Documentation Index
Fetch the complete documentation index at: https://docs.truthlocks.com/llms.txt
Use this file to discover all available pages before exploring further.
How Evaluation Works
- The signal is ingested into
risk_signals - Your active policy rules are evaluated (highest priority match wins)
- A
risk_decisionrecord is created with the outcome - If
mint_receipt: trueandissuer_id/kidare provided, afraud_decision_receiptis minted via the attestation service
Decision Outcomes
| Action | Meaning |
|---|---|
allow | No policy matched or score below all thresholds |
challenge | MFA or step-up authentication required |
block | Reject the action entirely |
review | Route to manual fraud review queue |
Built-in receipt types
| Receipt Type | Purpose |
|---|---|
fraud_decision_receipt | Records allow/challenge/block/review decision |
ato_alert_receipt | Records ATO alert events |
risk_block_receipt | Proves an action was blocked |
deepfake_detection_receipt | Records deepfake scan results |
Request
Signal type:
velocity, ato, deepfake, impersonation, geo_anomaly, behavior, device_fingerprintSubject identifier.
Risk score (0–100).
Defaults to
user.If
true, mints a fraud_decision_receipt after evaluation. Requires issuer_id and kid.Issuer UUID for receipt minting.
Key ID for receipt signing.
Response
allow | challenge | block | reviewUUID of the risk decision record.
UUID of the ingested risk signal.
UUID of the matching policy rule (if any).
UUID of the minted receipt (only if
mint_receipt: true and succeeded).
