Home

Reciprium Receipt Specification

Reciprium defines an open, versioned standard for cryptographically verifiable mutation records across infrastructure, data, access, configuration, and security workflows.

This site is the canonical guide for implementers, verifier authors, and auditors.

Why This Spec Exists

Most operational systems can tell you what happened, but not with a portable, cryptographically verifiable contract that survives tool boundaries.

Reciprium receipts provide:

  • a stable envelope shared across languages and runtimes,
  • explicit intent/subject/scope context,
  • structured execution and verification evidence,
  • signed integrity metadata for offline verification,
  • optional chain-linking for tamper evidence over time.

Quick Start

  1. Read the model overview: Overview
  2. Understand the contract boundary: Envelope
  3. Implement signing correctly: Signatures
  4. Validate chain semantics: Hash Chain
  5. Integrate with your platform: Integration Guide

Documentation Map

Core Artifacts

See complete links and usage notes in Schema and Artifact Reference.

Minimal Validation Flow

# Validate CDDL source
cddl compile-cddl --cddl v1/cddl/receipt.cddl

# Validate all example receipts
for f in v1/examples/*.json; do
  cddl validate --cddl v1/cddl/receipt.cddl --json "$f"
done

Interoperability Guarantees (v1)

  • signedContent.canonicalization is json-canonical only.
  • Canonicalization follows RFC 8785 JCS semantics.
  • signedContent.includes mapping and message construction are explicitly defined and deterministic.
  • Shared test vectors provide cross-language evidence for signature interoperability.

Governance

This is a standards repository, not an ad-hoc document dump. Normative changes follow the RFC flow in Contributing.