Notification Channels
Configure how Shield sends alerts to your team. Choose from email, Slack, Teams, PagerDuty, webhooks, and in-app notifications. Route alerts by severity, category, or custom rules.
Supported Channels
1. Email
Send alerts via email to individuals or distribution lists.
Setup:
- Go to Shield → Settings → Notification Channels
- Click Add Channel → Email
- Enter recipient email (individual or group)
- Test delivery: Click Send Test Email
- Save
Features:
- HTML-formatted email with full alert details
- Unsubscribe link (for individual recipients)
- Includes suggested correction (if available)
- Clickable link to open alert in dashboard
Best for: Formal notifications, audit trail, non-urgent alerts
Example email:
Subject: Shield Alert: Hallucination Detected (Medium Severity)From: alerts@truthvouch.com
Alert Details─────────────Severity: MediumType: HallucinationFact: "TruthVouch Series A funding was $50M"AI Engine: ChatGPTDetected: 2024-03-15 14:32 UTC
What AI Said"TruthVouch raised $50M in Series A funding from Sequoia Capital"
Your Truth"TruthVouch raised $40M in Series A (Sequoia, others)"
Suggested Correction: [View & Approve] [Edit Truth Nugget] [Dismiss]
Review full alert: [Open in Dashboard]2. Slack
Send alerts to Slack channels or direct messages.
Setup:
- Click Add Channel → Slack
- Authorize TruthVouch Slack app (OAuth)
- Select target channel (#security-alerts, @john, #product, etc.)
- Configure message format (summary vs. detailed)
- Test: Click Send Test Message
Features:
- Rich message formatting with buttons
- Quick actions: “Approve Correction”, “Dismiss”, “Investigate”
- Threading for related alerts
- Configurable emoji/icons per severity
Slack message example:
:warning: Medium Severity AlertHallucination detected in "TruthVouch funding" factChatGPT claimed: $50M (your fact: $40M)
[Approve Correction] [Dismiss] [View Details]Best for: Real-time alerts, team collaboration, quick triage
3. Microsoft Teams
Send alerts to Teams channels or direct messages.
Setup:
- Click Add Channel → Microsoft Teams
- Authorize TruthVouch Teams app
- Select target team/channel
- Configure message formatting
- Test delivery
Features:
- Adaptive cards with full alert details
- Action buttons for quick response
- Threading and mentions (@channel, @person)
- Integrates with Teams workflows
Best for: Organizations using Teams; enterprise communication
4. PagerDuty
Trigger PagerDuty incidents for critical alerts.
Setup:
- Click Add Channel → PagerDuty
- Enter PagerDuty API key (from PagerDuty integration settings)
- Select escalation policy (who gets paged)
- Configure trigger rules (which alert severities trigger incidents)
- Test: Click Send Test Incident
Features:
- Creates incident in PagerDuty on-call dashboard
- Responder can acknowledge/resolve from PagerDuty
- Escalates if not acknowledged within X minutes
- Integration with incident management workflows
Best for: Critical alerts requiring immediate response
Example config:
- Trigger PagerDuty incident if:
- Alert severity = Critical OR
- Same fact hallucinated 3+ times in 1 hour
- Escalation policy: “AI Governance On-Call”
- Auto-resolve PagerDuty incident when Shield alert resolved
5. Webhooks
Send alerts to custom endpoints (your own system, Zapier, etc.).
Setup:
- Click Add Channel → Webhook
- Enter webhook URL (must be HTTPS)
- Optionally: Add custom headers (authentication)
- Test: Click Send Test Webhook
Features:
- HTTP POST with JSON payload
- Retries on failure (3 attempts with backoff)
- Signed requests (HMAC signature for verification)
- Customizable payload
Example webhook payload:
{ "event": "alert.created", "alert_id": "alt_abc123", "severity": "medium", "type": "hallucination", "fact": "TruthVouch Series A funding was $50M", "ai_response": "TruthVouch raised $50M in Series A", "truth_nugget": "TruthVouch raised $40M in Series A", "confidence": 0.92, "timestamp": "2024-03-15T14:32:00Z", "detection_url": "https://truthvouch.com/shield/alerts/alt_abc123"}Best for: Custom integrations, automation, advanced workflows
Example use case: Send alerts to your internal incident management system (Jira, ServiceNow, etc.)
6. In-App Notification
Alerts visible in Shield dashboard notification center.
