| CODE | DESCRIPTION | |
| war | Warrants | |
| gag | Gag orders | |
| subp | Subpoenas | |
| trap | Trap and trace orders | |
| cease | Court order to cease operations | |
| duress | Coercion, blackmail, or otherwise operating under duress | |
| raid | Raids with high confidence nothing containing useful data was seized | |
| seize | Raids with low confidence nothing containing useful data was seized | |
| xcred | Compromised credentials | |
| xopers | Compromised operations |
| LEVEL | DESCRIPTION | |
| ▖ LOW | The canary can be authenticated to the original source by providing the DOMAIN it will be served at. This is a less secure method of authenticity as anyone with publishing access to the domain can modify the canary. | |
| ▞ MEDIUM | Authentication of the canary is done via ECDSA ( Curve25519 ) cryptographic signature of the JSON array by the public key provided inside as the variable PUBKEY. | |
| ▘HIGH | The ECDSA ( Curve25519 ) PUBKEY can be a split-key created by n-of-p in order to ensure multiple parties consent to updates of the canary. |