Skip to content

Quick Start

Add cryptographic audit logging in 5 minutes.

Prerequisites

Your API key starts with stl_live_ for production or stl_test_ for sandbox. See Authentication for details.

Step 1: Log your first event

Send a POST to /v1/events with the actor, action, and optional resource and context. SealTrail computes a SHA-256 hash and appends the event to a hash chain.

terminal
curl -X POST https://api.sealtrail.dev/v1/events \
  -H "Authorization: Bearer stl_live_..." \
  -H "Content-Type: application/json" \
  -d '{
    "actor": "user_123",
    "action": "document.signed",
    "resource": "doc_456",
    "context": { "ip": "203.0.113.42" }
  }'

Step 2: Query events

Retrieve events with filters and cursor-based pagination. Filter by actor, action, resource, chain, or time range.

terminal
curl "https://api.sealtrail.dev/v1/events?actor=user_123&limit=10" \
  -H "Authorization: Bearer stl_live_..."

Step 3: Verify integrity

Verify that an event hasn't been tampered with. SealTrail re-computes the hash from the original payload and compares it with the stored hash.

terminal
curl "https://api.sealtrail.dev/v1/events/evt_abc123/verify" \
  -H "Authorization: Bearer stl_live_..."
Verification is non-destructive and can be run at any time. Use it in your compliance workflows or run it periodically to ensure data integrity.

What's next