{"version":"0.1.0-alpha.12","publicKey":"-----BEGIN PUBLIC KEY-----\nMDYwEAYHKoZIzj0CAQYFK4EEAAoDIgACka+yF8atsM3IhPqpDEss1fr+HY3oNMTj\nUKHH2ZdXk7g=\n-----END PUBLIC KEY-----\n","gitCommitHash":"13d3afaa31049048485b914e170d78aaef745d3e","quote":{"tdxAttestation":null,"error":"Tdx Not available: Tdx attestation error Tee attestation failed status: exit status: 1, \nstdout: \n , \nstderr: \n2026/05/08 10:50:07 [DEBUG] GET https://api.trustauthority.intel.com/appraisal/v2/nonce\nError: could not create report entry in configfs: mkdir /sys/kernel/config/tsm/report/entry1824455600: permission denied\nUsage:\n  trustauthority-cli evidence [flags]\n\nFlags:\n      --ccel                       When set, TDX evidence will include Confidential Computing Event Logs\n  -c, --config string              Trust Authority config in JSON format\n      --evl                        When set, TPM evidence will include UEFI event logs\n  -h, --help                       help for evidence\n      --ima                        When set, TPM evidence will include IMA runtime measurements\n      --no-verifier-nonce          Do not include an ITA verifier-nonce in evidence\n      --nvgpu                      Include NVGPU evidence in evidence output\n  -p, --policy-ids string          Trust Authority Policy Ids, comma separated\n      --policy-must-match          When set, the policy_must_match flag will be true in evidence output\n      --tdx                        Include TDX evidence in evidence output (root privileges required)\n  -a, --token-signing-alg string   Token signing algorithm to be used, support PS384 and RS256\n      --tpm                        Include TPM evidence in evidence output\n  -u, --user-data string           User data in base64 encoded format\n\n"}}