ACME Inc.
Live, cryptographically-verifiable trail of every action ACME Inc's AI has taken. Every entry below is a signed Receipt of Record anchored in a tamper-evident transparency log — verifiable offline against our published key.
Transparency log status
b8715b967180b647a70f71978902d150a1b8c623912026ba54a077e353b9a692Pin this hash. If it changes for any historical entry, the log was rewritten — and the published Ed25519 key chain will tell you exactly where. Live JSON.
Recent verified actions
check-vendor-onboarding-path@v1check-eu-ai-act-classification@v1check-data-subject-request-path@v1check-data-handling-class@v1check-vendor-payment-terms@v1check-expense-approval@v1check-customer-health-score@v1check-customer-escalation-path@v1lookup-pipeline-summary@v1check-deal-discount-approval@v1check-vendor-onboarding-path@v1check-eu-ai-act-classification@v1check-data-subject-request-path@v1check-data-handling-class@v1check-vendor-payment-terms@v1check-expense-approval@v1check-customer-health-score@v1check-customer-escalation-path@v1lookup-pipeline-summary@v1check-deal-discount-approval@v1Verify it yourself
Three public endpoints let any party confirm offline that an action above is what it claims to be. No Ctrl AI account required.
- 1Fetch the published key
GET /.well-known/ctrlai/receipt-keysreturns the Ed25519 public key (JWKS). - 2Pull a receipt
GET /api/receipts/<receiptId>returns the signed payload + inclusion proof. - 3Verify locally
Confirm the Ed25519 signature, recompute
sha256(prevRootHash || leafHash), and pin the head to detect later rewrites.