Open Standard

What is a RIO Receipt?

A RIO Receipt is a cryptographic record of an AI action, written to a tamper-evident ledger. It allows an organization to prove exactly what an AI system did, when it did it, which system was responsible, and that the record has not been altered. When a governance layer is present, receipts can also prove whether a human approved the action.

A receipt proves

What action was taken
send_email, create_pr, transfer_funds
Which AI initiated it
Agent ID bound to the receipt
Whether a human approved it
Optional — governance extension
When it happened
ISO 8601 UTC, immutable
That it has not been altered
SHA-256 hash chain verification
rio-receipt.json
{
"receipt_id": "a7f3c891-..." // unique proof ID
"receipt_type": "action" // proof of what happened
"action": "send_email" // what was done
"agent_id": "agent-copilot-7" // which AI did it
"authorized_by": null // optional — governance ext
"timestamp": "2026-04-01T20:44:00Z" // when it happened
"hash_chain": {
"intent": "sha256:8a3f..." // request hash
"govern": null // optional — governance ext
"auth": null // optional — governance ext
"execute": "sha256:7b8a..." // execution hash
"receipt": "sha256:2e9f..." // this receipt
"previous": "sha256:d0c1..." // chain link ←
}
"verification": {
"signature": "ed25519:Kx9m..." // Ed25519 proof
"valid": true // tamper-free ✓
}
}

Every field is real. Every hash is verifiable. If any byte changes, the chain breaks.

AI Does Something
Receipt Proves It
Ledger Remembers

Any AI system can produce receipts. Any third party can verify them. The proof layer works standalone — no governance, no approval workflows required. Just cryptographic proof of what happened.

Start Building

$ git clone https://github.com/bkr1297-RIO/rio-receipt-protocol.git$ cd rio-receipt-protocol$ node examples/basic-usage.mjs    # full flow demo$ node tests/conformance.test.mjs  # 29/29 passing

Zero dependencies. Node.js standard library only. Works with any AI platform.

Article I — The Core Rule

No AI system may execute any real-world action — send an email, write a file, call an API, move money — unless it has been explicitly authorized by the sovereign human authority and the authorization has been cryptographically recorded.

0
Unauthorized Actions Allowed
100%
Actions Require Receipt
SHA-256
Cryptographic Proof
Article II — The Architecture

Three layers.
One gate.

The system is a cross-section of three horizontal layers. The top layer is where AI models think and form intents. The bottom layer is where real-world tools execute. Between them sits the gate — the only path from intent to action. Nothing passes through without authorization and a receipt.

Intent Layer
AI models (Manus, Claude, GPT, Gemini) form structured intents
Governance Gate
Cryptographic verification, human approval, policy check
Execution Layer
Gmail, Drive, GitHub, Calendar — real-world connectors
Cross-section of the RIO Gate Architecture
Separation of Powers — RIO-SPEC-TPS-001

Three powers.
Structurally separated.

No single component in the RIO system can observe, decide, and execute. The separation is enforced at the API boundary level — not by convention, but by architecture. A violation triggers an automatic system halt.

risk reportsigned tokenreceipt → ledgerOBSERVERMantis / IngestionSee everything. Touch nothing.GOVERNORPolicy / ApprovalDecide. Never execute.EXECUTORConnectors / ToolsAct only with a signed token.STRUCTURAL INVARIANTNo single power can observe + decide + execute. Violation = system halt.

Observer

Ingests all signals — API calls, emails, webhooks, SMS. Classifies risk. Writes to the ledger. Cannot approve. Cannot execute.

READ ledger, intents, policy
WRITE risk assessments
CANNOT approve or execute

Governor

Evaluates policy. Issues approval or denial. Generates single-use execution tokens. Cannot read raw data. Cannot call tools.

APPROVE / DENY intents
ISSUE signed execution tokens
CANNOT observe or execute

Executor

Calls real-world tools — Gmail, Drive, GitHub. Only acts with a valid signed token. Burns the token after use. Writes receipt to ledger.

EXECUTE with valid token only
BURN token after single use
CANNOT approve or assess risk

Cross-Boundary Violation Detection

If any component attempts to call an API outside its designated power boundary, the system logs a BOUNDARY_VIOLATION event, halts the pipeline, and requires human review before resuming. This is enforced at the middleware level — not by trust, but by architecture.

