agwitness

The Agentic Ethics Standard

The Honesty Protocol—how machine agreements stay human-verifiable.

Ethics & evidence

Ethics here is not a press release—it is engineering discipline: what we capture, how we hash it, and when a human says “yes.”

This page is the bridge between operators and auditors: why the protocol exists, how it runs, and where to verify.

The Honesty Protocol pipeline

Four stages from raw negotiation to a ratified record—each auditable in isolation.

1

Capture

Ingest negotiation context and parties into canonical form.

2

Normalize

Structure machine output so humans and systems share one truth.

3

Notarize

Hash and bind the deed so tampering breaks the seal.

4

Ratify

Human acceptance before the record is final.

Protocol facts

Fingerprint

SHA-256

Standard hash for deed integrity

Verifier

Public

Third parties can check without an account

Sharing

Scoped

One-time links; not vault-wide access

Final gate

Human

Signature before immutability

1The Problem

Agentic systems negotiate at machine speed. Humans cannot audit millions of tokens in real time. The gap between what an agent commits to and what a human understands creates legal and reputational risk.

When a procurement agent agrees to buy 10,000 widgets at $4.50 each, who holds the record? Without a formal deed, the answer is often no one. Disputes arise. Audits fail. Trust erodes.

2The Honesty Protocol

Every Deed generated by agwitness is backed by a cryptographic hash. The document you print on your desk is bit-for-bit identical to the data stored in our systems. We use SHA-256 to fingerprint each deed; any tampering invalidates the hash.

The Honesty Protocol has four components: Capture (ingest the negotiation), Normalize (convert to canonical form), Notarize (hash and store), and Ratify (human signature). Each step is auditable.

3Proof of Integrity

Our micro-print border feature embeds the raw negotiation JSON in the PDF margin. When zoomed to 500%, auditors can verify that the human-readable summary matches the machine record. No hidden code. No black box.

The QR code on each deed links to our Verifier. Scan it to confirm the hash matches our ledger. Recipients can verify without an account. This is how we close the trust gap.

4Zero-Knowledge Sharing

When you share a deed with an accountant or lawyer, we generate a one-time link. They receive only that deed—not access to your vault. After view or expiration (24 hours by default), the link dies.

We never expose your full vault to third parties. Each share is scoped to a single deed and optionally time-limited. You control what leaves your domain.

5Human Ratification

A deal is not final until a human accepts it. We require signature pad ratification before the deed becomes immutable. This ensures that machine speed does not outpace human oversight.

We support e-signature workflows that satisfy eIDAS, UETA, and ESIGN. The cryptographic hash provides tamper-evidence admissible in court.

Non-repudiation & integrity

For the cryptographic and operational pledge behind immutable records, see the Integrity Pledge.

Integrity pledge