Features:
- Bell icon shows unread count
- Click to see all alerts
- Mark as read/unread
- Filter by severity, type, date
Always enabled (cannot disable)
Best for: Internal reference; secondary notification method
Routing Rules
Route alerts to different channels based on severity, category, or custom conditions.
Default Routing
Critical & High Severity:
- Email to Security team
- Slack #security-alerts
- PagerDuty (page on-call)
Medium Severity:
- Email to relevant team owner
- Slack #product-alerts
Low Severity:
- In-app notification only
- Daily digest email
Custom Routing Rules
Create rules to override defaults:
Example Rule 1: Financial Facts Critical
- If: Alert about financial fact (fact category = “Financial”)
- Then: Send to Finance team email + Slack #finance-alerts + page CFO
Example Rule 2: Brand Facts High Priority
- If: Alert about brand/product (category = “Product”)
- Then: Send to Marketing team + Slack #marketing
- Do NOT page (non-critical for sleep schedules)
Example Rule 3: High-Velocity Alerts
- If: Same fact hallucinated 3+ times in 1 hour
- Then: Escalate severity to Critical + page on-call
- Reason: Sustained hallucination = urgent
Create Routing Rule
- Go to Settings → Alert Routing
- Click Create Rule
- Define condition:
- Alert severity (Critical, High, Medium, Low)
- Fact category (Financial, Product, Leadership, etc.)
- AI engine (ChatGPT, Claude, Gemini)
- Fact name (if specific)
- Select channels:
- Which channels to use
- Include suggestions? (Yes/No)
- Urgency level (if PagerDuty)
- Save
Channel Priority
If multiple channels are active for same alert, they all fire unless you set priorities.
Example: Prevent duplicate notifications
Instead of:
- Email to #security-alerts
- Slack #security-alerts
- PagerDuty (all firing for same alert)
Use priority order:
- If PagerDuty incident created → Don’t send Slack/Email
- If Slack notification sent → Don’t send Email
- Always send In-app notification
Prevents notification fatigue.
Notification Frequency
Real-Time
Alert sent immediately when detected.
Use for: Critical/High severity alerts
Batched Digest
Collect multiple alerts; send single email/Slack message with summary.
Options:
- Hourly digest (collect alerts; send once per hour)
- Daily digest (morning 9 AM; evening 5 PM)
- Custom (collect until N alerts or X hours)
Example digest:
Daily Alert Summary (March 15, 2024)────────────────────────────────────Critical: 2 alertsHigh: 5 alertsMedium: 8 alertsLow: 12 alerts
Top Issue: "Product pricing" hallucinated 5x→ Approve 1 correction (fixes all 5)
[View Full Report] [Manage Alerts]Use for: Non-critical alerts; low-severity trends
Testing Notifications
Before going live, test each channel:
- Click Test on the channel config
- System sends test alert
- Verify you receive it
- Check formatting (email layout, Slack message clarity, etc.)
Test alert format:
TEST NOTIFICATION - This is a testType: HallucinationFact: "TruthVouch was founded in 2023"Severity: Test (no action needed)Troubleshooting
Email Not Received
- Check spam folder — Alerts may be marked as spam
- Verify email address — Typo in recipient email?
- Check company email rules — Your email system might block external senders
- Test delivery — Click “Send Test Email” to confirm setup works
Slack Connection Fails
- Re-authorize app — Click “Reconnect to Slack”
- Check channel permissions — App must have write access to channel
- Verify channel name — Use #channel-name format (not display name)
PagerDuty Incidents Not Creating
- Verify API key — Check PagerDuty integration still valid
- Check escalation policy — Must be active (not archived)
- Review trigger rules — Does alert severity match rule?
- Check PagerDuty account — Is service active? Are users on-call?
Webhook Not Firing
- Verify URL — Must be HTTPS, publicly accessible
- Check auth headers — If authentication required, verify credentials
- Review payload — Does your system parse JSON correctly?
- Check firewall — Can your system reach the webhook URL?
Related Topics
- Alert Severity — How alert severity is determined
- Alert Workflows — Assignment, escalation, resolution
Next Steps
- Identify notification requirements — Who needs to know about alerts?
- Set up channels — Email for formal record, Slack for quick triage, PagerDuty for critical
- Configure routing rules — Route by severity and category
- Test all channels — Verify setup works end-to-end
- Establish escalation policy — Who pages who if urgent?