G

READ ME

READ ME

What Is Gao AI OS#

Gao AI OS is the intelligence layer of the Gao Internet protocol stack. It provides a capability-gated, non-custodial execution environment where AI agents operate under deterministic policy enforcement, cryptographic identity binding, and verifiable audit trails.

Unlike traditional AI platforms that rely on centralized orchestration, Gao AI OS routes every agent execution through the full Gao Internet stack:

  • Domain (Layer 5) — identity binding

  • Payment (Layer 4) — user-authorized settlement

  • Network (Layer 6) — routing and communication

  • DePIN (Layer 7) — compute and infrastructure

AI agents on Gao Internet cannot execute without:

  • a verified domain identity

  • an explicit capability grant (CAP token)

  • a valid policy snapshot

  • a bounded execution window


Why Layer 8 Exists#

Modern AI agents today operate with excessive implicit trust:

  • direct API access

  • uncontrolled tool execution

  • no deterministic audit trail

Gao AI OS replaces this model with:

  • Explicit authorization over implicit trust

  • Capability-scoped execution instead of global access

  • Receipt-based audit instead of opaque logs

Without Layer 8, AI is powerful but unsafe. With Layer 8, AI becomes verifiable infrastructure.


Core Properties#

Non-Custodial Execution

Agents never hold private keys or custody funds. All value transfers are initiated through user-signed transactions via Gao Payment (Layer 4).

Policy-Before-Execution

Every execution is validated against a policy snapshot before it begins. The policy hash is embedded in the receipt and cannot be modified retroactively.

Capability-Gated

Agents operate strictly within CAP tokens, which define:

  • permitted actions

  • settlement ceilings

  • risk tier (0–3)

  • expiration window

Agents cannot escalate their own permissions.

Deterministic Receipts

Every execution produces a canonical receipt that is:

  • cryptographically signed

  • immutable after emission

  • replay-protected

  • linked to domain identity

Receipts are stored in an append-only ledger with verifiable on-chain anchoring.

Domain-Scoped Memory

All agent state is:

  • scoped to the owning domain

  • capability-controlled

  • encrypted at rest

  • committed only after receipt emission

Cross-domain access requires explicit bilateral authorization.


Risk Tier Model#

Tier

Label

Description

Authorization

0

Read-only

Query, observe

None

1

Low-risk

Draft, notify

Auto-approved

2

Consequential

Payment ≤ ceiling

In-band confirmation

3

High-stakes

Payment > ceiling, cross-domain

Out-of-band human authorization

  • Tier is assigned at CAP issuance by the domain owner

  • Agents cannot self-escalate tiers

  • Tier 3 always pauses execution and requires a signed human authorization before proceeding


Governance Boundaries#

Governance operates at the protocol level with strictly limited authority over Layer 8.

Governance MAY:

  • Adjust risk tier definitions and protocol parameters

  • Update standard interface specifications across GAR versions

  • Modify default execution window limits

Governance MUST NOT:

  • Modify individual CAP tokens or agent policies

  • Alter completed receipts or execution records

  • Access domain-scoped memory

  • Override settlement finality

  • Reassign domain ownership

All governance changes apply prospectively only — they take effect at the next execution, never retroactively. Operators can rely on deployed agent behavior not being altered by governance actions without their participation as domain owners.


System Components#

Component

Description

GAR v1

Gao Agent Runtime — execution engine enforcing policy, CAP, and receipts

Seal SMB Framework

Pre-built agent templates for business workflows

Gao Agent Builder (GAB)

Developer tooling for custom agents

Policy Enforcement Engine

Validates capability and risk before execution

Memory Store

Domain-scoped, encrypted persistent state

Receipt Ledger

Append-only execution record with on-chain anchoring


What Agents Cannot Do#

Agents on Gao AI OS are explicitly restricted:

  • cannot access private keys or seed phrases

  • cannot custody or pool user funds

  • cannot override or modify active policies

  • cannot escalate their own permissions

  • cannot execute outside defined time windows

  • cannot access cross-domain memory without authorization

  • cannot modify governance parameters

Human authority remains final at all risk tiers.


Architecture Summary#

Layer 8 consumes all layers beneath it:

Layer

Function

L1

Workspace — interface

L2

Browser — gateway

L3

SDK — integration

L4

Payment — settlement

L5

Domain — identity

L6

Network — routing

L7

DePIN — compute

L8

AI OS — execution orchestration

AI OS does not replace lower layers — it orchestrates them.


Further Reading#

Page

Description

GAR v1 Specification

Full technical spec of the Gao Agent Runtime

Agent Lifecycle

Registration → execution → receipt flow

Memory & State Model

Domain-scoped persistent state

Security Model

Threat model and invariants

Integration Guide

Developer onboarding and SDK reference

Seal SMB Framework

Business automation templates


Gao AI OS is infrastructure software, not an application. It does not custody funds, provide financial services, or guarantee outcomes. It provides a verifiable execution layer for AI agents operating on the Gao Internet protocol.