Quick Start
Add cryptographic audit logging in 5 minutes.
Prerequisites
- A SealTrail account — sign up free
- An API key from the dashboard
Your API key starts with
stl_live_ for production or stl_test_ for sandbox.
See Authentication for details.
Step 1: Log your first event
Send a POST to /v1/events with the actor, action, and optional resource and context.
SealTrail computes a SHA-256 hash and appends the event to a hash chain.
terminal
curl -X POST https://api.sealtrail.dev/v1/events \
-H "Authorization: Bearer stl_live_..." \
-H "Content-Type: application/json" \
-d '{
"actor": "user_123",
"action": "document.signed",
"resource": "doc_456",
"context": { "ip": "203.0.113.42" }
}'Step 2: Query events
Retrieve events with filters and cursor-based pagination. Filter by actor, action, resource, chain, or time range.
terminal
curl "https://api.sealtrail.dev/v1/events?actor=user_123&limit=10" \
-H "Authorization: Bearer stl_live_..."Step 3: Verify integrity
Verify that an event hasn't been tampered with. SealTrail re-computes the hash from the original payload and compares it with the stored hash.
terminal
curl "https://api.sealtrail.dev/v1/events/evt_abc123/verify" \
-H "Authorization: Bearer stl_live_..."
Verification is non-destructive and can be run at any time. Use it in your compliance workflows
or run it periodically to ensure data integrity.
What's next
- Authentication — API key format, scopes, and error handling
- API Reference — Complete endpoint documentation
- Concepts — How hash chains and verification work
- Error Handling — Error codes and retry strategies