Documentation Index
Fetch the complete documentation index at: https://parmanasystems.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Compliance teams face a recurring challenge: when a regulator, internal auditor, or legal counsel asks “can you prove this decision was made by this policy, with these inputs, on this date?” — most systems cannot answer definitively. Parmana Systems’s verification model is designed specifically for this scenario. EveryExecutionAttestation is:
- Self-contained — it carries all information needed to verify it
- Portable — verification requires only the attestation and the public key
- Independently reproducible — the verifier does not need access to the database, runtime, or application code
The verification model
- The
ExecutionAttestationJSON (exportable from the audit database) - The public key (can be published openly — it verifies, not signs)
- The
parmanaCLI or the@parmanasystems/verifierpackage
Setting up the audit database
audit-db package stores the full ExecutionAttestation including the cryptographic signature. The signature is what allows post-hoc verification — even if the database row is later queried, the signature proves the attestation content has not been modified since it was first written.
Exporting a verification artifact
For a specific execution, generate a portable verification artifact:- The attestation fields
- Invariant check results
- Runtime manifest state
- Bundle manifest state
- All verification check outcomes
Independent verification
The compliance team can verify the artifact with theparmana CLI, which they can install independently:
Machine-readable output for CI/compliance tools
Strict mode for automated compliance gates
Verifying via the REST API
For systems that query the audit trail programmatically:What the signature proves
The Ed25519 signature over the canonical attestation JSON proves:- Authenticity — The attestation was produced by a runtime holding the corresponding private key
- Integrity — None of the attested fields (
decision,policyId,policyVersion,signalsHash,execution_state,runtimeHash) have been modified since signing - Non-repudiation — The signature cannot be produced without the private key; it cannot be forged
What it does NOT prove
- That the input signals themselves were correct (the signals are hashed, not embedded)
- That the policy file corresponds to a particular business intent (that is a policy governance question)
- That the key holder acted in good faith (key custody is an operational security question)
Compliance checklist
Publish the public key
Publish your Ed25519 public key in a trust root accessible to compliance teams. The key verifies attestations without enabling any signing.
Persist every attestation
Use
@parmanasystems/audit-db to store every ExecutionAttestation in PostgreSQL immediately after execution.Version-lock your policies
Never modify a published policy in place. Increment the version (
v1 → v2) and deploy new decisions against the new version. Historical attestations always reference the version that was active.Export artifacts on request
For any regulated decision, export a verification artifact with
npm run proof:verify and provide it to auditors along with the public key.