Research Preview — APIs may change. GitHub
What you are trusting
We’re transparent about what’s verified and what’s assumed because trust is the product. This page gives an honest accounting of the current trust assumptions and where they’re headed.Current trust assumptions
| Assumption | Status | Notes |
|---|---|---|
| TEE executes code correctly | Verified | EigenCompute provides hardware attestation |
| Astral operates service honestly | Required | Single operator in MVP |
| Signing key held securely in TEE | Verified | Key cannot be extracted by operator |
| Input locations are truthful | Not verified | GPS is spoofable; future work |
Location inputs are not verified
Astral verifies computation, not location. Until location proof plugins are integrated, you are trusting that the GPS coordinates provided as input are honest. GPS is spoofable. A user can claim to be anywhere. The signed result proves that if the user was at location A, then they were within 500m of location B. It does not prove the user was actually at location A. This is why we’re developing the Location Proof framework — to provide evidence-based location claims that feed into Astral for a fully verifiable pipeline. As proof mechanisms mature, they plug directly into the existing system. Be direct with your users: if your application depends on truthful location inputs, communicate that the location data is currently trust-based.What verification buys you today
Even with these assumptions, verifiable computation is meaningful:- The computation is correct. You know the spatial relationship was evaluated faithfully, not fabricated.
- The inputs are recorded.
inputRefslet you audit which data went into the computation. - The result is tamper-evident. The signature proves the output came from the attested environment.
true or false with no proof.
The path forward
AVS Consensus
Multiple independent operators run the computation. Results must match to be accepted. No single operator can lie.
ZK Proofs
Cryptographic proof that the computation was correct. Verifiable by anyone without trusting the prover.
Decentralized Signers
Multi-party computation for result signing. No single party holds the full key.
Next: Security considerations
Threat model, known limitations, and responsible disclosure