Integration Templates#
These pages are the public integration surface for the current ProvnAI, VEX, and McpVanguard ecosystem. Each template is narrow on purpose, uses the API, CLI, or runtimes that exist today, and calls out current limits instead of hiding them.
Everything in this section is built from the public VEX and McpVanguard surfaces that exist today, including the current API, CLI, Rust crates, and SSE gateway path. If a flow still requires a local JWT signer, crate-level usage, or specific Railway variables, that limitation is stated on the page.
Start Here#
If you are evaluating VEX on Railway, start with Deploy VEX on Railway. If you are evaluating McpVanguard on Railway, start with McpVanguard on Railway.
Published Templates#
| Template | Uses | Primary artifact | Best for |
|---|---|---|---|
| Deploy VEX on Railway | Railway + API | Running evaluation instance | Standing up a self-serve VEX evaluation environment |
| McpVanguard on Railway | Railway + SSE | Remote MCP gateway | Evaluating the McpVanguard deployment and connection path |
| Agent Execution Queue | API | Agent record + queued job result | Evaluating the authenticated VEX HTTP contract |
| Verifiable Pipeline Audit Trail | CLI | Audit export verification result | Evaluating tamper detection and offline verification |
| Proof Anchoring Receipt Flow | Rust crate | AnchorReceipt JSON | Evaluating proof generation and receipt verification |
Deploy on Railway
Minimal deploy instructions, environment variables, health checks, and evaluation caveats for running the current API surface on Railway.
McpVanguard on Railway
Deploy the current McpVanguard SSE gateway on Railway, validate health, and connect a remote MCP client with the right auth headers.
Agent Execution Queue
Create an agent, queue execution, and poll the resulting job using the documented HTTP contract.
Verifiable Pipeline Audit Trail
Generate known-good and tampered audit exports, then verify them with the current `vex verify` CLI.
Proof Anchoring Receipt Flow
Anchor a Merkle root with `FileAnchor`, inspect the emitted receipt, and validate it with the same backend.
Downloadable Helpers#
- create-agent-request.json
- execute-agent-request.json
- mcp-vanguard-remote-config.json
- mint-integration-jwt.mjs
What This Section Answers#
- What endpoint or command should I call first?
- What exact fields do I need to pass?
- What artifact do I get back?
- How do I inspect or verify the result?
- What is usable now, and what still has operational constraints?