaluation (e.g., 2-of-3). SampleSpec
Policy:
Matched:
Ticket:
Approval id:
Bundle manifest hash:
Export attachment bundle Download air‑gapped kit
Speeds matching the attachment to JIRA/ServiceNow.
FieldValue
Base receipt sha256
Countersigned receipt id
Countersignatures
Countersignatures are reviewer-generated. Establishing signer identity is your org’s responsibility (e.g., device-provisioned keys / internal PKI).
Contents
FileExpectedComputedStatus
Non‑guarantee: verifies integrity + signatures. Does not certify semantic correctness or universal safety.