The Agentic Ethics Standard
The Honesty Protocol—how machine agreements stay human-verifiable.
Ethics & evidence
Ethics here is not a press release—it is engineering discipline: what we capture, how we hash it, and when a human says “yes.”
This page is the bridge between operators and auditors: why the protocol exists, how it runs, and where to verify.
The Honesty Protocol pipeline
Four stages from raw negotiation to a ratified record—each auditable in isolation.
Capture
Ingest negotiation context and parties into canonical form.
Normalize
Structure machine output so humans and systems share one truth.
Notarize
Hash and bind the deed so tampering breaks the seal.
Ratify
Human acceptance before the record is final.
Protocol facts
Fingerprint
SHA-256
Standard hash for deed integrity
Verifier
Public
Third parties can check without an account
Sharing
Scoped
One-time links; not vault-wide access
Final gate
Human
Signature before immutability
1The Problem
Agentic systems negotiate at machine speed. Humans cannot audit millions of tokens in real time. The gap between what an agent commits to and what a human understands creates legal and reputational risk.
When a procurement agent agrees to buy 10,000 widgets at $4.50 each, who holds the record? Without a formal deed, the answer is often no one. Disputes arise. Audits fail. Trust erodes.
2The Honesty Protocol
Every Deed generated by agwitness is backed by a cryptographic hash. The document you print on your desk is bit-for-bit identical to the data stored in our systems. We use SHA-256 to fingerprint each deed; any tampering invalidates the hash.
The Honesty Protocol has four components: Capture (ingest the negotiation), Normalize (convert to canonical form), Notarize (hash and store), and Ratify (human signature). Each step is auditable.
3Proof of Integrity
Our micro-print border feature embeds the raw negotiation JSON in the PDF margin. When zoomed to 500%, auditors can verify that the human-readable summary matches the machine record. No hidden code. No black box.
The QR code on each deed links to our Verifier. Scan it to confirm the hash matches our ledger. Recipients can verify without an account. This is how we close the trust gap.
4Zero-Knowledge Sharing
When you share a deed with an accountant or lawyer, we generate a one-time link. They receive only that deed—not access to your vault. After view or expiration (24 hours by default), the link dies.
We never expose your full vault to third parties. Each share is scoped to a single deed and optionally time-limited. You control what leaves your domain.
5Human Ratification
A deal is not final until a human accepts it. We require signature pad ratification before the deed becomes immutable. This ensures that machine speed does not outpace human oversight.
We support e-signature workflows that satisfy eIDAS, UETA, and ESIGN. The cryptographic hash provides tamper-evidence admissible in court.
Non-repudiation & integrity
For the cryptographic and operational pledge behind immutable records, see the Integrity Pledge.