← Back to GhostReceipt

Security

GhostReceipt is built with security and privacy as core principles.

Architecture

Threat Model

GhostReceipt protects against:

Trust Assumptions

You must trust:

⚠️ Important: GhostReceipt is experimental software with a centralized oracle trust anchor. A valid receipt proves constraints against oracle-signed data, not trustless full chain-state verification.

Security Headers

GhostReceipt implements:

Data Flow

  1. User enters transaction hash and claim parameters
  2. Oracle fetches canonical blockchain data
  3. Oracle signs canonical commitment data with Ed25519
  4. Browser builds witness from oracle payload + user claim
  5. Browser generates zero-knowledge proof locally
  6. Shareable receipt contains only proof + public signals

Reporting Security Issues

Found a security vulnerability? Please report it privately:

Audits

GhostReceipt has not been formally audited. Use with appropriate caution for your use case.