VerdifaX

Security & trust

Verdifax is a security product. This page describes the controls, the threat model, the assumptions, and the limits of what the platform protects against. Security promises are stated narrowly so they can be audited.

Last updated: April 30, 2026

Threat model

Verdifax is built to defend against operators and infrastructure providers (including Verdifax itself) tampering with execution after the fact. The platform is not designed to prevent the user's own program from being incorrect, malicious, or biased — those are evaluation problems upstream of the attestation pipeline. See What the Manifest Hash proves for the precise scope of the cryptographic claim.

Cryptographic primitives

All hashing uses SHA-256. Canonicalization uses RFC 8785 (JSON Canonicalization Scheme). The zero-knowledge layer (ZKSP) uses a formally-verified prover whose status field must equal the literal string VERIFIED_SOUND_COMPLETE_ZK for the run to seal. Anything else aborts the manifest. We do not invent cryptography; we compose audited primitives.

Hardware root of trust

Stage 5 of the pipeline incorporates a hardware attestation measurement. Production runs are bound to either a TPM 2.0 quote or an AMD SEV-SNP attestation report. The Decentralized Root of Trust (DEROT) requires a 3-of-5 quorum so that no single hardware vendor or operator can forge a manifest.

Determinism guarantees

Identical inputs produce identical manifest hashes byte-for-byte across languages and architectures. This is a primitive of the system, not an aspiration — it is enforced by the §0 specification and tested by the cross-architecture determinism audit.

Independent verification

Every Verdifax manifest can be re-derived by a verifier that does not trust Verdifax. The DCAE Verification Service and the VFA Independent Verifier run outside the Verdifax runtime, recompute every hash, and return either independent_verified = true or a specific failure reason. There is no privileged path that bypasses verification — not even for the Verdifax operator.

Data handling

Verdifax never stores the raw input bytes you attest. Payloads are canonicalized, hashed, sealed into an envelope, and discarded. The only payload-derived value retained on disk is the envelope hash. Model weights, IAM tokens, and customer records do not enter the Verdifax substrate and cannot be exfiltrated through it.

Access controls

Production access is gated by hardware-backed multi-factor authentication, role-based authorization, just-in-time credentials, and per-action audit logging. Engineers cannot access customer payloads in production. Administrative actions are themselves attested and emit their own VFA artifacts.

Vulnerability disclosure

Security researchers may report suspected vulnerabilities to security@verdifax.com. We acknowledge reports within forty-eight (48) hours and aim to triage within five (5) business days. We do not take legal action against researchers acting in good faith and within the scope of our responsible-disclosure policy.

Compliance posture

Verdifax is designed to satisfy the evidence-of-execution requirements of:

  • EU AI Act, Article 13 — logging and traceability
  • HIPAA 45 CFR § 164.312(b) — audit controls
  • SOX § 404 — IT change controls
  • FedRAMP — attestation and continuous monitoring

Compliance certifications are issued at the operator level, against specific deployments. See the Compliance section for guidance on producing audit-ready evidence packs from Verdifax artifacts.

What Verdifax does not protect against

To keep the security promise narrow and auditable, we list the out-of-scope items explicitly:

  • Verdifax does not certify that a model's output is correct
  • Verdifax does not certify training-data licensing or representativeness
  • Verdifax does not authenticate the human user — wire your IAM into the inputs you attest
  • Verdifax does not prove that the values inside a payload describe reality (input authenticity is upstream of the pipeline)

The narrow scope is the source of the cryptographic strength. See What the Manifest Hash proves for the full list.

Contact

Security questions can be sent to security@verdifax.com. Please use PGP for sensitive disclosures; the public key is on the security page at verdifax.com/security.