SifrBolt Documentation

Documentation to understand the SifrBolt platform and use it effectively.

Why this matters

Each plan maps to a signed manifest. Validate the manifest whenever you need to confirm which packs and limits are available.

Plan Overview

PlanBest forHighlightsVerify
SparkSolo storefronts proving out SifrBoltLaunch accelerator, core performance automationManifest key spark
SurgeMulti-brand teams scaling experimentationAdds edge cache orchestration, image IQ, partner handoffsManifest key surge
StormRegulated or high-traffic commerceCompliance packs, DB automation, risk interlocksManifest key storm
CitadelEnterprise fleets & agenciesZK attestations, SSO/SAML, enterprise governanceManifest key citadel

How to Validate a Plan

Signature check

  1. Head to the Trust Center and download the license manifest JSON.
  2. Verify the manifest with the CLI (e.g., bunx @sifrbolt/verify manifest --plan <code>storm</code> --file manifest.json).
  3. Share the signed output with procurement or your security office.

Upgrades & Add-Ons

  • Enterprise Controls: Add-on for Surge and Storm when SSO/SAML or advanced WAF routing is required.
  • Agency Toolkit: Unlocks blueprint automation and SLA hooks for partner rollouts.
  • Proof Concierge: Our team manages bespoke attestation packs for your regulators.

For commercial questions, contact your account team or email success@sifrbolt.com. They will point you to the right manifest and paperwork.


Add regional pricing, promotions, or procurement paperwork under docs/src/pages/plans/ as they become available.