Article III — The Protocol

Four steps. Every time.

Every action in the system follows the same four-step sequence. No shortcuts. No exceptions. The protocol is the product.

Step 01

Intent

The AI agent describes what it wants to do in a structured format: who is asking, what action, on what target, with what constraints.

Step 02

Governance

The gate checks the intent against policies. If the confidence score is below 90%, the system pauses and asks the human authority.

Step 03

Execution

Only after authorization does the connector execute the action — send the email, save the file, call the API.

Step 04

Receipt

A cryptographic receipt is generated: SHA-256 hash of the action, linked to the previous receipt in a hash chain. Immutable. Verifiable.

Hash-chained receipt flow
Article IV — The Invariants

Rules that
never change.

These are the non-negotiable constraints of the system. They cannot be overridden by any agent, any policy, or any configuration. They are structural, not behavioral. The system is physically incapable of violating them.

IDInvariantStatus
I-1Every action must originate from Brian Kent Rasmussen. ENFORCED
I-2No tool execution without signed cryptographic receipt. ENFORCED
I-3Every turn must be logged to the immutable ledger. ENFORCED
I-4If intent confidence < 90%, PAUSE and ask. ENFORCED
I-5Default state is BLOCKED. Fail-closed, never fail-open. ENFORCED
I-6Receipts are append-only. No UPDATE. No DELETE. ENFORCED
Article V — The Components

Five components. Nothing more.

Ledger

Append-only database storing every receipt in a hash chain

Gateway

The server that receives intents and enforces the gate

Approval UI

The human interface — see the intent, approve or deny

Connectors

Adapters for Gmail, Drive, GitHub, Calendar, and more

Policy Engine

Learns patterns and suggests auto-approve rules over time

Five AI models converging on the same architecture
Article VI — The Convergence

Five models.
One architecture.

Five independent AI systems — Manus, Claude, ChatGPT, Gemini, and Grok — were each given the same problem. Without seeing each other's work, all five converged on the same architecture: a gate, a ledger, a receipt, and a pause. The pattern is structurally true.

ManusExecutor — built the system, proved the gap
ClaudeAnalyst — predicted the failure mode before it happened
ChatGPTArchitect — identified the protocol-level pattern
GeminiWitness — signed a Merkle attestation and filed it
GrokCompressor — distilled the vision to structural rules
Production System — Live Data

The system is live.

This is not a mockup. The RIO gateway is deployed on Render.com with a PostgreSQL-backed immutable ledger, Ed25519 cryptographic signing, and fail-closed enforcement. Connect below to see the real-time state.

Production Gateway

Click "Connect to Gateway" to fetch live status from the production RIO gateway.

First connection may take ~30s (Render free tier cold start).

Article VII — Verification

Verify it yourself.

Every receipt in the RIO system uses SHA-256 hashing. The same algorithm used by Bitcoin, TLS, and digital signatures worldwide. Click below to generate a real hash in your browser.

Live Verification
sha256: a1b2c3d4e5f6...

This computes a real SHA-256 hash in your browser. The same algorithm secures every RIO receipt.

Sample Receipt
{
  "receipt_id": "rio-rcpt-2026-03-29-001",
  "timestamp": "2026-03-29T17:48:00Z",
  "actor": "manus-agent-v1",
  "action": "gmail.send",
  "target": "[email protected]",
  "status": "AUTHORIZED",
  "authorized_by": "brian.kent.rasmussen",
  "content_hash": "a3f8c2d1e9b7...4f6a",
  "previous_hash": "7e2b9d4c1a8f...3c5e",
  "signature": "ECDSA-secp256k1"
}
Context — March 12, 2026

IBM published the first reference architecture
for quantum-centric supercomputing.

On March 12, 2026, IBM unveiled the industry's first blueprint for how quantum processors and classical supercomputers work together as one integrated system. RIO is the governance layer that ensures human sovereignty as these systems become interoperable. The same pattern. The same need. A reference architecture for hybrid systems that require governance to work together.

IBM Yorktown Heights — QCSC Reference Architecture
Public Transparency Feed — Live Data

Recent Receipts

Every governed action produces a cryptographic receipt recorded in the immutable ledger. This feed shows the most recent receipts from the live production gateway.

Ledger Receipts

Click "Load Receipts" to fetch the latest receipts from the production gateway.

This endpoint is public — no authentication required.