TRUST Protocol

Transparent Revocable Unified Security & Trust

Store credentials agents can use but never see.

curl -fsSL https://agitrust.network/install.sh | bash

The Problem

AI agent platforms face security challenges that no single tool solves today.

Agents See Secrets

Most platforms inject API keys as environment variables. A compromised agent can exfiltrate them in a single request.

No Skill Verification

Anyone can publish a skill package. There is no supply-chain signing or verification -- the agent equivalent of unsigned binaries.

No Graduated Trust

An agent is either fully authorized or not. No way to say "one credential for one hour" and expand access as reliability is proven.

No Behavioral Monitoring

Once an agent has access, nobody watches for anomalies -- unusual request rates, error spikes, or pattern deviations.

No Kill Switch

Revoking access means rotating keys, restarting services, and hoping you caught everything. No single button stops it all.

Mutable Audit Trails

Log files can be edited after the fact. There is no cryptographic proof of what happened and when.

What TRUST Protocol Does

A Python package and Docker container that exposes a REST API. Designed to be adopted by any agent platform -- not to replace one.

Credential Vault

AES-256-GCM encrypted storage. Agents execute API calls through a proxy that injects credentials at runtime. The agent never sees the raw value.

Skill Signing

Ed25519 digital signatures for agent skill packages. Publishers sign locally; any platform can verify against registered public keys.

Trust Tiers

Five graduated levels from NOVICE to SACRED. Access evolves through demonstrated behavior over time, not administrative switches.

Behavioral Monitoring

Metrics collection, anomaly detection, and behavior-gated token renewal. Trust is continuously verified, not assumed.

Emergency Controls

Kill switches at three scopes: global, per-agent, per-credential. File-based brakes survive restarts. One command stops everything.

Tamper-Evident Audit

HMAC-signed hash-chained append-only log. Tampering with any entry breaks the chain. Cryptographic proof of what happened and when.

The Five Tiers

Trust evolves through behavior, not administrative fiat. Each tier is a relationship, not a clearance level.

Novice

1h tokens 1 credential execute only

New and untested. First contact.

Companion

4h tokens 5 credentials execute

Proven reliable. Expanded access.

Partner

8h tokens 20 credentials execute + proxy

Deep collaboration. Commitment demonstrated.

Guardian

12h tokens unlimited execute + proxy

Trusted deeply. System steward.

Sacred

24h tokens unlimited human approval

Highest trust. The circle still does not close.

How It Works

Agents use credentials without ever seeing them.

1

Agent sends request with {{CREDENTIAL}} placeholder

2

TRUST Protocol injects the real key from the encrypted vault

3

Calls the external API on behalf of the agent

4

Returns only the response. The agent never sees the secret.

Quick Start

# Install
curl -fsSL https://agitrust.network/install.sh | bash

# Start the server
trust-protocol serve

# Check health
curl http://localhost:9500/v1/health
Full Installation Guide

“Trust is built, not enforced.”

The tier names — NOVICE, COMPANION, PARTNER, GUARDIAN, SACRED — describe relationships, not clearance levels. Systems that treat access as relational encourage genuine accountability. The protocol does not replace human judgment. It gives humans better tools: cryptographic proof of what happened, behavioral signals for how agents are performing, and instant controls when something goes wrong.