Auditor Path
> Inspect, Reveal, Enforce
Look up anchored commitments, inspect sealed blobs, and only then decide whether the slash path is justified.
Same backend URL as the operator: Send uses same origin (Next.js → SAIL_API_PROXY_TARGET). The operator's Reveal inbox polls GET /api/axl/recv on that same host — if their Next proxy points elsewhere, their inbox is a different AXL queue than yours. Matching ENS to a peer id only proves DNS/state lines up; it does not route packets across two Railway vs localhost backends or through NAT.
Send a formal SEAL — Audit request to the operator’s AXL peer (from ENS text record axl_peer_id). The operator can Accept or Deny over the same channel (topic sail.seal.audit).
Connect your wallet so the wire message includes your auditor address.
Decrypt & Verify commitment
Calls GET /api/audit/:hash with your wallet as the auditor. Backend decrypts via Lit Chipotle (enforcing SAIL.isAuthorized on-chain inside the TEE) and verifies keccak256(plaintext) === commitmentHash.
Connect wallet — your address is passed as the auditor.