<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ventse</title>
    <description>The latest articles on DEV Community by Ventse (@traceseal).</description>
    <link>https://dev.to/traceseal</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3882611%2F9fea844c-d8a3-423f-9fd5-c12bd3e6960d.png</url>
      <title>DEV Community: Ventse</title>
      <link>https://dev.to/traceseal</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/traceseal"/>
    <language>en</language>
    <item>
      <title>Proving What Your AI Agent Did: Introducing Traceseal</title>
      <dc:creator>Ventse</dc:creator>
      <pubDate>Thu, 16 Apr 2026 14:01:09 +0000</pubDate>
      <link>https://dev.to/traceseal/proving-what-your-ai-agent-did-introducing-traceseal-5bpn</link>
      <guid>https://dev.to/traceseal/proving-what-your-ai-agent-did-introducing-traceseal-5bpn</guid>
      <description>&lt;p&gt;Every AI agent framework can make agents do things. None of them&lt;br&gt;
can prove what the agent did.&lt;/p&gt;

&lt;p&gt;When a client asks "was your AI agent running authorized code when&lt;br&gt;
it published that article?" the answer today is "trust me." When a&lt;br&gt;
regulator asks "what capabilities did the automated system have?"&lt;br&gt;
the answer is "trust me." When something goes wrong and someone&lt;br&gt;
asks "what exactly happened?" the answer is still "trust me."&lt;/p&gt;

&lt;p&gt;We built Traceseal to replace "trust me" with math.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Traceseal does
&lt;/h2&gt;

&lt;p&gt;Traceseal produces an Execution Receipt — a signed JSON document&lt;br&gt;
that proves:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What code ran (manifest hash over every source file)&lt;/li&gt;
&lt;li&gt;Who authorized it (publisher's ed25519 signature)&lt;/li&gt;
&lt;li&gt;What sandbox it ran in (hash of the kernel-namespace configuration)&lt;/li&gt;
&lt;li&gt;What it produced (SHA-256 of inputs and outputs)&lt;/li&gt;
&lt;li&gt;Who vouches for it (operator's ed25519 signature over all of the above)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A third party verifies the receipt with one command:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;pip install traceseal-verify
traceseal-verify receipt.json

[OK] receipt.json
  skill:     agentmail v1.2.0
  operator:  ed25519:f19bc125...
  publisher: ed25519:a07c7eb5...
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;No access to the operator's machine. No trust assumptions. Just math.&lt;/p&gt;

&lt;h2&gt;
  
  
  What we built
&lt;/h2&gt;

&lt;p&gt;8 weeks. 217 tests. 27-entry audit chain on real Debian 13 hardware.&lt;br&gt;
Three signed production skills with verified receipts:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;A multi-entry-point skill bundle&lt;/strong&gt; — signed, sandboxed with&lt;br&gt;
kernel-namespace isolation, receipt verified by a third party. 116ms.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;A real production skill with SDK dependencies&lt;/strong&gt; — the agentmail&lt;br&gt;
SDK was mounted read-only into the sandbox. The execution failed&lt;br&gt;
(bad API key) and the receipt honestly records the failure.&lt;br&gt;
The system doesn't hide bad outcomes — it seals them.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;A web scraping skill&lt;/strong&gt; — signed, sandboxed, 47ms, receipt verified.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The full pipeline — sign, sandbox, execute, receipt, verify — runs&lt;br&gt;
in under 200ms.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why this matters
&lt;/h2&gt;

&lt;p&gt;AI agents are moving from demos to production. When they get there,&lt;br&gt;
someone will ask for proof. Proof that the code was authorized.&lt;br&gt;
Proof that the sandbox was real. Proof that the outputs weren't&lt;br&gt;
tampered with. Proof that a third party can check independently.&lt;/p&gt;

&lt;p&gt;Every other trust system in the AI agent space offers dashboards,&lt;br&gt;
not proofs. They log what happened. We seal it. The difference:&lt;br&gt;
a log says "the operator claims this happened." A receipt says&lt;br&gt;
"anyone can independently verify this happened."&lt;/p&gt;

&lt;h2&gt;
  
  
  Open spec, open verifier
&lt;/h2&gt;

&lt;p&gt;The Execution Receipt Specification is Apache 2.0:&lt;br&gt;
→ &lt;a href="https://traceseal.io/spec" rel="noopener noreferrer"&gt;RECEIPT-SPEC.md&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The standalone verifier is Apache 2.0:&lt;br&gt;
→ pip install traceseal-verify&lt;br&gt;
→ &lt;a href="https://github.com/traceseal/traceseal-verify" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The transparency log is live:&lt;br&gt;
→ &lt;a href="https://log.traceseal.io" rel="noopener noreferrer"&gt;log.traceseal.io&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Anyone can verify receipts. Anyone can implement the spec.&lt;br&gt;
The hard part — signing, sandboxing, audit logging, the full stack&lt;br&gt;
that generates receipts worth verifying — is Traceseal.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's next
&lt;/h2&gt;

&lt;p&gt;Traceseal currently produces receipts for skill execution. We're&lt;br&gt;
extending the receipt format to cover:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Model call receipts&lt;/strong&gt; — prove which model processed your data&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Orchestration receipts&lt;/strong&gt; — prove a multi-step workflow
executed in order with declared inputs at each step&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Data flow receipts&lt;/strong&gt; — prove what data was sent where&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Same format. Same verifier. Same transparency log.&lt;/p&gt;

&lt;p&gt;The goal: a cryptographic audit trail for every action your AI agent&lt;br&gt;
takes, verifiable by anyone, without trusting the operator's machine.&lt;/p&gt;

&lt;p&gt;→ &lt;a href="https://traceseal.io" rel="noopener noreferrer"&gt;traceseal.io&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>opensource</category>
      <category>devops</category>
      <category>security</category>
    </item>
  </channel>
</rss>
