SIGN
sign
Turn security tool output into a CPOE. Try the signing flow below using demo keys, then sign with an API key or OIDC token when you're ready for production.
TRY IT FIRST
See signing in action
Paste JSON evidence or tool output and sign a demo CPOE. This is a real JWT-VC signed with a public demo keypair.
Generic JSONMapping PacksEvidence-OnlyAssessment Context
Watch corsair sign in action
corsair sign
LOADING RECORDING...
PRODUCTION
Sign with an API key or OIDC token
Use the signing API to generate verifiable CPOEs for your organization. Evidence is signed server-side with Ed25519.
Upload Evidence
PREFER THE CLI?
Sign from the command line
TERMINAL
# Install Corsair (pick one)
$ brew install grcorsair/corsair/corsair
$ npm install -g @grcorsair/cli
# Bun is required to run the CLI (Homebrew installs it via oven-sh/bun)
# Initialize (generates keys + example evidence)
$ corsair init
# Sign tool output
$ corsair sign --file tool-output.json --mapping ./mappings/toolx.json --output cpoe.jwt
# Verify the CPOE
$ corsair verify --file cpoe.jwt