The Standard for
Verifiable AI Trust
The Open Standard for Cryptographically-Verifiable AI Governance
SONATE Trust Receipt Specification v1.0 — Ed25519-signed receipts, hash-chained audit trails, independently verifiable. No vendor lock-in. No backend required.
Platform Demo
Watch SONATE in action — from trust receipt generation to the full governance dashboard.
Full Platform Walkthrough
Complete overview of the SONATE governance dashboard — agents, trust scores, Overseer brain cycles, compliance reports, and real-time monitoring.
Trust Receipt Flow
See Ed25519-signed trust receipts generated in real-time — hash-chained, independently verifiable, with full SONATE principle scoring.
Why SONATE Exists
The Problem
- →No audit trail: AI systems make consequential decisions with zero verifiable record of what they did or why.
- →No safety verification: Enterprises have no way to independently verify that AI outputs meet governance requirements.
- →Vendor lock-in: Trust verification depends on proprietary dashboards with no interoperability.
- →Compliance gaps: Regulators have no standard way to audit AI behavior across organizations.
The SONATE Solution
- Cryptographic proof: Ed25519-signed receipts for every AI interaction. Tamper-evident via hash chains.
- Independent verification: Verify receipts in-browser with zero backend dependency. Full audit trail available.
- Open standard: RFC 8785 canonicalization, W3C DIDs, cross-language SDKs. No vendor lock-in.
- Compliance-ready: GDPR, HIPAA, SOC2, NIST-aligned. Privacy-by-default.
SONATE Hardening Sprint Complete
From research prototype to production-ready enterprise platform in one intensive sprint.
Core Packages
Backend Services
Dashboard Pages
Cross-Language SDKs
Cryptographic Trust Infrastructure
Real cryptography, not just hashing. Ed25519 signatures, W3C Decentralized Identifiers, and hash-chained receipts you can verify independently.
Ed25519 Signed Receipts
Every interaction signed with Ed25519 digital signatures. Hash-chained for tamper-evident audit trails. Independently verifiable.
Behavioral Drift Detection
Detects significant shifts in reasoning patterns, output volatility, or policy alignment across sessions.
Embeddable Trust Status Badge
Real-time AI trust state, embeddable like an SSL status indicator.
Tactical Replay
Time-travel debugger for AI conversations. Scrub through interactions, see trust scores evolve, replay identity shifts.
Real-time Policy Scoring
Each response scored against six enforceable governance constraints. Adds <50ms overhead per interaction. Scores from 0–100 with detailed breakdowns.
W3C DID Integration
Decentralized Identifiers for platform and agents. Standard did:web method with public key resolution.
The Overseer: Autonomous AI Governance
Static policy engines catch known violations. The Overseer is a constitutional governance agent that continuously monitors, reasons about, and adapts to emergent AI behavior — operating under a Trust Kernel that defines what it can and cannot do.
Sense
Ingest trust receipts, alerts, drift signals in real-time
Analyze
Evaluate patterns against constitutional principles
Plan
Generate governance actions within Trust Kernel bounds
Execute
Apply mitigations: re-prompt, constrain, escalate, or refuse
Measure
Track intervention effectiveness via CIQ metrics
Learn
Adapt governance strategies based on outcomes
Emergence Detection
Uses the Bedau computational emergence index to detect novel behavioral patterns that don't appear in any single interaction but emerge across agent workflows.
Trust Kernel
Constitutional framework defining the Overseer's own boundaries. Refusals are a feature, not a bug — the system can refuse unsafe actions even when instructed.
Live Governance Dashboard
30+ pages of real-time governance controls. Trust trends, agent comparisons, policy violations, drift monitoring, compliance reports — all live.
The SONATE Trust Protocol
Each response scored against six enforceable governance constraints. Adds <50ms overhead per interaction. The weighted scores combine into a single trust score (0–100) that determines policy compliance.
The SONATE Architecture
Cryptographic proof-of-behavior for every AI interaction. Four-step pipeline from request to independent verification.
AI Call Instrumented
wrap() hooks OpenAI, Anthropic, Gemini, or local LLM
Receipt Generated
Canonical JSON → SHA-256 hash → Ed25519 signature
Hash-Chained
Tamper-evident temporal ordering. Prevents insertion/deletion.
