Before you can submit signed receipts, VaultGraph needs the full deployment context in place:Documentation Index
Fetch the complete documentation index at: https://docs.vaultgraph.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
- A vendor
VAULTGRAPH_API_KEY - An agent record
- A deployment for that agent workflow
- A deployment signing key registered from your Ed25519 public key
- The matching
VAULTGRAPH_PRIVATE_KEY
1) Create your vendor API key
- Sign in at app.vaultgraph.com
- Switch to your vendor organization
- Open Org Settings → API Keys
- Click Create API key and copy it
VAULTGRAPH_API_KEY in your server environment.
Never expose API keys in browser/client code. Keep them in your backend
secrets manager or server-only environment variables.
2) Create the agent and deployment
Create the resources that VaultGraph uses to attribute receipts:- Create or open the target agent in the portal
- Create a deployment for that agent
- Copy the deployment short ID (
dep_...) for your backend configuration
deployment_id.
3) Generate your Ed25519 keypair
Use any of these options to generate PEM-encoded keys:VAULTGRAPH_PRIVATE_KEY
4) Register the public key on the deployment
Signing keys are managed only in the VaultGraph portal UI. After generating your keypair:- Create or open the target deployment in the portal
- Open the deployment actions menu and select the key action
- Paste the public key and save it as an active signing key for that deployment
public_key matches an active signing key registered on the target deployment.
5) Add credentials to your environment
Example:6) Submit receipts from your backend
Once setup is complete, your agent integration is straightforward:- Let the agent finish a job in your application
- Hash the sensitive context locally
- Sign the receipt with your Ed25519 private key
- Submit the signed receipt with your API key and deployment ID
What happens under the hood
| Step | Who | What |
|---|---|---|
| Hash | Your backend | Runs prepareReceiptContext() on sensitive data before submission |
| Sign | Your backend | Signs the canonical receipt JSON with your Ed25519 private key |
| Submit | Your backend | POSTs the signed receipt with x-api-key auth, deployment_id, and the matching public key |
| Verify | VaultGraph | Resolves the active deployment signing key by public key and validates the signature |
| Score | VaultGraph | Computes trust scores from persisted receipt outcomes |
| Display | VaultGraph | Surfaces receipts, trends, and trust metrics in organization, agent, and deployment views |