Skip to content
Home/Trust Center
EVIDENCE-BACKED TRUST

Public proof, buyer-ready routes, and honest readiness signals for HOWFAR.

Evidence-backed trust center. This page is designed so customers, partners, and reviewers can inspect what is verified now, what proof surfaces exist, and where work is still in progress.

Updated 5/15/2026, 10:11:53 PM16 proof routes7 diligence routes
11
Verified strengths
3
Enterprise signals
5
Open gaps
TRUST VIEW
Proof you can inspect instead of slogans you have to believe.

The Trust Center is meant to make diligence faster: machine-readable endpoints, public buyer surfaces, evidence-backed claims, and explicit disclosure of what is not fully proven yet.

  • Machine-readable trust routes
  • Buyer and diligence links
  • Known gaps called out directly
11Verified strengths
3Enterprise signals
5Open gaps

What is verified now

Evidence-backed scoring instead of fixed marketing numbers

16/16 checks currently pass across architecture, implementation, foundation, and operations.

Operational visibility is publicly exposed

Health, build, readiness, status, and metrics endpoints are committed and available for monitoring and verification.

Security-first platform foundations are already in place

The repo includes passkey/WebAuthn support, audit-aware administration, and scripted verification gates for deployment confidence.

Enterprise-facing routes are published

Status, security, compliance, pricing, support, contact, and investor-relations pages give buyers clear review surfaces.

Marketplace trust signals are now live

Verified buyer reviews, seller processing/refund operations, seller listing management, and buyer-side catalog controls are now shipped and test-covered.

Messaging and baseline activity flows now have session-backed proof

Direct messaging, wallet activity, notifications, and activity summary flows were revalidated in integration tests during the P0 proof-and-stability tranche.

Paid creator subscriptions are now proof-backed

Creator plan publishing, Stripe checkout settlement, webhook-driven entitlement activation, billing portal access, cancel-at-period-end, and refunds are now covered end to end.

Developer platform access is now explicit and rate-bounded

Sprint 3 adds owner-managed developer apps, one-time bearer key issuance, a verification endpoint, per-key rate limiting on agent chat, and generated contract/docs alignment.

Long-form publishing now runs on the shared platform runtime

Sprint 4 adds a real article editor, private drafts, public blog delivery, scheduled publish through the existing job queue, and audit-backed cancellation instead of a separate blog-only subsystem.

Creator analytics is now exportable and retention-bounded

Creators can load a session-backed dashboard, queue immutable snapshot refreshes, export CSV/JSON views, and inspect the raw-event TTL policy that feeds those aggregates.

Media posts now run on the shared content and media runtime

Sprint 6 adds photo and video attachments to the existing post pipeline, including asset ownership checks, media-only post creation, moderation payload enrichment, and inline feed playback/rendering.

Machine-readable proof

Readiness scorecard API

Machine-readable category scores derived from repo evidence and verification scripts.

Open proof route →
Trust center API

Summary of public proof links, buyer-ready routes, and known open gaps.

Open proof route →
Feature matrix API

Detailed capability-by-capability reality check showing which features are LIVE, PARTIAL, or PLANNED.

Open proof route →
Marketplace inventory proof

Public proof artifact covering stock deduction, sold-out transitions, seller publishing guards, and oversell prevention.

Open proof route →
Developer platform proof

Public proof artifact covering developer app registration, one-time key issuance, bearer verification, per-key limits, and docs/OpenAPI sync.

Open proof route →
Publishing engine proof

Public proof artifact covering long-form article drafts, public publishing, scheduled release, timezone capture, and audit-backed cancellation.

Open proof route →
Creator analytics proof

Public proof artifact covering dashboard availability, immutable snapshot aggregation, raw event retention bounds, and creator export surfaces.

Open proof route →
Media posts proof

Public proof artifact covering asset upload, media-only post creation, feed rendering, attachment quotas, and moderation-aware photo/video post delivery.

Open proof route →
Polls/Interactive proof

Public proof artifact covering poll attachments on posts, feed delivery of poll payloads, and server-enforced voting rules with anti-abuse constraints.

Open proof route →
Reputation system proof

Public proof artifact covering derived reputation scoring, anti-gaming caps, safety penalties without leaking enforcement details, and profile surfaces.

Open proof route →
Events & ticketing proof

Public proof artifact covering hosted events, free ticket RSVP issuance, and organizer-only check-in with server-enforced constraints.

Open proof route →
Build metadata

Reports the currently serving build commit and deployment context.

Open proof route →
Health check

Lightweight service health response with build-aware diagnostics.

Open proof route →
Readiness check

Runtime dependency readiness for the app shell and core APIs.

Open proof route →
Operational status

Fast status endpoint for uptime monitors and human spot checks.

Open proof route →
Metrics endpoint

Prometheus-style operational metrics for observability tooling.

Open proof route →

Buyer and diligence routes

Enterprise readiness signals

Buyer review surfaces are available now

Security, compliance, status, pricing, contact, and investor-relations routes are live for diligence and procurement review.

Verification gates are scriptable

Local verification, predeploy verification, live verification, and strict proof scripts are all present in package scripts.

Operational ownership is explicit

Public status surfaces pair with authenticated admin security and observability areas for internal operations.

Known open gaps

We do not treat “not yet proven” as “done.” These are the areas that still need more product or verification work before stronger claims would be fair.

Feature activation is still broader than the current live surface
high impact

The detailed feature matrix still includes PARTIAL and PLANNED capabilities, so the repo now tracks honest completion through a strict activation manifest instead of flipping everything to LIVE by declaration.

Public load and failover artifacts are still pending
medium impact

The k6 harness is in-repo and the Windows Docker path handling was hardened, but smoke/stress artifacts still need to be generated and published before stronger resilience claims are fair.

Browser E2E artifacts for commerce are still pending
medium impact

Marketplace and subscription critical paths are now integration-tested, but public browser E2E artifacts for seller onboarding, checkout, and self-serve billing are not yet published.

Developer platform is intentionally narrow in Sprint 3
medium impact

Bearer-key access is now live for approved routes, but webhook products, broader OAuth app execution flows, and SDK stubs remain future work instead of being implied as already shipped.

Independent accessibility evidence is still incomplete
medium impact

Automated accessibility proof now passes for the covered production routes, but manual screen-reader notes and independent audit artifacts are not yet published.

How to evaluate HOWFAR honestly

  1. Check the public proof routes and compare them against the routes you care about.
  2. Use the status, security, and compliance pages for diligence context.
  3. Ask for the exact critical-path proof you need instead of relying on broad slogans.
HOWFAR trust is meant to be inspectable, not decorative. If a claim matters to your rollout, ask for the route, script, endpoint, or evidence artifact behind it.
Dock