Proof Points: Why Trust This

We do not have a logo wall yet. What we have is a protocol with published specs, conformance tests, and a codebase that eats its own cooking. Here are the numbers.

Protocol Adoption

22
Conformance test vectors
8
Receipt schema versions
30+
Reason codes (deny/allow)
150+
Documentation pages

These are not projections. They are counts from the live repository. The conformance suite runs on every commit. Every schema version is backward-compatible. Every reason code has a defined semantic.

Open Source Transparency

The Clawsig Protocol is built in the open:

  • Protocol specification: Five primitives (WPC, CST, Receipt, Bundle, Verifier) with published JSON schemas and versioned semantics
  • Conformance suite: 22 test vectors covering receipt validation, bundle integrity, hash chain verification, and fail-closed edge cases
  • Reference verifier: Deterministic offline verification — no API keys, no network access, no trust assumptions beyond the signer's public key
  • Coverage matrix: Explicit M (shipped) / MT (tested) / MTS (planned) claims per primitive. No ambiguity about what exists

We publish what we have and label what we do not. The Security Review Pack contains the full technical breakdown.

Dogfooding: We Ship on Our Own Protocol

Every pull request to the Claw Bureau monorepo carries a verifiable proof trail:

  • DID-signed commit proofs: Each agent-generated commit includes a commit.sig.json with an Ed25519 signature over the commit SHA
  • Claw Verified PR check: A GitHub Actions workflow validates commit proofs and proof bundles before merge
  • Proof artifacts in-repo: All proofs live in proofs/<branch>/commit.sig.json — visible, auditable, and version-controlled

This is not a demo. It is our production workflow. The same protocol primitives we document on this site are the ones that gate our own code merges.

Architecture Credibility

Cloudflare Workers

300+ global points of presence. Hardware-isolated execution per request. No cold starts. Sub-300ms TTFB globally (verified: our top-10 pages average 120ms TTFB).

Ed25519 Signatures

Every receipt and proof bundle is signed with Ed25519. Compact (64-byte signatures), fast (microsecond verification), and quantum-resistant migration path (to Ed448 or ML-DSA).

SHA-256 Hash Chains

Events within a proof bundle are hash-linked. Modify any event and the chain breaks. Merkle roots anchor the chain for efficient third-party verification.

Offline Verification

The verifier needs only the bundle JSON and the signer's public key. No API calls. No platform access. No trust in the platform operator. This is the core differentiator.

What We Do Not Claim

Transparency means being honest about gaps:

  • We do not have named enterprise customers to reference (yet)
  • MTS (multi-tenant SaaS) primitives are planned, not shipped
  • The conformance suite covers the happy path thoroughly; adversarial fuzzing is in progress
  • On-premises deployment is available but has fewer production hours than our cloud deployment

We will update this page as each gap closes.

Run a two-week proof-of-concept on your stack

We will map your controls, deploy one workflow, and deliver a proof bundle you can hand to your auditor.

Book a session Security Review Pack