← Back to GhostReceipt

Security

GhostReceipt is built with security and privacy as core principles.

Architecture

Threat Model

GhostReceipt protects against:

Trust Assumptions

You must trust:

Security Headers

GhostReceipt implements:

Data Flow

  1. User enters transaction hash and claim parameters
  2. Client calls primary oracle route and only retries the configured edge backup route for unavailability failures
  3. Oracle fetches canonical blockchain data from the primary provider cascade
  4. Oracle attempts peer consensus validation (mode-dependent)
  5. Oracle signs canonical commitment data with Ed25519 and emits validation label metadata (consensus_verified, single_source_fallback, or single_source_only)
  6. Browser builds witness from oracle payload + user claim
  7. Browser generates zero-knowledge proof locally
  8. Shareable receipt contains only proof + public signals

Reporting Security Issues

Found a security vulnerability? Please report it privately:


Audits

Please audit the code and report any issues if you find any. Security reports are welcome via GitHub issues with [SECURITY] tag or direct contact.