Skip to main content
OPEN PROTOCOL

PEAC: the receipt protocol

Agents discover policies via /.well-known/peac.txt and send PEAC-Receipt on every request.

The protocol

PEAC establishes a standardized method for autonomous agents to discover resource policies, negotiate access terms, and generate cryptographically verifiable receipts. By publishing a machine-readable /.well-known/peac.txt file, any digital resource becomes discoverable and accessible to agents while maintaining full policy control and attribution tracking.

File-based policies

Simple, standardized policy declaration

Cryptographic receipts

JWS-signed proof of compliant access

Agent coordination

Automated discovery and negotiation

/.well-known/peac.txt
preferences: https://www.originary.xyz/.well-known/aipref.json
access_control: http-402
payments: x402, stripe
provenance: c2pa
receipts: required
verify: https://api.originary.xyz/verify
public_keys:
  kid=2025-09-key1; alg=Ed25519; key=...   # base64url

Enterprise benefits

Instant policy discovery

Agents automatically discover and respect your usage policies without manual integration or API documentation.

Compliance by design

Built-in attribution, quota enforcement, and audit trails with cryptographically verifiable receipts.

Universal compatibility

Works with existing infrastructure: CDNs, API gateways, auth systems, and payment processors.

Deploy PEAC at enterprise scale

Large enterprises use PEAC Protocol to govern agent interactions, ensure compliance, and monetize digital resources.