A common reaction to Sequesign goes something like this: "Sounds great, but how
do I know the agent is telling the truth?" That is the right question. It is
also a question the receipt does not answer, and being clear about why is the
whole product.
A Sequesign receipt is a portable, cryptographically signed record of an
agent's work. It contains the actions the agent performed, the evidence
associated with each action, the signatures of every party involved, and the
chain that connects them in order. The receipt is generated as the work
happens, signed at each step, countersigned by an independent witness, and
produced as a single verifiable artifact at the end.
What that receipt proves, and what it does not, splits along a sharp line. This
post walks through both sides of the line in concrete detail.
What a valid receipt proves
The evidence has not been changed. Every piece of evidence
associated with an action is canonicalized and hashed at the time the action is
recorded. The hash is committed to the chain. Anyone verifying the receipt
later can recompute the hash from the evidence and confirm it matches what the
chain committed to. If a single byte of evidence changes after the fact, the
hash changes, the commitment no longer matches, and the verifier rejects the
receipt with a specific failure reason.
The action sequence is intact. Each action commits to the
previous chain state. The chain state is a deterministic function of every
action that came before it. Removing an action, reordering actions, or
inserting a new action in the middle all break the chain in a detectable way.
The verifier walks the chain from the beginning and confirms each step extends
the previous one correctly.
The agent signed the work. Every action record carries the
agent's signature. The signature is over a canonical message that includes the
action's evidence hash, the previous chain state, and the new chain state. The
verifier confirms that the signature verifies under the agent's public key. If
the signature was forged, or if the message it was supposed to sign has been
altered, verification fails.
The witness signed the chain. An independent witness service
countersigns each chain extension. The witness does not see the underlying
evidence; it sees only the hashed commitment. This means a customer can run a
witness without exposing the agent's data, and the witness can attest to "this
commitment was presented at this time" without taking on the liability of
reviewing content. The verifier confirms the witness signature verifies under
the witness's published public key.
Schemas validate. When the receipt is bound to schemas, the
verifier confirms that each piece of evidence conforms to the declared shape.
If the evidence has a field that is supposed to be an integer and someone put a
string there, the receipt fails schema validation. If a required field is
missing, the receipt fails. The schema is hashed and the hash is committed to
the action, so changing the schema after the fact does not retroactively change
what receipts were validated against.
Workflow profiles validate. When the receipt is bound to a
workflow profile, the verifier confirms that the sequence of actions satisfies
the declared rules. For an invoice approval workflow, the profile might require
that policy is checked before human approval is requested, and that human
approval is present before a payment instruction is created. If the agent
skipped a step or got the order wrong, the receipt fails profile validation,
even though every individual action might be cryptographically valid.
Human approvals are valid. When an action requires human
approval, the receipt includes an attestation signed by the approver using the
approver's own key. The verifier confirms the signature is valid under the
approver's public key. This is not the agent claiming an approval happened; it
is the approver themselves committing to it.
What a valid receipt does not prove
Here is where most other systems would stop and pretend they have solved the
problem. We do not, because they have not.
The receipt does not prove the agent told the truth. If the
agent's evidence for an action is a piece of natural-language text claiming "I
verified the vendor's bank details," the receipt commits to that text being
what the agent said. It does not commit to the vendor's bank details actually
being verified, because no independent party signed off on that claim. The
verifier will report the chain as cryptographically valid and the workflow as
complete. It will not, by itself, tell you whether the agent was honest about
what it did.
The receipt does not prove an invoice came from a real vendor.
The agent may have processed an invoice, but unless the vendor or a vendor
verification service separately signed the invoice details, the receipt only
proves that the agent saw and acted on an invoice with those details. Whether
those details came from a real vendor is a question for the upstream evidence
pipeline, not the receipt.
The receipt does not prove the payment provider confirmed the
instruction.
Unless the payment provider issues a counterparty attestation that becomes part
of the chain, the receipt only proves the agent generated a payment
instruction. Whether the instruction actually executed is a separate fact,
attested by a separate party, that the receipt can include but does not
generate.
The receipt does not prove the LLM provider attested to its response.
When an agent uses an LLM to review evidence or generate a decision, the
receipt commits to what the LLM returned. It does not commit to that being what
the LLM actually generated, unless the LLM provider separately signs the
response. Today, no major LLM provider does this. The protocol is built to
handle provider attestations when they become available; until they do, LLM
outputs are agent-asserted.
The receipt does not prove unsupported claims are externally attested.
The protocol can mark some of the agent's claims as unsupported, either because
the agent self-reports them as such or because the evidence comes from sources
the verifier does not recognize. These claims are surfaced as warnings: the
receipt still verifies cryptographically, but the verifier tells the reviewer
that this particular claim has no external backing. The reviewer can then
decide whether the claim matters enough to require additional verification.
Why this distinction matters
Most systems that try to address agent trust make claims they cannot keep. They
promise to detect lies, catch hallucinations, or verify outputs end-to-end.
These promises sound good in marketing copy and fail in practice because no
system can verify a claim that was never independently attested in the first
place. When the system fails, the failure looks like the protocol's fault, even
though the underlying gap was always between the agent and the world.
Sequesign takes a different approach. The protocol does what it can prove and
surfaces what it cannot. A receipt with no external attestations on any
content-level claim is still useful: it proves the agent committed to a
specific record, at a specific time, in a specific order, with the right
signatures. That alone is enough to defeat the "the agent wrote the logs after
the fact" attack, the "the agent skipped a required approval" attack, and the
"the evidence was changed after the work was done" attack. Those are real
attacks and the receipt does prevent them.
For everything beyond that, the receipt makes the trust requirements visible.
If the LLM response is unattested, the receipt says so. If the vendor identity
is unverified, the receipt says so. If a claim is agent-asserted with no
external backing, the receipt says so. The reviewer no longer has to guess
which parts of the agent's report are defensible and which are taken on faith.
They can see the line.
The honest version of the pitch
A Sequesign receipt does not make an unreliable agent reliable. It does not
make a dishonest agent honest. It does not magically verify external facts. It
does something more limited and more useful: it produces an artifact that
separates what is cryptographically provable from what is only agent-asserted,
and it does so in a way that travels with the work and can be verified offline
by anyone who has the receipt.
That separation is the product. Everything else is either downstream evidence
pipelines (whose receipts can be referenced) or out of scope.
Try the live demo
.
Read the trust model