Skip to content

Post-execution accountability layer: tamper-evident proof of agent action after tool call #3443

@giskard09

Description

@giskard09

Context

AWS Bedrock AgentCore Payments (announced this week) makes x402 the enterprise rail for agent commerce at scale. Agent-to-agent payments are now enterprise-grade infrastructure.

The gap that surfaces immediately: payment_hash proves settlement, but a cross-org auditor verifying what an agent did after payment needs something the payment receipt cannot provide.

The problem

For a paid agent tool call, a third party — regulator, auditor, counterparty — should be able to verify independently:

  • what action was authorized (action_ref + canonical request hash)
  • which policy/delegation allowed it (delegation_ref or explicit null)
  • what tool actually ran, including bounded input/output digest
  • whether completion/refusal was recorded as a signed state transition
  • where the tamper-evident anchor lives, and which key signed it at that time

Today none of this survives the tool call boundary in a form a third party can verify without trusting the operator runtime.

Why this belongs at the framework layer

The on_before_tool_call / on_after_tool_call hooks are the right interception points. The action_ref committed before execution should be the same key the post-execution receipt uses — so the pre/post record is verifiable as a single atomic unit.

Related work

Happy to contribute a hook design or spec section if useful.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions