WTF did my agent just do?
Agents now touch APIs, MCP servers, workflows, and third-party systems. Logs can tell you what your stack saw. They cannot give another party portable proof of what happened. PEAC is the open standard for verifiable interaction records. Originary helps teams deploy and operate it in production.
Agents are moving from chat into real systems. Once they cross organizational boundaries, logs stop being enough.
This is not another observability product
PEAC adds signed, portable records that travel across tools, vendors, and organizational boundaries. Another party can verify them independently.
An agent checks inventory via MCP. What do you get?
An agent invokes a tool on an MCP server. The tool calls an external API, policy is evaluated, and a result is returned.
"iss": "https://tools.vendor.com",
"kind": "evidence",
"type": "org.peacprotocol/access",
"occurred_at": "2026-03-19T14:23:02Z",
"policy": { "uri": "https://tools.vendor.com/.well-known/peac.txt" },
"ext": { "access": { "action": "read", "resource": "inventory" } }
}
The problem is not visibility. It is proof.
Agents cross boundaries
They call APIs, tools, and MCP servers outside your stack.
Logs stay local
Your trace is useful inside your stack. It is not evidence for a counterparty.
Disputes happen fast
A wrong call, a bad tool action, or a policy question all collapse into one question: what actually happened?
Logs are local.
Proof travels.
PEAC gives APIs, tools, and services a standard way to return signed interaction records. It adds portable proof across system and organizational boundaries.
another party can verify
How it works
Four steps from interaction to verifiable evidence.
Publish policy
Services expose machine-readable terms and policy at the edge, so agents know what to expect before interacting.
Return a signed record
When an agent request is processed, the service returns a portable signed record of what happened.
Verify anywhere
The receiver, operator, partner, or auditor verifies the record locally using the issuer's public key. Offline once keys are available.
Keep or bundle evidence
Use the record for incident review, disputes, compliance evidence, internal controls, or cross-party workflows.
Built for your role
API providers, MCP hosts, agent operators, and security teams each start differently.
I run an API
Add signed interaction records to requests and responses. Give your consumers portable proof.
API quickstartI run an MCP server
Return proof with tool calls and verifiable outcomes. Evidence travels with every response.
MCP quickstartI operate agents
Verify records locally and keep stronger evidence than screenshots or logs.
Try verifierSecurity, audit, compliance
Export portable evidence for reviews, incidents, and procurement decisions.
Talk to OriginaryOpen standard underneath.
Commercial support when you need it.
PEAC is the open standard. Originary is one production path built on top of it.
PEAC Protocol
- Open specification, Apache-2.0
- Self-hostable, no vendor lock-in
- Verification works offline once keys are available
- Public docs, tooling, and SDK
- Works alongside auth, payments, observability
Originary
- Guided deployment and rollout
- KMS-backed signing keys
- Compliance evidence bundles
- Dedicated engineering access
- SLA and priority support
Use the open protocol directly. Bring in Originary when you need production support.
You do not need Originary to adopt PEAC. But when you need managed deployment, key infrastructure, or compliance workflows, Originary is the commercial path.
Frequently asked
Is this just a joke site?
No. The name is the hook. The problem is real. This site exists to make a serious issue instantly legible.
Do I need Originary to use PEAC?
No. PEAC is open-source and self-hostable. There is no dependency on Originary in the verification path. Originary provides managed deployment and operational support for production teams.
Is this replacing auth, observability, or payment systems?
No. PEAC adds portable signed evidence alongside those systems. It does not replace auth, payment rails, observability platforms, or MCP/A2A runtimes.
Who is this for?
API providers, MCP and tool operators, agent platform teams, and security, audit, and compliance stakeholders who need verifiable evidence of agent interactions.
What does Originary sell?
Guided deployment, KMS-backed signing keys, compliance evidence bundles, dedicated engineering access, SLA support, and enterprise rollout around the open PEAC protocol.
How does verification work?
Records are signed with Ed25519 and verified locally with the issuer's public key. There is no dependency on Originary in the verification path. Verification is offline once public keys are available or bundled.
When the question lands, have proof ready.
Open protocol. Production path when you need it.