Independently Verified
Browser verification. Zero backend. No vendor lock-in.
Performance Guarantees
Verification latency per receipt
Memory per receipt
Backend dependencies
Verify Any Receipt — In Your Browser
This is your strongest proof point. Paste a receipt and verify the signature, hash chain, DID identity, and privacy mode — all without touching a backend.
For Developers
One-line wrap(). Full support for OpenAI, Anthropic, Gemini, and local LLMs. TypeScript or Python.
Supported AI Platforms
For Enterprises
Governance infrastructure that scales. Policy engine, privacy-by-default, DID-based identity.
Autonomous Overseer Agent
Constitutional governance brain that monitors, reasons, and intervenes autonomously — with built-in refusal capabilities.
Multi-Model Comparison Lab
Run the same prompt across OpenAI, Anthropic, Gemini side-by-side. Compare trust scores, latency, and policy compliance.
Emergence Detection
Bedau computational emergence index identifies novel patterns across agent workflows that no single interaction reveals.
30+ Page Governance Dashboard
Trust trends, agent performance, policy violations, drift monitoring, compliance reports, experiment tracking — all real-time.
Provider-Agnostic Gateway
Single API for OpenAI, Anthropic, Gemini, local LLMs. Switch models without changing governance infrastructure.
Privacy-by-Default
Hash-only mode for GDPR/HIPAA. W3C DID identity. Zero-backend verification. Full audit autonomy.
For Auditors & Regulators
Standard audit evidence. Deterministic. Independently verifiable. Compliance-mapped.
What You Get
- Hash-Chained Audit Trail — Proof of temporal ordering. Prevents insertion/deletion/reordering.
- RFC 8785 Determinism — Canonical JSON. Same input → identical hash across implementations.
- Ed25519 Signature Verification — Public key resolution via W3C DID. Standard cryptography.
- Test Vectors — Interoperability examples. Verify against SONATE or third-party implementations.
Compliance Mappings
- GDPR Article 22 — Right to explanation. Audit trail proves human oversight.
- HIPAA § 164.312 — Audit controls. Hash-only mode for patient privacy.
- SOC2 Type II — Trustworthiness. Cryptographic proof of behavior.
- ISO 27001 — Information security. Tamper-evident receipts satisfy A.12 controls.
SONATE vs Alternatives
How SONATE compares on the features that matter most.
| Feature | SONATE | Observability Tools | Safety Filters | Logging Systems |
|---|---|---|---|---|
| Cryptographic Receipts | — | — | — | |
| Autonomous Governance Agent | — | — | — | |
| Emergence Detection | — | — | — | |
| Zero-Backend Verification | — | — | — | |
| Privacy-by-Default (Hash-Only) | — | — | — | |
| Multi-Model Comparison | — | — | ||
| Policy Engine | — | — | ||
| Open Specification | — | — | — | |
| Cross-Language SDKs | — |
Open Verification, Protected Core
We believe in transparency for trust verification while protecting the innovation that makes it possible.
Verification SDK
MIT LicenseIndependently verify trust receipts in your own applications. Full Ed25519 signature verification, chain hash validation, and TypeScript support.
- Node.js & browser support
- Zero dependencies
- Full TypeScript definitions
Core Platform
ProprietaryThe policy engine, trust scoring algorithms, and receipt generation are proprietary. Source available for transparency, commercial licensing available.
- Policy engine & scoring
- Receipt generation & signing
- Enterprise dashboard
Why this model? Anyone can verify receipts independently (trust), but the core technology remains protected (business sustainability).
Your SONATE Conversion Path
From curiosity to production deployment in five steps.
Understand the Standard
Read the 380-line RFC-style specification. Understand the cryptography.
Read SpecInstrument Your First Call
One-line wrap(). Works with OpenAI, Anthropic, Gemini, local LLMs.
Get StartedVerify a Receipt
Paste JSON in the playground. Verify signature, chain, DID, privacy mode.
Try VerificationExplore the Dashboard
See all receipts, trust scores, policy violations, audit trails.
Full DemoLaunch Your Pilot
Work with our team to scope and launch a governance pilot for your organization.
Request Pilot