Compare Peppol XML files and verify invoice data integrity
Select the Original XML file and the Processed (or Suspicious) Peppol XML file using the file pickers. The tool automatically computes unique digital fingerprints (SHA-256 hashes) for both files to confirm their identity and integrity. Review the Business Metrics summary to verify that totals, tax amounts, line counts and other key financial indicators remain consistent. Examine the Technical Forensics section, including Footprint Delta and Tag Integrity, to detect modifications in auxiliary data (such as embedded documents, supplier contacts or additional references). Study the Detailed Audit Trail for a complete, path-level view of every change in the XML hierarchy. valuable for financial auditors, accountants, compliance officers and internal control teams working with Peppol e-invoices. For technical support, feature requests or enterprise customization options, please contact kibervarnost@proton.me