Evidence receipts are the fundamental unit of governance proof in AGEI. Every governed AI event—policy evaluation, human decision, agent action, or audit request—creates a tamper-evident receipt with cryptographic integrity.
An evidence receipt is a structured, tamper-evident record of a governed event. It captures:
Receipts are the connective tissue between all AGEI features. They link policy gates to human decisions, agent actions to authorization, and runtime events to audit packs.
Policy gate evaluated an AI model deployment request
{
"receipt_id": "rcpt_001",
"receipt_type": "gate_evaluated",
"organization_id": "org_123",
"event_id": "evt_456",
"policy_id": "policy_789",
"policy_version": "1.0.0",
"outcome": "escalate",
"reason_code": "HUMAN_REVIEW_REQUIRED",
"content_hash": "sha256:a1b2c3d4e5f6...",
"signature_alg": "Ed25519",
"signature": "7f8g9h0i1j2k...",
"prev_receipt_id": "rcpt_000",
"created_at": "2026-05-04T16:30:00Z",
"metadata": {
"system": "credit-risk-ai",
"model_version": "v3.2.1"
}
}Policy gate evaluated an AI lifecycle event. Includes outcome (approve/deny/escalate/inspect) and reason code.
Human reviewer made an approval, denial, or escalation decision. Includes reviewer role and justification.
AI agent requested to invoke a tool or perform an action. Includes agent ID, session, and tool parameters.
An action was authorized to proceed. Links to gate evaluation or human decision that granted approval.
An action was blocked. Includes reason code (policy violation, missing privilege, etc.).
An audit pack was materialized. Includes scope definition, included receipt count, and verification status.
Receipts include pointers that enable efficient retrieval during audit pack materialization:
When an audit pack is materialized, relevant receipts are selected based on scope criteria:
Once created, receipts should never be modified. Store them in append-only evidence vaults with tamper detection.
Always include content_hash (SHA-256 recommended). This enables verification that receipt content hasn't changed.
Link receipts using prev_receipt_id. This creates a chain that makes tampering detectable—changing one receipt breaks the chain.
Always include policy_version, not just policy_id. This proves which version was active when the decision was made.
Explore the API documentation or Python SDK to start creating and querying evidence receipts.