Why integrity proof matters
Every Confidential AI response comes with a cryptographic signature. This signature proves the AI output came from verified TEE hardware and nobody tampered with it along the way. The signature cryptographically binds the request and response to the TEE’s signing key. Any modification to the AI’s response or injected fake data will break the signature verification. Without this check, you’re trusting the transport layer. With it, you have end-to-end cryptographic proof from the TEE itself.Get the signature
After you make an AI request, you’ll get achat_id in the response. Use it to fetch the cryptographic signature:
text field contains hashes of your request and the AI’s response, separated by a colon. The signature is the cryptographic proof from the TEE. The signing_address identifies which TEE instance signed this response.
Verify request and response hashes
Confirm the hashes in thetext field match your actual request and response. The text field format is request_hash:response_hash.
Verify signature
Now verify that the signature actually came from a TEE. You’ll recover the signing address from the signature, then fetch and verify the attestation for that specific address.Recover signing address from signature
For ECDSA signatures (most common), recover the Ethereum address:Fetch attestation for signing address
Now fetch a fresh attestation for this specific signing address. This proves the signing key belongs to verified TEE hardware:all_attestations array containing attestations from multiple backend servers. You filter by signing_address to find the one matching your signature.
Verify the attestation
Finally, verify this attestation using all the checks from Verify Attestation:- Verify Intel TDX quote
- Verify report data binds the signing address and nonce
- Verify NVIDIA GPU attestation
- Verify Docker compose manifest and mr_config
- Verify Sigstore build provenance
Verify using Etherscan (optional)
Want to double-check visually? Use Etherscan’s signature tool. Enter thesigning_address from your attestation report, paste the text field from the signature response, and add the signature value. Click verify and Etherscan will confirm everything matches.
This gives you an independent third-party verification that the signature is valid.
Complete example
For a full implementation that verifies both attestation and signatures, see the signature verifier example. This script demonstrates the complete flow:- Send chat completion request (streaming or non-streaming)
- Fetch signature for the response
- Verify request and response hashes match
- Recover signing address from ECDSA signature
- Fetch fresh attestation for that signing address
- Verify full attestation (TDX quote, GPU, report data, compose manifest, Sigstore)

