Every tool call gets a cryptographic receipt backed by a Merkle proof. One decorator. Zero dependencies. Verification in microseconds.
Functions return the same values. But now every call is hashed into a Merkle chain with a proof you can verify independently.
Published at ENASE 2026. Based on PhD research in authenticated data structures.