The Standard for
Verifiable AI Trust
The Open Standard for Cryptographically-Verifiable AI Governance
SONATE Trust Receipt Specification v1.0 — Ed25519-signed receipts, hash-chained audit trails, independently verifiable. No vendor lock-in. No backend required.
Why SONATE Exists
The Problem
- →No audit trail: AI systems make consequential decisions with zero verifiable record of what they did or why.
- →No safety verification: Enterprises have no way to independently verify that AI outputs meet governance requirements.
- →Vendor lock-in: Trust verification depends on proprietary dashboards with no interoperability.
- →Compliance gaps: Regulators have no standard way to audit AI behavior across organizations.
The SONATE Solution
- Cryptographic proof: Ed25519-signed receipts for every AI interaction. Tamper-evident via hash chains.
- Independent verification: Verify receipts in-browser with zero backend dependency. Full audit trail available.
- Open standard: RFC 8785 canonicalization, W3C DIDs, cross-language SDKs. No vendor lock-in.
- Compliance-ready: GDPR, HIPAA, SOC2, NIST-aligned. Privacy-by-default.
SONATE Hardening Sprint Complete
From research prototype to production-ready enterprise platform in one intensive sprint.
Lines of Code
Regression Tests
Line Specification
Security Issues
Cryptographic Trust Infrastructure
Real cryptography, not just hashing. Ed25519 signatures, W3C Decentralized Identifiers, and hash-chained receipts you can verify independently.
Ed25519 Signed Receipts
Every interaction signed with Ed25519 digital signatures. Hash-chained for tamper-evident audit trails. Independently verifiable.
Behavioral Drift Detection
Detects significant shifts in reasoning patterns, output volatility, or policy alignment across sessions.
Embeddable Trust Status Badge
Real-time AI trust state, embeddable like an SSL status indicator.
Tactical Replay
Time-travel debugger for AI conversations. Scrub through interactions, see trust scores evolve, replay identity shifts.
Real-time Policy Scoring
Each response scored against six enforceable governance constraints. Adds <50ms overhead per interaction. Scores from 0–100 with detailed breakdowns.
W3C DID Integration
Decentralized Identifiers for platform and agents. Standard did:web method with public key resolution.
The SONATE Trust Protocol
Each response scored against six enforceable governance constraints. Adds <50ms overhead per interaction. The weighted scores combine into a single trust score (0–100) that determines policy compliance.
The SONATE Architecture
Cryptographic proof-of-behavior for every AI interaction. Four-step pipeline from request to independent verification.
AI Call Instrumented
wrap() hooks OpenAI, Anthropic, Gemini, or local LLM
Receipt Generated
Canonical JSON → SHA-256 hash → Ed25519 signature
Hash-Chained
Tamper-evident temporal ordering. Prevents insertion/deletion.
Independently Verified
Browser verification. Zero backend. No vendor lock-in.
Performance Guarantees
Verification latency per receipt
Memory per receipt
Backend dependencies
Verify Any Receipt — In Your Browser
This is your strongest proof point. Paste a receipt and verify the signature, hash chain, DID identity, and privacy mode — all without touching a backend.
For Developers
One-line wrap(). Full support for OpenAI, Anthropic, Gemini, and local LLMs. TypeScript or Python.
Supported AI Platforms
For Enterprises
Governance infrastructure that scales. Policy engine, privacy-by-default, DID-based identity.
Policy Engine v1
Built-in Safety, Hallucination, and Compliance policies. Extensible JSON Schema rules.
Privacy-by-Default
Hash-only mode for GDPR/HIPAA. Never transmit raw content without consent.
W3C DID Identity
Decentralized identifiers for platforms and agents. Standard did:web with public key resolution.
Zero-Backend Verification
Enterprise customers can verify receipts without calling home. Full audit autonomy.
NIST/ISO Alignment
Mapped to NIST SP 800-32, ISO 27001, SOC2 Type II, and GDPR Article 22.
Custom Policy Support
Build domain-specific policies. Patent scores, medical accuracy, regulatory compliance.
For Auditors & Regulators
Standard audit evidence. Deterministic. Independently verifiable. Compliance-mapped.
What You Get
- Hash-Chained Audit Trail — Proof of temporal ordering. Prevents insertion/deletion/reordering.
- RFC 8785 Determinism — Canonical JSON. Same input → identical hash across implementations.
- Ed25519 Signature Verification — Public key resolution via W3C DID. Standard cryptography.
- Test Vectors — Interoperability examples. Verify against SONATE or third-party implementations.
Compliance Mappings
- GDPR Article 22 — Right to explanation. Audit trail proves human oversight.
- HIPAA § 164.312 — Audit controls. Hash-only mode for patient privacy.
- SOC2 Type II — Trustworthiness. Cryptographic proof of behavior.
- ISO 27001 — Information security. Tamper-evident receipts satisfy A.12 controls.
SONATE vs Alternatives
How SONATE compares on the features that matter most.
| Feature | SONATE | Observability Tools | Safety Filters | Logging Systems |
|---|---|---|---|---|
| Cryptographic Receipts | — | — | — | |
| Zero-Backend Verification | — | — | — | |
| Privacy-by-Default (Hash-Only) | — | — | — | |
| Multi-Model Support | ||||
| Policy Engine | — | — | ||
| Open Specification | — | — | — | |
| Cross-Language SDKs | — |
Open Verification, Protected Core
We believe in transparency for trust verification while protecting the innovation that makes it possible.
Verification SDK
MIT LicenseIndependently verify trust receipts in your own applications. Full Ed25519 signature verification, chain hash validation, and TypeScript support.
- Node.js & browser support
- Zero dependencies
- Full TypeScript definitions
Core Platform
ProprietaryThe policy engine, trust scoring algorithms, and receipt generation are proprietary. Source available for transparency, commercial licensing available.
- Policy engine & scoring
- Receipt generation & signing
- Enterprise dashboard
Why this model? Anyone can verify receipts independently (trust), but the core technology remains protected (business sustainability).
Your SONATE Conversion Path
From curiosity to production deployment in five steps.
Understand the Standard
Read the 380-line RFC-style specification. Understand the cryptography.
Read SpecInstrument Your First Call
One-line wrap(). Works with OpenAI, Anthropic, Gemini, local LLMs.
Get StartedVerify a Receipt
Paste JSON in the playground. Verify signature, chain, DID, privacy mode.
Try VerificationExplore the Dashboard
See all receipts, trust scores, policy violations, audit trails.
Full DemoLaunch Your Pilot
Work with our team on a 12-week pilot. $50K-150K typically.
Request Pilot