Skip to main content

Audit-Ready Case File

Last verified (UTC): 2026-03-06T00:00:00Z

Fololo Iris is a standalone proof-of-control product for self-hosted wallet checks. Its buyer-facing outcome is the audit-ready proof-of-control case file: a defensible artifact package that shows what was verified, how it was verified, and which controls protected the result.

What the case file contains

  • Challenge payload and verification context.
  • Verification method used (EIP-712, EIP-1271, BIP-322, or policy-approved fallback).
  • Wallet, network, timestamps, and verification result metadata.
  • Evidence integrity details such as file hash and generation metadata.
  • Policy-trace fields needed to explain why a method was accepted.

How auditors and reviewers validate it

  1. Confirm the challenge, wallet, and method line up with the recorded verification result.
  2. Check timestamps, integrity metadata, and hash-backed evidence details.
  3. Review whether the selected method matches the customer policy and jurisdiction profile.
  4. Verify access controls, retention rules, and incident-response handling through the linked trust docs.

Buyer review prompts this answers

Buyer promptFololo Iris answerSource
Evidence integrityEvidence metadata includes integrity verification details and download history.API Reference
Retention and audit trailEvidence generation and retrieval are backed by retention and audit workflows.Overview
Access controlAuditor access is scoped and time-bounded; operational access is separated from public API traffic.Overview
Incident responseBuyers can review public support channels and request diligence materials through the security process.Security

Limits and non-goals

  • Fololo Iris is not a full Travel Rule platform.
  • External Travel Rule provider adapters are not implemented in the base product.
  • The case file does not replace customer policy review or legal advice for jurisdiction-specific sufficiency questions.
  • Fololo Iris does not transmit VASP-to-VASP PII as part of the core proof-of-control workflow.

Public trust sources

Detailed architecture, incident handling, policy, and control-pack materials are distributed through buyer diligence channels instead of the public docs site.

Sample workflow

  1. Create a challenge.
  2. Verify proof-of-control by supported method.
  3. Retrieve evidence metadata.
  4. Download the case file artifact.
  5. Hand the artifact to compliance, audit, or procurement reviewers.