NEXTGENRAILS™ | SOFTWARE INTEGRITY RECEIPT AUTHORITY

From trust-based software claims to cryptographic proof.

CBOM Compliance transforms supported software manifests into deterministic, cryptographically signed verification receipts that can be independently verified.

Deterministic verification • signed receipts • independent public-key validation

CycloneDX / SPDX JSON SHA-384 Fingerprint Merkle Root Derivation Signed Receipt Public-Key Verification
Zero Retention Deterministic Outputs Signed Receipts Independent Verification
System Output

What You Receive

Authority Output

Each verification run produces a deterministic, signed receipt artifact tied directly to the submitted manifest and designed for independent validation outside this interface.

Receipt Status
SIGNED
Fingerprint
SHA-384
Structure Proof
Merkle Root
Verification Path
Public Key
Issued Artifact
Signed, time-bound proof of manifest state with independently verifiable receipt output.
Verification Workbench

Manifest Verification

System Idle

Submit a supported JSON manifest to generate a signed verification receipt.

Verification Tier
Standard = proof only. Advanced = proof + intelligence + time-aware re-evaluation.
Controlled Issuance
Signed receipt issuance is usage-metered and access-controlled.
Each purchase currently includes 10 signed receipts.
For enterprise usage or verification inquiries:
ngr.admin@proton.me
Sample manifest preview
Click "Load Sample" to preview a test manifest.

Data Handling & Verification Model

Submitted manifests are processed transiently for the sole purpose of generating a signed verification receipt.

No uploaded data is stored, retained, indexed, or shared. Processing occurs in-memory within a serverless execution context and is discarded after computation.

Issued receipts are signed by the system and can be verified independently using the public verification key endpoint.

No persistent storage • No manifest logging • No database retention of uploaded contents

Live Scope

System Status & Receipt Scope

Service
Checking…
Mode
Checking…
Timestamp
Checking…
Protocol
Checking…

Receipt Scope

  • Cryptographically signed verification receipt
  • Manifest SHA-384 fingerprint
  • Merkle-root derivation result
  • Timestamped validation record
  • Public-key verification path
  • Advanced tier: risk analysis, source-backed intelligence, and time-aware re-check

The receipt is designed to function as machine-readable verification evidence, not as a blanket claim of software safety or regulatory approval.

Public verification key endpoint: /.netlify/functions/public-key
Verification Model
Proof of submitted manifest state at issuance time, with signed output and independent validation path.
Authority Boundary
This system proves the submitted input and signs the resulting receipt. It does not claim full runtime truth or automatic legal compliance.
Output

Verification Result

No manifest verified yet.
System Interpretation

How This Works