-
Notifications
You must be signed in to change notification settings - Fork 0
Threat Model
Navigation
- Home
- What is TrustSignal
- Architecture
- Verification Receipts
- API Overview
- Quick Verification Example
- Vanta Integration Example
Related pages: Security Model · Evidence Integrity Architecture
This page summarizes the external threat model for TrustSignal at the public integration boundary. It is intended for developers, security reviewers, and integration partners evaluating how TrustSignal handles verification requests, receipt lifecycle operations, and downstream evidence use.
The scope of this page is the public-facing product contract. It does not document proprietary verification engine implementation details.
In scope:
- the
/api/v1/*integration surface - the
/v1/*JWT surface - receipt retrieval, verification, revocation, and anchoring flows
- authentication, authorization, validation, rate limiting, and response behavior
- trust boundaries between client systems, the gateway, stored receipt state, and downstream evidence consumers
Out of scope:
- private verification engine implementation details
- proof internals
- scoring logic
- model details
- internal deployment topology
flowchart LR
A[Partner or Client System] --> B[TrustSignal Gateway]
B --> C[Verification and Receipt Layer]
C --> D[Stored Receipt State]
D --> E[Audit or GRC Consumer]
A -. Auth and scoped access .-> B
B -. Validated, shaped responses .-> A
- verification receipts and their lifecycle state
- receipt identifiers and hashes used in downstream audit processes
- authorization context for verification, anchoring, and revocation operations
- audit-facing evidence payloads such as the Vanta integration result
- sensitive request content and metadata handled at the API boundary
- prevent unauthorized access to verification and receipt lifecycle routes
- prevent unauthorized revocation or anchoring actions
- reduce the risk of tampered, stale, or misleading receipt use
- minimize exposure of sensitive request data
- ensure dependency failures are surfaced safely and do not silently downgrade trust
| Threat Area | Example Risk | Public-Surface Mitigations |
|---|---|---|
| Authentication bypass | Unauthenticated caller reaches protected endpoints | JWT checks on /v1/*; scoped x-api-key enforcement on /api/v1/*
|
| Authorization misuse | Caller uses the wrong scope for read, verify, anchor, or revoke actions | Scope checks at the gateway before handler execution |
| Request tampering | Invalid or malformed payloads drive unintended behavior | Schema validation and route-level request guards |
| Receipt misuse | Consumer relies on an outdated or revoked receipt | Receipt verification and lifecycle endpoints expose current state |
| Unauthorized revocation | Caller attempts to revoke a receipt without issuer authority | Revocation requires both API authorization and signed issuer headers |
| Dependency failure masking | Upstream or dependency failures look like successful verification | Explicit error handling and fail-closed behavior on critical paths |
| Abuse or enumeration | Repeated calls attempt discovery or service exhaustion | Global and per-key rate limiting, bounded error responses |
| Sensitive data exposure | Request data or evidence content leaks via logs or responses | Redaction, response shaping, and data minimization guidance |
sequenceDiagram
participant C as Client
participant G as Gateway
participant R as Receipt State
C->>G: Authenticated request
G->>G: Validate scope and payload
G->>R: Read or update receipt state
R-->>G: Current lifecycle state
G-->>C: Bounded response
Key lifecycle risks include:
- creating a receipt from an invalid or malformed request
- retrieving a receipt without the required access scope
- acting on a revoked or missing receipt
- treating a transport success as equivalent to a valid verification outcome
Relevant routes:
POST /api/v1/verifyPOST /api/v1/verify/attomPOST /v1/verify-bundle
Primary concerns:
- malformed or oversized requests
- unauthorized verification attempts
- unsafe handling of upstream dependency failures
Relevant routes:
GET /api/v1/receipt/:receiptIdGET /api/v1/receipt/:receiptId/pdfPOST /api/v1/receipt/:receiptId/verifyPOST /api/v1/receipt/:receiptId/revokePOST /api/v1/anchor/:receiptId
Primary concerns:
- receipt identifier enumeration
- unauthorized lifecycle changes
- use of stale lifecycle state by downstream systems
Relevant routes:
GET /api/v1/integrations/vanta/schemaGET /api/v1/integrations/vanta/verification/:receiptId
Primary concerns:
- exporting evidence for the wrong receipt
- overexposing sensitive information in downstream payloads
- confusing technical verification outputs with legal or compliance determinations
Security reviewers should focus on:
- auth and scope enforcement at the route boundary
- bounded and non-sensitive error behavior
- revocation authorization requirements
- receipt lifecycle correctness
- evidence payload minimization
- separation between public gateway code and private verification logic
This threat model describes the public product boundary and current code-level controls. It should not be used to claim:
- a complete certification outcome
- infrastructure guarantees without environment-specific evidence
- formal assurance of private engine behavior that is not documented here