Comparison

Protocol-Level Receipts vs Custom Wrapper Logging

Most teams start with custom wrappers: intercept the API call, log the request and response, store it somewhere. This works until an auditor asks "prove this log was not modified." Protocol-level receipts answer that question by design.

Head-to-Head

DimensionClaw EACustom wrappers / ad-hoc logging
Evidence standardProtocol-defined schemas (versioned, interoperable)Ad-hoc logging (custom per team)
SigningEd25519 per receipt + per bundleNone (log entries are unsigned)
VerificationDeterministic offline verifierGrep through logs
Receipt bindingReceipts bound to event chain via run_id + event_hashLog correlation by timestamp (approximate)
Policy enforcementContent-addressed WPC pinned in receiptsConfig file (version unknown at audit time)
Maintenance costProtocol handles versioning and schema evolutionTeam maintains custom wrappers per model/tool
Third-party trustVerifiable by anyone with the public keyTrust the team that wrote the wrapper

The Wrapper Tax

Every custom wrapper is a maintenance liability. When the model provider changes their API, the wrapper breaks. When you add a new model, you write a new wrapper. When you need to prove what happened six months ago, you hope the log schema has not changed.

Protocol-level receipts are versioned, schema-defined, and interoperable. A receipt from today and a receipt from six months ago both verify against the same algorithm. The proof bundle schema evolves additively, and unknown versions fail closed in the verifier.

Migration Path

You do not need to rip out custom wrappers overnight. Route model calls through clawproxy to start generating gateway receipts alongside your existing logging. The receipts add a signed evidence layer on top of whatever you already have.

See how this maps to your environment

Take the two-minute assessment. We map controls, receipts, and proof requirements to your stack.

Take the assessment Security Review Pack