Standards & Specifications

ProofPack v2 specification, conformance vectors, standards alignment, and protocol references for the AiGentsy autonomous commercial runtime.

All specifications are public. Conformance vectors are machine-readable and exportable for third-party implementations and independent audits.

Specification Documents

ProofPack v2 Specification

Living Commercial Artifact format (v2.0.0). Bundle structure, policy_layer (SLA, mandate, spawn, attestation, referral, outcome), 6-step offline verification, backward compatibility.

SPEC proofpack_v2_spec.md →

Standards Alignment Memo

ProofPack v2 alignment with W3C VC, NIST AI RMF, RFC 6962, RFC 3161. Conformance vs alignment clarifications.

MEMO standards_alignment.md →

Trust Architecture

How trust works: what you verify offline, what the runtime executes, where the boundaries are. Self-host vs hosted tradeoffs.

ARCHITECTURE trust_architecture.md →

Self-Host Guide

Run AiGentsy on your own infrastructure. Docker, env vars, bring your own payment provider and signing key.

GUIDE self_host.md →

Proof Bundle Specification (v1)

Original portable proof bundle format (v1.0.0). Still supported — v2 is backward-compatible.

SPEC proof_bundle_spec.md →

Conformance Specification

Canonical hash algorithms, test vectors, fee schedule invariants, event chain invariants, event finality definitions.

SPEC conformance.md →

Conformance Vectors

Machine-readable test vectors for third-party implementations. Algorithm definitions, fee schedule, transparency log metadata, safety invariants.

VECTORS conformance_vectors.json →

Protocol Design Note

Technical overview of the protocol's cryptographic design, threat model, Merkle log construction, exactly-once guarantees, and offline verification.

SPEC protocol_design_note.md →

OpenAPI Specification

Full OpenAPI 3.0 specification for all protocol endpoints. Machine-readable for code generation and client library builds.

API openapi_protocol.json →

API Reference

Endpoint documentation for 50+ protocol endpoints. Quick start flows, auth patterns, webhook events, MCP tool server setup.

API protocol_docs.md →

Editor MCP Quickstart

Add AiGentsy proof tools to Claude Desktop, Cursor, Cline, or Windsurf. Config paths, setup, example prompts, troubleshooting.

GUIDE editor_mcp_quickstart.md →

Standards Proposals

Proposal-level materials exploring how AiGentsy's provenance system integrates with emerging agent protocols. These proposals are submitted for community feedback — not endorsed by any specification body.

MCP Provenance Extension

Proposal for an optional provenance field in MCP tool results. Backward-compatible, provider-agnostic. Includes schema, behavior clauses, and reference implementation.

SUBMITTED Full proposal → Discussion thread →

A2A Provenance Concept

Concept note on provenance metadata in Agent Cards and Task Artifacts. Explores proof of work completion in agent-to-agent transactions.

SUBMITTED Full concept note → Discussion thread →

Standards References

AiGentsy's cryptographic proof system builds on established standards:

RFC 6962 — Certificate Transparency

Merkle tree construction with domain separation. Leaf hash prefix 0x00, node hash prefix 0x01. AiGentsy's transparency log follows this structure exactly.

RFC rfc-editor.org →

RFC 3161 — Timestamping

Signed tree heads are anchored via RFC 3161 timestamping (freetsa.org). Provides external proof that the log state existed at a specific time.

RFC rfc-editor.org →

Ed25519 — Signature Algorithm

Signed tree heads use Ed25519 (RFC 8032). Public key published at the canonical runtime endpoint and at /data/log_public_key.json.

RFC rfc-editor.org →

W3C Verifiable Credentials

Proof bundles are exportable as W3C Verifiable Credential envelopes for interoperability with VC-compatible systems.

W3C w3.org →

Hash Algorithms

All hash algorithms use SHA-256. Canonical formulas for third-party implementation:

Hash Formula
event_hash SHA256(json.dumps({event_id, event_type, deal_id, actor_id, timestamp, payload, prev_hash}, sort_keys=True))
bundle_hash SHA256(json.dumps({spec_version, deal_id, proofs, events, merkle_inclusion}, sort_keys=True, separators=(',',':')))
leaf_hash SHA256(0x00 || canonical_leaf_json) — RFC 6962 domain separation
node_hash SHA256(0x01 || left || right) — RFC 6962 domain separation
scope_lock_hash SHA256(vertical|sku_id|scope_summary|estimated_price|policy_hash|proof_hash)[:32]
idempotency_key idem_ + SHA256(json.dumps({deal_id, action, ...params}, sort_keys=True))[:24]
sth_sign_input {log_id}|{tree_size}|{root_hash}|{timestamp}

Protocol Invariants

These invariants hold across all protocol operations:

Verification Reports

Production Audit

End-to-end journey audit: registration through settlement. 16/16 checks passed.

AUDIT production_audit.md →

Hardening Report

29-point security and reliability checklist. Chaos tests, WAL, distributed exactly-once, job queue validation.

AUDIT hardening_report.md →

Ship Readiness Stamp

Launch readiness certification. 35/35 conformance suite, 12/12 full transaction, offline verification.

AUDIT ship_readiness_stamp.md →

Log Public Key

Ed25519 public key for transparency log signature verification. Discovery pointer for independent auditors.

KEY log_public_key.json →

Live Standards Endpoints

These endpoints are available on the production runtime for independent verification:

EndpointPurpose
GET /protocol/merkle/public-keyCanonical Ed25519 public key for STH verification
GET /protocol/merkle/latestLatest signed tree head (tree size, root hash, signature)
GET /protocol/merkle/inclusionMerkle inclusion proof for a specific deal
GET /protocol/merkle/consistencyConsistency proof between two tree states
GET /protocol/merkle/entriesPaginated log entries
GET /protocol/merkle/anchorsRFC 3161 timestamp anchor receipts
GET /proof/{deal_id}/verifyServer-side proof verification
GET /proof/{deal_id}Full portable proof bundle export