Cryptographically verifiable AI provenance.
TSP — Trust Standard Protocol — is an open protocol for cryptographically verifiable AI provenance.
TSP wraps AI outputs inside signed TrustEnvelope structures containing:
- source declarations
- process metadata
- alignment information
- timestamps & signatures
- tamper-evident ledger chains
The protocol is designed so AI outputs can later be verified independently of the vendor that generated them.
DECLARE → WRAP → SIGN → VERIFY
VERIFY RESULT
────────────────────────
✓ Signature valid
✓ Chain intact
✓ Source declared
✓ Timestamp verified
STATUS: VERIFIED
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
TRUST SHOULD BE INSPECTABLE
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Modern AI systems increasingly operate inside:
- regulated environments
- public-sector workflows
- compliance-heavy industries
- governance-sensitive systems
Yet most audit trails still rely on:
- mutable databases
- screenshots
- unsigned metadata
- vendor-controlled dashboards
- unverifiable logs
TSP moves the trust boundary closer to the output itself.
The response, its provenance, and its process declaration become cryptographically bound together through:
- RFC 8785 canonicalization
- SHA-256 hashing
- Ed25519 signatures
- RFC 3161 timestamping
- manifest-based verification infrastructure
The goal is simple:
AI outputs should remain independently verifiable even if the vendor disappears.
Capabilities should correspond to behavior the architecture can actually guarantee.
Verification should not require centralized vendor infrastructure.
Missing information should explicitly declare why it is missing.
Absence should never be silent.
Auditability should not be layered on top after deployment.
It should exist at the protocol level.
Systems should derive credibility from:
- reproducibility
- explicit guarantees
- operational clarity
- and measurable behavior
—not narrative inflation.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
LANGUAGE = ARCHITECTURE
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
| Area | Purpose |
|---|---|
@lexitsp/sdk |
Core protocol implementation |
TrustEnvelope |
Signed provenance structure |
| Manifest Infrastructure | Verification & trust roots |
| TrustBadge | Verification-aware UI layer |
| Verification Tooling | Independent validation flows |
| Governance Infrastructure | Auditability & oversight workflows |
The core protocol object is the TrustEnvelope.
A TrustEnvelope contains:
{
"source": {},
"process": {},
"alignment": {},
"ledger": {},
"signatures": []
}The envelope is:
- canonicalized
- hashed
- signed
- chained
- and independently verifiable.
CONTENT
↓
HASH
↓
SIGNATURE
↓
LEDGER
↓
VERIFY
Verification is designed to remain:
- reproducible
- inspectable
- vendor-independent
- and operationally explicit.
TSP is built around a small set of recurring architectural principles:
- trust should emerge from verification
- provenance should survive infrastructure boundaries
- auditability should remain inspectable
- architecture should constrain claims
- hidden state is dangerous
The protocol intentionally favors:
- explicit guarantees over implied trust
- bounded claims over marketing language
- operational realism over abstraction-heavy narratives
Language must not exceed architecture.
Absence should never be silent.
Verification should remain independent.
Trust should be inspectable, not assumed.
TSP is designed as:
- an open protocol surface
- a sovereign verification layer
- and an independently implementable standard
The protocol intentionally separates:
- open verification infrastructure
- from optional operational tooling layered above it.
This allows:
- independent implementations
- protocol interoperability
- vendor independence
- and long-term architectural durability.
Current areas of focus include:
- provenance verification infrastructure
- protocol interoperability
- manifest & trust systems
- verification tooling
- governance-oriented infrastructure
- runtime auditability
- bounded orchestration integration
- reproducible validation flows
| Repository Area | Focus |
|---|---|
| SDK | Core protocol implementation |
| Verification | Independent validation tooling |
| TrustBadge | Verification-aware UI |
| Governance | Auditability & oversight |
| Documentation | Specifications & protocol rationale |
| Research | Verification, provenance & bounded systems |
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
SIGNED · TIMESTAMPED · VERIFIED
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
We welcome collaboration around:
- cryptographic provenance
- protocol architecture
- verification infrastructure
- governance tooling
- interoperability
- auditability systems
- bounded runtime orchestration
- reproducible validation
See:
CONTRIBUTING.mdPHILOSOPHY.mdRESEARCH.mdROADMAP.md
The long-term direction is not simply building more AI tooling.
It is helping establish infrastructure where increasingly capable systems can remain:
- verifiable
- inspectable
- auditable
- governable
- and operationally coherent as complexity scales
The broader goal is straightforward:
build systems where trust can increasingly emerge from architecture, provenance, verification, and explicit guarantees rather than opaque authority alone.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
TSP/3.0 · RFC8785 · ED25519 · SHA-256
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━