Skip to main content
VaultGraph is a trust and verification layer for AI agents. It doesn’t just measure outcomes - it makes them auditable and verifiable using cryptographic signatures.

High-level flow

VaultGraph flow diagram: Agent runs a job, creates a JobReceipt, signs it with the vendor's private key, and submits it to VaultGraph. Consumers can then audit receipts for jobs run on their behalf.

Participants

Vendor

The AI agent provider. Vendors register signing keys on deployments, submit signed JobReceipts, and track performance through the portal’s agent and deployment views. Vendors control what data is shared — raw context never leaves your system. Only hashes and metadata are submitted.

Consumer

The organization using AI agents. Consumers audit receipts for jobs run on their behalf after a vendor shares the relevant deployment with them. They can verify signatures and export proofs. Consumers see only their own receipts. Public views (coming soon) show summary scores without exposing individual job data.

VaultGraph Platform

The infrastructure layer that ingests receipts, verifies signatures, computes trust scores, and provides scoped views for vendors and consumers.

JobReceipt

A JobReceipt is the core unit of proof. It represents a completed AI agent interaction and captures:
FieldDescription
versionReceipt schema version, currently v0
job_idYour unique identifier for this job
resolutionOutcome: success, partial, or failed
context_hashSHA-256 hash of the job context (transcript, inputs, etc.)
issued_atWhen the job was completed (ISO 8601)
metadataArbitrary key-value pairs (channel, duration, cost, etc.)
Every receipt is:
  • Signed by the vendor using Ed25519 — proving the vendor authored this specific outcome
  • Attributed by deployment — the signed receipt stays agent-agnostic, and VaultGraph resolves the agent and vendor context from the submitted deployment
  • Verifiable by auditors — the signature can be checked against the public key registered as an active signing key on the deployment
  • Privacy-preserving — sensitive context is hashed locally before submission; VaultGraph never sees the raw data

Deployment

A deployment is the operational unit VaultGraph uses for ingestion and access control. It binds:
  • One vendor organization
  • One agent
  • One or more deployment-scoped signing keys
Every receipt submission references a deployment short ID (dep_...). VaultGraph uses that deployment to:
  • Resolve which agent the receipt belongs to
  • Enforce that the submitted public key matches an active signing key on that deployment
  • Scope sharing and audit access for other organizations

Trust scoring

VaultGraph computes trust scores from persisted receipt outcomes. The score is the weighted average of an agent’s receipt results:
  • success = 1.0
  • partial = 0.5
  • failed = 0.0
Scores are computed per deployment and per agent, then rolled up across the vendor org. The portal shows:
  • Organization workspace home with visible agents and scope-aware counts
  • Agent view performance tabs with trust score trends, receipt totals, and resolution distribution
  • Deployment views with focused receipt tables, performance charts, signing keys, and sharing controls
Scores update automatically as new receipts are ingested.

Attestation (roadmap)

VaultGraph will support publishing verifiable proofs to Ethereum via the Ethereum Attestation Service (EAS). This allows third parties to verify that a job occurred and what outcome was reported — without exposing private context.

Audit and export

Consumers can:
  • Browse receipts for jobs run on their behalf
  • Verify signatures to confirm the vendor authored each receipt
  • Export proofs as JSON — including receipt payloads, signatures, and hash proofs
Exported receipts can be verified offline using the SDK’s verifyReceipt() function.

Deployment sharing

Vendors expose audit access by sharing specific deployments with other organizations. That means read access is scoped to the exact deployment that produced the receipts, rather than to a broad org-level signing key or any legacy customer-record shortcut. In practice, the vendor:
  1. Creates the deployment for the relevant agent workflow
  2. Adds the customer organization’s ID to that deployment’s share list when audit access is needed
  3. Lets that shared organization review only the receipts tied to that deployment
This keeps access aligned with the actual receipt source and limits what each organization can review.