READ ME
What Is Gao AI OS#
Gao AI OS is the intelligence layer of the Gao Internet protocol stack. It provides a capability-gated, non-custodial execution environment where AI agents operate under deterministic policy enforcement, cryptographic identity binding, and verifiable audit trails.
Unlike traditional AI platforms that rely on centralized orchestration, Gao AI OS routes every agent execution through the full Gao Internet stack:
-
Domain (Layer 5) — identity binding
-
Payment (Layer 4) — user-authorized settlement
-
Network (Layer 6) — routing and communication
-
DePIN (Layer 7) — compute and infrastructure
AI agents on Gao Internet cannot execute without:
-
a verified domain identity
-
an explicit capability grant (CAP token)
-
a valid policy snapshot
-
a bounded execution window
Why Layer 8 Exists#
Modern AI agents today operate with excessive implicit trust:
-
direct API access
-
uncontrolled tool execution
-
no deterministic audit trail
Gao AI OS replaces this model with:
-
Explicit authorization over implicit trust
-
Capability-scoped execution instead of global access
-
Receipt-based audit instead of opaque logs
Without Layer 8, AI is powerful but unsafe. With Layer 8, AI becomes verifiable infrastructure.
Core Properties#
Non-Custodial Execution
Agents never hold private keys or custody funds. All value transfers are initiated through user-signed transactions via Gao Payment (Layer 4).
Policy-Before-Execution
Every execution is validated against a policy snapshot before it begins. The policy hash is embedded in the receipt and cannot be modified retroactively.
Capability-Gated
Agents operate strictly within CAP tokens, which define:
-
permitted actions
-
settlement ceilings
-
risk tier (0–3)
-
expiration window
Agents cannot escalate their own permissions.
Deterministic Receipts
Every execution produces a canonical receipt that is:
-
cryptographically signed
-
immutable after emission
-
replay-protected
-
linked to domain identity
Receipts are stored in an append-only ledger with verifiable on-chain anchoring.
Domain-Scoped Memory
All agent state is:
-
scoped to the owning domain
-
capability-controlled
-
encrypted at rest
-
committed only after receipt emission
Cross-domain access requires explicit bilateral authorization.
Risk Tier Model#
Tier
Label
Description
Authorization
0
Read-only
Query, observe
None
1
Low-risk
Draft, notify
Auto-approved
2
Consequential
Payment ≤ ceiling
In-band confirmation
3
High-stakes
Payment > ceiling, cross-domain
Out-of-band human authorization
-
Tier is assigned at CAP issuance by the domain owner
-
Agents cannot self-escalate tiers
-
Tier 3 always pauses execution and requires a signed human authorization before proceeding
Governance Boundaries#
Governance operates at the protocol level with strictly limited authority over Layer 8.
Governance MAY:
-
Adjust risk tier definitions and protocol parameters
-
Update standard interface specifications across GAR versions
-
Modify default execution window limits
Governance MUST NOT:
-
Modify individual CAP tokens or agent policies
-
Alter completed receipts or execution records
-
Access domain-scoped memory
-
Override settlement finality
-
Reassign domain ownership
All governance changes apply prospectively only — they take effect at the next execution, never retroactively. Operators can rely on deployed agent behavior not being altered by governance actions without their participation as domain owners.
System Components#
Component
Description
GAR v1
Gao Agent Runtime — execution engine enforcing policy, CAP, and receipts
Seal SMB Framework
Pre-built agent templates for business workflows
Gao Agent Builder (GAB)
Developer tooling for custom agents
Policy Enforcement Engine
Validates capability and risk before execution
Memory Store
Domain-scoped, encrypted persistent state
Receipt Ledger
Append-only execution record with on-chain anchoring
What Agents Cannot Do#
Agents on Gao AI OS are explicitly restricted:
-
cannot access private keys or seed phrases
-
cannot custody or pool user funds
-
cannot override or modify active policies
-
cannot escalate their own permissions
-
cannot execute outside defined time windows
-
cannot access cross-domain memory without authorization
-
cannot modify governance parameters
Human authority remains final at all risk tiers.
Architecture Summary#
Layer 8 consumes all layers beneath it:
Layer
Function
L1
Workspace — interface
L2
Browser — gateway
L3
SDK — integration
L4
Payment — settlement
L5
Domain — identity
L6
Network — routing
L7
DePIN — compute
L8
AI OS — execution orchestration
AI OS does not replace lower layers — it orchestrates them.
Further Reading#
Page
Description
GAR v1 Specification
Full technical spec of the Gao Agent Runtime
Agent Lifecycle
Registration → execution → receipt flow
Memory & State Model
Domain-scoped persistent state
Security Model
Threat model and invariants
Integration Guide
Developer onboarding and SDK reference
Seal SMB Framework
Business automation templates
Gao AI OS is infrastructure software, not an application. It does not custody funds, provide financial services, or guarantee outcomes. It provides a verifiable execution layer for AI agents operating on the Gao Internet protocol.