The Problem
Production deployments are irreversible. Once code is running, you can't un-deploy it. Bad deploys cause outages, data loss, and security incidents.
Most teams rely on manual approval in Slack or email. That doesn't scale, creates bottlenecks, and leaves no cryptographic proof of who authorized what.
The TrigGuard Solution
Add one API call before your deploy command. TrigGuard evaluates the deployment against your policies and returns a decision.
Pre-Deploy Gate
Block deploys that violate policy. Time windows, branch protection, environment restrictions.
Signed Receipts
Every authorized deploy gets a cryptographic receipt. Verify offline. Audit forever.
CI/CD Integration
GitHub Actions, GitLab CI, CircleCI, ArgoCD. Native integration in 5 minutes.
Fail-Closed
If TrigGuard can't evaluate, the deploy is blocked. No silent failures.
GitHub Actions Example
# Block unauthorized deploys
- name: TrigGuard Authorization
uses: trigguard/authorize@v1
with:
surface: deploy.release
action: promote-to-production
context: |
commit: ${{ github.sha }}
branch: ${{ github.ref_name }}
actor: ${{ github.actor }}
- name: Deploy (only if PERMIT)
if: steps.trigguard.outputs.decision == 'PERMIT'
run: ./deploy.sh
Policy Examples
Start Protecting Deploys
Add deployment authorization to your CI/CD pipeline in under 10 minutes.