Skip to main content
Open Source — Apache-2.0

Open standard
for verifiable interaction records

PEAC is the open standard for verifiable interaction records. Originary is one product built on top of it. PEAC defines how systems publish machine-readable interaction terms and issue signed records for automated requests. Verify them independently, even offline.

Originary is one implementation. PEAC remains open, neutral, and implementation-independent.

What PEAC defines

Three protocol surfaces for verifiable automated interactions

Policy discovery

Publish machine-readable interaction terms and rules at a well-known endpoint. Agents and systems discover your policies before making requests.

Interaction record format

Issue signed records for automated requests. Ed25519 signatures, compact JWS serialization, and deterministic claim structure.

Verification and conformance

Verify records independently with the public key alone. Conformance testing ensures cross-implementation compatibility deterministically.

What PEAC does not replace

PEAC is designed to interoperate with adjacent standards rather than replace them.

Works with auth and identity systemsWorks with payment rails and commerce layersWorks with observability and transport standards

Implementation status

PEAC is an open standard under active development. No single implementation has privileged status. Originary is one implementation; independent implementations are welcome. Conformance testing is the interoperability anchor.

Ten verification domains

Protocol capability map for verifiable automated interactions

Who and why

Access

Declare who can use your resources and under what conditions

Identity

Cryptographic proof-of-control for agents and operators

Purpose

Declared intent of each interaction and purpose-driven access

Trust and governance

Consent

Explicit, machine-readable consent before access

Privacy

Minimal disclosure and selective transparency

Compliance

Audit trails and records for regulatory requirements

Safety

Defense-in-depth security and safe-by-default configuration

Evidence and value

Attribution

Every request carries verifiable identity and intent

Provenance

Cryptographic proof of what happened and when

Commerce

Payment semantics via HTTP 402 and pricing headers

Governance and contributing

PEAC is developed in public under the Apache-2.0 license. Originary (Poem, Inc.) is the primary maintainer today. Contributions are welcome. Supply chain hardening includes automated audit gates, lockfile drift detection, and a published security policy.

PEAC Protocol FAQ

Common questions about the open standard

Start here on PEAC

Apache-2.0. Self-host everything. No sign-up required.