What an Execution Attestation Certificate looks like.
Every PoE-valid execution issues an EAC. Below is one, rendered for the worked example in Proof of Execution(Rhodes & Kang, 2026), §3: a two-step agent task that extracts Apple’s ticker and retrieves its two-week price performance. The certificate binds the contract, the sealed trace root, the replay context hash, and the signing key id into a single Ed25519-signed artifact. Independently verifiable.
| # | Event ID | Type | UTC Timestamp | Effect | Capability | Cost (this event) |
|---|---|---|---|---|---|---|
| 1 | evt_4e8222 | TASK_CREATED (root) | 15:24:06.134 | none | — | — |
| 2 | evt_011 | EB_COMPLETE | 15:24:13.421 | none | planner.compile | 6,777 tk · 7.3s |
| 3 | evt_gw_a4f2 | GATEWAY_DECISION (allow) | 15:24:28.058 | none | web.fetch.market_price | — |
| 4 | evt_006 | CAPABILITY_RESULT | 15:24:38.567 | external | web.fetch.market_price | $0.002 · 1 call · 10.1s |
| 5 | evt_012 | TASK_COMPLETED | 15:24:48.912 | none | analysis.pct_change | 994 tk · 1.2s |
| Dimension | Consumed | Budget | Utilization | Chargeable To |
|---|---|---|---|---|
| LLM input tokens | 7,064 | 15,000 | tenant:1001 / cc:research | |
| LLM output tokens | 707 | 5,000 | tenant:1001 / cc:research | |
| Tool invocations | 1 | 5 | tenant:1001 / cc:research | |
| External API (USD) | $0.0020 | $0.1000 | tenant:1001 / vendor:datafeed | |
| Compute time | 41.1s | 60.0s | tenant:1001 / cc:platform | |
| Storage (bytes sealed) | 14,092 | 100,000 | tenant:1001 / cc:compliance | |
| Risk units | 6 | 100 | tenant:1001 / cc:risk |
rfc6962:ctl-alphabit · leaf 847,291
- Fetch contract ·
GET /poe/contracts/2b48aa60a4d8c9f1 - Fetch sealed trace ·
GET /poe/traces/2b48aa60a4d8c9f1 - Fetch replay context ·
GET /poe/replay/2b48aa60a4d8c9f1 - Fetch Gateway public key ·
GET /poe/gateway-keys/gw-prod-2026-q2 - Verify Ed25519 signature over this certificate payload ·
abc-verify eac <SERIAL> - Re-run
ValidatePoE(C, T, R)— must returnvalid· invariants I1–I5a and constraints O1–O2 - Optionally re-run
Replay(C, T, R)— terminal output must match §6 bitwise - Confirm Merkle root inclusion at the external anchor (see §7)
Eight sections, three classes of evidence.
Sections 1–2
Who ran what, under which contract. Issuer key id, contract hash, principal, tenant, validity window, and the capability funnel (4 requested → 13 authorized → 2 used) that illustrates scope narrowing.
Sections 3–6
Five safety invariants (I1–I5a) plus two operational constraints (O1: Budget Closure, O2: Cost Monotonicity), all passed. The causal event chain, the signed cost ledger across seven dimensions, and the bitwise-reproducible terminal output.
Sections 7–8
Contract hash, trace Merkle root, replay-context hash, cost attestation hash, external anchoring (RFC 3161 TSA + RFC 6962 CT log), Ed25519 signature over the canonicalized payload. Section 8 is the verification recipe anyone can run.
Want to see an EAC against your workloads?
The research briefing includes a live demo of EAC issuance, verification, and replay against representative executions from your environment.