Consent receipts: proof of permission for AI agent transactions

A consent receipt is the missing artifact in most agentic commerce stacks. It turns “the user allowed it” into a portable object that can be verified at the moment of transaction and stored as evidence without relying on screenshots or trust-me logs.

See a transaction-scoped YES/NO decision.
Run the live demo, then compare with the consent-receipt verifier prototype.
Try the live verification demo Consent receipt verifier (lab)

Issuer-side: authorization evidence

Prove a delegated agent was in-scope when an authorization was approved. Link the authorization decision to a verifiable consent object.

Merchant-side: checkout trust

Verify an agent’s permission before you create the order. Avoid accepting “agent traffic” that is unauthorised or replayed.

What a consent receipt is (and what it isn’t)

A consent receipt is not a UI screen, a terms checkbox, or a generic access token. It is a structured object whose purpose is to support a binary verification decision for a specific action.

Minimum fields for an enterprise-safe receipt

To avoid ambiguity and legal/compliance gaps, a consent receipt should be able to answer “who, what, when, within which limits” without needing application logs.

How verification should work

Verification is a deterministic check that produces a stateless YES/NO outcome.

Input: receipt + proposed transaction context.

Checks: signature, expiry, revocation, scope match, constraint match, replay status.

Output: eligible: true|false + proof object for audit/logging.

Internal links

FAQ

What is a consent receipt?
A machine-verifiable record that a user authorised an AI agent to perform actions within defined limits, designed to be checked at transaction time and stored as evidence.
How is this different from OAuth scopes?
OAuth scopes authorize API access. Consent receipts prove a specific delegation and its constraints, so a verifier can return YES/NO for a proposed transaction.
What’s the “proof object” used for?
Logging, disputes, and audits. It’s the evidence that verification happened and what it concluded, without requiring raw user interaction logs.
Can this be privacy-preserving?
Yes. Use pseudonymous identifiers, minimal fields, and verification designs that avoid storing or exposing PII while still producing auditable outcomes.