Start here
Run the live demo first, then work through the documentation in order.
Step 1

Live Demo

The full product is running at secure.imagineqira.com/app/. Start with the Demo Flow tab for a guided walkthrough of the end-to-end workflow: build envelopes, compare policies, export signed bundles, verify trust.

Open Live Demo
Step 2

Reviewer Brief

A concise memo covering the product overview, strongest capabilities, trust model, hardening status, limitations, and key files for code review. Written for fast comprehension.

Documentation
Four documents that give a complete picture of the system.

Trust Semantics Specification

Technical specification of every trust-related field in bundle verification output. Covers packet vs. envelope layers, integrity vs. signature vs. trust, the full truth table for all verification states, and what the semantics do not cover.

Review Commands

Copy-paste commands for running tests, starting services, building envelopes, exporting signed bundles, verifying with correct and incorrect keys, and confirming provider lockdown restrictions. Every command is tested and minimal.

Release Walkthrough

Step-by-step walkthrough of the strongest end-to-end workflow: build an envelope, compare policies, browse saved artifacts, export a signed bundle, verify it, then demonstrate trust failure states.

Threat Model

Current trust boundaries, adversary classes, out-of-scope claims, known weak areas, and findings from the internal adversarial review. Honest about what is protected and what is not.

Review artifacts
Canonical artifacts are generated fresh from the current code using non-sensitive demo secrets.

Generate review artifacts

If you have the repository locally, run the preparation script to generate a saved envelope, a signed bundle, and a verification summary:

uv run python scripts/prepare_review_artifacts.py

Artifacts land under data/review/, data/runs/, and data/bundles/. All secrets used are printed in the output. You can also run the full workflow interactively through the live demo without any local setup.

What to evaluate
Structured feedback is most useful in four categories.

Technical coherence

Does the system hold together? Are the trust semantics clear? Does the verification output make sense? Are the protocol boundaries well-defined?

Security posture

Are the hardening measures adequate for the stated trust model? Are the documented limitations accurate? What would you harden next?

Product clarity

Is it immediately clear what this system does and does not do? Does the positioning feel honest? Is anything confusing or misleading?

Adoption blockers

What would prevent you from using or recommending this system? What is missing? What feels weak?

Ready to review

Start with the live demo or contact us for a guided technical session.