Prove pre-authorization
Record an admissibility_token before execution with policy decision, validity window, and PEP
signer requirements.
A global, domain-agnostic format for recording pre-execution policy decisions and post-execution outcomes in a signed, tamper-evident envelope—so enterprises can prove what agents were allowed to do and what they actually did.
Built for platform engineering, security, GRC, and audit teams implementing governed AI operations.
Canonical schema ID: https://aurelianaegis.io/schema/attestation-envelope.json
Move from policy intent to verifiable runtime evidence. The envelope model records authorization and execution outcomes as signed, machine-parseable records that fit existing enterprise controls.
Record an admissibility_token before execution with policy decision, validity window, and PEP
signer requirements.
Record an execution_receipt with final status, structured blocking reason, and linkage to the
originating admissibility event.
Verify signatures over RFC 8785 canonical payloads and optionally enforce append-only chain integrity with
sequence_number and previous_event_hash.
The current specification defines two primary artifact types. Pick the path that matches your enforcement architecture; production systems typically emit both a token and a receipt per governed action.
PEP · policy decision
enforcement (PEP) required.admissibility_event_id.valid_from / valid_until + nonce.Outcome · chain · audit
enforcement, control_plane, or detection (e.g. shadow AI).blocking_reason for deny/escalate paths.sequence_number + previous_event_hash.Use both token and receipt for end-to-end governance evidence in production pipelines.
A practical path from schema-first validation to production ingestion in enterprise governance pipelines.
Use schema validation to catch malformed payloads and enforce required fields before ingestion.
Schema referenceApply RFC 8785 signing and verifier rules from the normative signing specification.
Signing protocolProduce admissibility and execution artifacts as a paired governance evidence stream.
Example payloadsRoute attestation events to operations, compliance, and observability workflows.
Integration guideChoose the path matching your stack: schema-only validator, full verifier, gateway enforcement, or no-code controls.
Validate implementation quality using repository checks, conformance classes, and cryptographic interoperability vectors.
Run the baseline schema and constraint checks for current and release snapshots.
Validation commandsUse Ed25519 and ECDSA vectors to verify canonicalization and signature behavior.
Interoperability vectorsAlign product claims to C1 signer, C2 verifier, and C3 schema-only validator behavior.
Conformance definitionApply deletion and reordering detection for high-assurance audit evidence streams.
Chain protocolThe normative artifacts, examples, and test vectors live in the open-source repository. This site is an overview; GitHub remains the source of truth for the schema and protocol text.
Machine-readable schema for validation, codegen, and CI gates (spec_id aurelianaegis.envelope.v1).
Admissibility token, execution receipt, multi-agent, and shadow-AI fixtures.
Open examples folderSigned canonicalization fixtures (Ed25519, ECDSA P-256 / P-384).
View test vectorsSigning, chain integrity, integration, vocabulary, and regulatory mapping.
Repository READMEConsolidated specification, pipeline integration, and operational enforcement patterns—all on GitHub.
Consolidated spec: normative references (schema, signing, chain), conformance classes, and annex index.
Read SPECIFICATION.mdSIEM, GRC, observability, transport, and replay considerations for production pipelines.
Read INTEGRATION.mdRole-based implementation tracks for developers, verifiers, and platform security teams.
Read IMPLEMENTATION-GUIDE.mdUniversal PEP pattern for LangGraph, CrewAI, AutoGen, Semantic Kernel, Strands/AgentCore, MCP, and related runtimes.
Universal enforcement guideCentral PEP, n8n, gateways, managed agents, shadow detection, and rollout patterns for low-code stacks.
No-code / low-code guideClone the repo, run validators, and wire receipts into SIEM, GRC, and observability workflows.
Start from the README and validation scripts in the repo, then wire your enforcement layer to emit admissibility tokens and execution receipts into your existing SIEM and GRC pipelines.
Open the GitHub project