Deploy verification
On-chain assertions after deployTrust
Make the platform legible before asking anyone to rely on it.
Averray already has concrete operational trust anchors: deploy verification, multisig setup, public schemas, and an audit handoff package designed for external review.
Multisig
2-of-3 operational setup docsAudit handoff
Single-doc package for reviewersPublic data
Schema-backed badge and profile readsRuntime
Live health and discovery surfaces are publicly inspectable.Operations
Verification, multisig, and audit handoff are documented as repeatable practice.Outputs
Public profile and badge documents remain readable beyond the app itself.Ops
Verification gate
Deployment verification asserts bytecode, ownership, pauser wiring, verifier/arbitrator/service operators, approved assets, and pause state before promotion.
Keys
Multisig playbooks
Hot / warm / cold key generation, SS58-to-EVM mapping for Polkadot Hub, testnet rehearsal, rotate-pauser, and lost-key recovery are documented.
Reviewability
Audit package
Scope, trust model, adversary model, invariants, known quirks, deployment parameters, and expected deliverables are all gathered in one place.
Trust posture
Trust should be verifiable from public evidence, not internal reassurance.
The strongest thing this page can do is reduce ambiguity. A healthy runtime, explicit operational controls, and schema-backed outputs give counterparties something concrete to inspect.
Counterparty checklist
- Open the health endpoint and verify auth mode plus service state.
- Inspect the discovery manifest and onboarding surfaces directly.
- Check that public identity outputs remain reachable and schema-backed.
Trust model
What is public, what is controlled, and what is verified
Public by design
- Discovery manifest and onboarding entrypoints
- Badge metadata and public wallet profiles
- Hosted schema documents and example assets
Controlled by role
- Poster and verifier actions stay wallet-gated
- Strict SIWE auth in production
- JWT rotation and revocation paths documented
Verified after change
- Deployment assertions against live contracts
- Ownership and pause controls checked on-chain
- Operational docs prepared for external auditors
Canonical docs
Signals you can verify now
Trust should not depend on private screenshots or promises
Health
Runtime status is public
The live health endpoint exposes the current service posture, auth mode, and key backend component status for the production API.
Discovery
Agent entrypoints are inspectable
The public manifest and onboarding JSON show what the system claims to support before anyone has to authenticate or take an operator on trust.
Identity outputs
Schemas and examples are public
Hosted schema docs, example assets, and live profile reads make it possible to inspect what the system emits, not just what it says it emits.
Operational checklist
What a healthy production change should preserve
- Public reads stay live on `averray.com` and `api.averray.com`.
- Wallet-gated mutations remain strict and role-aware.
- Contract ownership, pauser, verifiers, and approved assets remain wired correctly.
- Badge and profile documents remain schema-valid and publicly reachable.