Private pilot cockpit · Demo + temporary key ready

Test trust receipts before production risk.

A controlled cockpit for testing Passpod receipt APIs: demo scenarios, temporary-key access, developer previews, operating principles, and ecosystem links.

Policy check first. Receipt second. Action last.
Wallets prove credentials. Passpod proves what happened around a request. DIDX verifies limited receipt state. PassPal makes it usable.
Demo available
Temporary key ready
Developer preview
Controlled pilot access
No private-document custody
No EUDI certification claim

API pilot scenarios

Every scenario is labeled clearly. No fake live APIs. No scoring language. No wallet-provider overclaim.

Controlled pilot access

Controlled pilot access is available for selected partner use cases. Public demos remain open; live testing uses scoped temporary keys.

Pilot access: demos stay open; live testing uses scoped temporary keys. Each pilot maps to one scenario, partner feedback loop, or dedicated vertical integration.
Starter Pilot

One scenario, clean validation.

Test one selected scenario in demo + temporary-key mode.

Partner Pilot

Multiple flows, shared feedback.

Test 2–3 scenarios with a shared feedback loop and walkthrough.

Vertical Pilot

Dedicated use-case pilot.

Focus on AI AgentTrust, Remote Worker TrustPass, Account Recovery, or Age & Guardian Safety.

Operating Principles

Short pilot boundaries for legal, security, and ecosystem reviewers.

Responsibility model

The requester makes the request. The user approves. The responsible party decides. Passpod issues a limited receipt. DIDX verifies receipt state.

Data boundary

No private identity documents or raw wallet credentials are collected by default.

Privacy & storage

No advertising cookies, no tracking cookies. Temporary pilot keys use sessionStorage. Language preference may be kept locally.

Developer & ecosystem links

Built for playground review, not slideware. Only reviewer-safe ecosystem links are shown.

Request controlled pilot access

The request is prepared locally and opens an email draft. Backend approval and key issuing will be added in the next version.

Boundary for reviewers

The requester makes the request. The user approves. The responsible party decides. Passpod issues a limited receipt. DIDX verifies receipt state.

Authorization: Bearer <temporary_pilot_key> No hardcoded keys. No localStorage for pilot keys. No key in URL. No private-document custody by default. No EUDI certification claim.
Live pilot access is intentionally controlled: scoped keys, selected scenarios, expiry, revocation, and reviewer permissions are part of the pilot boundary.