Runtime Evidence

Signed receipts that prove controls ran

Every consequential control event can produce an OVERT-compatible receipt. Tamper-evident, independently verifiable, and designed so proof travels while sensitive data stays local.

Sample runtime receipt sealed
receipt: {
  v: "overt/0.4",
  policy: "policy.fsi.credit_match",
  model: "llama-4-maverick@2026-04-01",
  decision: "allowed",
  at: "2026-04-25T10:51:57Z",
  prev: glc_887ab46a7f,
  sig: ed25519:9c3a…d04e
}
OVERT-format · tamper-evident · independently verifiable

Only hashes cross the boundary

The receipt layer runs inside your environment alongside the runtime-control sidecar. It records control execution locally, generates a cryptographic commitment, and emits an OVERT-format receipt. Sensitive payloads stay inside your stack; only verification metadata, hashes, and signatures cross the trust boundary.

GLACIS is architecturally incapable of receiving your data

OVERT

Open standard at overt.is

Zero Data

Crosses the trust boundary. Only hashes.

Any Verifier

Independent verification. No vendor lock-in.

Every control event. Independently verifiable.

GLACIS generates signed runtime receipts in an OVERT-compatible format. Each receipt proves which control ran, what the outcome was, and when it happened—without exposing your data.

OVERT-Format Receipts

Open standard for AI attestation. Machine-readable, human-auditable, interoperable across tools. overt.is

Tamper-Evident

Cryptographic commitments make any modification detectable. Receipts can’t be altered after the fact.

Independent Verification

Any third party can verify a receipt without access to GLACIS. No vendor lock-in for your evidence trail.

Evidence Pack Assembly

Receipts roll up into reviewer-ready artifacts with control mappings, findings, remediation status, and verification metadata.

Zero Sensitive-Data Egress

Your data stays in your environment. GLACIS emits only verification metadata, signatures, and cryptographic hashes across the trust boundary.

Evidence Pack Export

OSCAL-compatible evidence packs for auditors. Machine-readable, standards-based, ready for regulatory review.

When “trust us” isn’t enough

AI vendors stuck in security review. Your product works. Their security team wants proof. Runtime receipts give them independently verifiable evidence that controls ran—not just a promise that they will.

Regulated organizations deploying AI. Colorado AI Act, EU AI Act, HIPAA—all require evidence of control execution. Runtime receipts preserve that evidence as a byproduct of operation.

Agent developers embedding governance. Your customers need proof. Hand them a verifiable evidence trail without building attestation infrastructure yourself.

Anyone whose AI decisions have consequences. If an AI output affects a person, a patient, or a financial outcome, you need signed proof that the right controls ran.

Start with one evidence pack

The Agent Runtime Security Sprint instruments one high-risk workflow and turns signed receipts into a regulator-, auditor-, buyer-, and security-review-ready evidence pack.

Built In

Notarize receipts are part of every Enforce plan. See plans →

OVERT

Open standard. Verify receipts without vendor lock-in. overt.is →

Common questions about runtime evidence

What is an OVERT receipt?

An OVERT receipt is a structured attestation record in the open OVERT standard. It contains cryptographic commitments proving which controls ran, what the verdict was, and when—without exposing the underlying data.

What does “zero sensitive-data egress” mean?

Your data—prompts, responses, patient information—never leaves your environment. Runtime controls and receipt generation run locally. Only verification metadata, hashes, and signatures cross the trust boundary.

Can anyone verify a receipt, or just GLACIS?

Anyone. OVERT receipts are independently verifiable. Your auditor, your customer, a regulator—they can verify without contacting GLACIS or using our tools.

What is an evidence pack?

An evidence pack is a reviewer-ready bundle of signed receipts, workflow context, control mappings, findings, and remediation status. It is built for security reviewers, auditors, buyers, regulators, and internal governance teams.

Do receipts require GLACIS runtime controls?

Receipts are most useful when they are attached to real runtime controls. The Sprint starts with one workflow so the evidence has an actual control surface, data boundary, and reviewer context.

Evidence is one part of the assurance loop.

Diagnostic

Map the workflow surface

Identify attack paths, data boundaries, tool-call risks, control gaps, and the first receipts that need to exist.

View diagnostic

Controls

Runtime controls for one workflow

Drift detection, policy controls, permit/deny/escalate decisions on every request — each one witnessed and receipted.

Learn about controls