How it works
- PEP enforces constraints and executes tool/model.
- Receipt is emitted (decision_id, policy_hash, schema, cost, timestamp).
- Receipts chain for tamper-evidence; analytics build cost and evidence views.
{
"decision_id": "d-9f2",
"policy_hash": "sha256:a1c",
"tool_schema": "mcp_v2.1",
"cost_usd": 0.012,
"timestamp": "2025-01-27T10:23:45Z"
}