PEAC: the receipt protocol
Agents discover policies via /.well-known/peac.txt and send PEAC-Receipt on every request.
The protocol
PEAC establishes a standardized method for autonomous agents to discover resource policies, negotiate access terms, and generate cryptographically verifiable receipts. By publishing a machine-readable /.well-known/peac.txt file, any digital resource becomes discoverable and accessible to agents while maintaining full policy control and attribution tracking.
File-based policies
Simple, standardized policy declaration
Cryptographic receipts
JWS-signed proof of compliant access
Agent coordination
Automated discovery and negotiation
Enterprise benefits
Instant policy discovery
Agents automatically discover and respect your usage policies without manual integration or API documentation.
Compliance by design
Built-in attribution, quota enforcement, and audit trails with cryptographically verifiable receipts.
Universal compatibility
Works with existing infrastructure: CDNs, API gateways, auth systems, and payment processors.
Deploy PEAC at enterprise scale
Large enterprises use PEAC Protocol to govern agent interactions, ensure compliance, and monetize digital resources.