FortSignal-secured Deep Agents — cryptographically safe coding agent
Project description
FortSignal Deep Agents
Run any Deep Agent with cryptographic tool‑call protection powered by FortSignal. Every risky operation (write file, edit file, execute, sub‑task) is intercepted and routed through FortSignal's challenge/verify flow — only signed, cryptographically verified intents reach your machine.
pip install fortsignal-deepagents
Quick Start
1. Get credentials — sign up at dashboard.fortsignal.com
- Go to Settings → API Keys, create a key →
FORTSIGNAL_API_KEY - Go to Agents → Register Agent, download the key file →
FORTSIGNAL_AGENT_KEY - Note the agent ID →
FORTSIGNAL_AGENT_ID - Go to Policies, create one with
allowedActions: ["write_file", "edit_file"]
2. Run
export FORTSIGNAL_API_KEY="fs_live_..."
export FORTSIGNAL_AGENT_ID="my-agent"
export FORTSIGNAL_AGENT_KEY="/path/to/agent-key.json"
export DEEPSEEK_API_KEY="sk-..." # or OPENAI_API_KEY, etc.
fortsignal-deepagents --model "deepseek:deepseek-chat"
Every tool call is now cryptographically verified by FortSignal.
Why?
Deep Agents are trusted with powerful tools — file writes, shell commands, sub‑agent spawning. FortSignal adds a signing layer so every destructive action requires a signed challenge. This prevents prompt‑injection attacks from escalating into real damage.
Setup
You need three things from the FortSignal dashboard (https://dashboard.fortsignal.com):
- API Key — Authenticates requests to FortSignal's API
- User Registration — Required for passkey (human-in-the-loop) mode
- Agent Registration — Required for autonomous (agent) mode
1. Get your API key
- Go to dashboard.fortsignal.com → Settings → API Keys
- Create a new key and copy it — this is your
FORTSIGNAL_API_KEY
2. Get your User ID (for passkey mode)
- In the dashboard → Users → Add User
- Give it a name and ID (e.g.
"alice") - Register a passkey — the dashboard will prompt you to use Face ID, Touch ID, Windows Hello, or a hardware security key
- The user's ID (e.g.
"user_alice") is yourFORTSIGNAL_USER_ID
3. Register an agent (for autonomous mode)
- In the dashboard → Agents → Register Agent
- Give it an ID (e.g.
"my-deep-agent") - Download the generated Ed25519 agent key file (JSON) — this is your
FORTSIGNAL_AGENT_KEY - The agent's ID (e.g.
"agent_abc123") is yourFORTSIGNAL_AGENT_ID - Create a policy for this agent — define which actions (
write_file,execute, etc.) and which recipients (paths, commands) it's allowed to sign - Optionally set up delegation approvals if your policy requires human delegation for certain actions
4. Set environment variables
# Always required:
export FORTSIGNAL_API_KEY="fs_live_..."
# For agent mode (autonomous signing):
export FORTSIGNAL_AGENT_ID="agent_abc123"
export FORTSIGNAL_AGENT_KEY="/path/to/agent-key.json"
# OR for passkey mode (human-in-the-loop):
export FORTSIGNAL_USER_ID="user_alice"
# Your LLM provider key (e.g. OpenAI) is separate:
export OPENAI_API_KEY="sk-..."
Usage
Two modes depending on your workflow.
Agent mode (autonomous)
For automated agents that sign challenges with an Ed25519 key.
- Register your agent on the FortSignal dashboard and download its key file
- Run:
export FORTSIGNAL_AGENT_ID="my-agent-id"
export FORTSIGNAL_AGENT_KEY="/path/to/agent-key.json"
fortsignal-deepagents --model "openai:gpt-4o"
Risky tool calls are automatically signed — no user interruption.
Passkey mode (human-in-the-loop)
For interactive use where a human must approve each risky tool call with a WebAuthn passkey (Face ID, Touch ID, Windows Hello, hardware security key).
export FORTSIGNAL_USER_ID="my-user-id"
fortsignal-deepagents --model "openai:gpt-4o"
What happens when a risky tool is called:
-
The middleware intercepts the call and creates a challenge with FortSignal
-
Instead of auto-signing, it tells the agent to pause and wait for approval
-
The agent displays a message in the TUI like:
⚠️ FortSignal requires approval for `write_file` on `/etc/passwd`. Sign the challenge with your passkey, then paste the WebAuthn assertion JSON into the prompt. -
Sign the challenge — use a browser-based WebAuthn tool (e.g. visit webauthn.io or a custom dashboard) to authenticate with your registered passkey
-
Paste the result — copy the
AuthenticationResponseJSONand paste it into the agent prompt. The agent re-submits the tool call with_fortsignal_assertionin the args -
The middleware sends the assertion to FortSignal's
/challenge/verify. If"decision": "allow"— the tool executes. If denied, the tool is blocked with an error message
Note: Agent mode (autonomous signing) is simpler for automated workflows. Passkey mode requires the user to be present and responsive at the terminal.
One-shot prompt
fortsignal-deepagents --model "openai:gpt-4o" --message "write hello.py"
Python API
import os
from deepagents import create_deep_agent
from fortsignal_deepagents import FortSignalMiddleware
os.environ["FORTSIGNAL_API_KEY"] = "fs_live_..."
agent = create_deep_agent(
model="openai:gpt-4o",
middleware=[FortSignalMiddleware(
agent_id="my-agent-id",
agent_key_path="/path/to/agent-key.json",
)],
)
Or use the convenience helper:
from fortsignal_deepagents import create_fortsignal_deep_agent
agent = create_fortsignal_deep_agent(
model="openai:gpt-4o",
agent_id="my-agent-id",
agent_key_path="/path/to/agent-key.json",
)
How it works
Agent calls "write_file" → FortSignalMiddleware catches it
→ POST /challenge/start to FortSignal API
→ Ed25519 signs challenge (agent mode)
or returns WebAuthn options (passkey mode)
→ POST /challenge/verify
→ Allow → tool executes
→ Deny → tool blocked with error
Safe (read-only) tools (ls, read_file, glob, grep, fetch_url)
pass through without any FortSignal check.
Configuration
| Environment Variable | Default | Description |
|---|---|---|
FORTSIGNAL_API_KEY |
— | Required. Your FortSignal API key |
FORTSIGNAL_AGENT_ID |
— | Agent ID for autonomous signing mode |
FORTSIGNAL_AGENT_KEY |
— | Path to Ed25519 agent key JSON file |
FORTSIGNAL_USER_ID |
— | User ID for passkey (WebAuthn) mode |
FORTSIGNAL_BASE_URL |
https://api.fortsignal.com |
FortSignal API base URL |
FORTSIGNAL_MODEL |
— | Default model for --model |
Development
git clone https://github.com/fortsignal/fortsignal-deepagents
cd fortsignal-deepagents
uv sync
uv run pytest tests/
Tests
63 tests covering configuration, safe-tool passthrough, risky-tool interception, challenge/verify flow (agent + passkey modes), retry logic, API error handling, and middleware injection.
uv run pytest tests/ -v
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file fortsignal_deepagents-0.1.4.tar.gz.
File metadata
- Download URL: fortsignal_deepagents-0.1.4.tar.gz
- Upload date:
- Size: 19.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.11.11 {"installer":{"name":"uv","version":"0.11.11","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Fedora Linux","version":"43","id":"","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a3ec58cc0385c4aa4d5d128f54c7cc078ad7841e4e64344f0495030212a72d31
|
|
| MD5 |
65cd37d97bd53c5eaa507e9b496b8240
|
|
| BLAKE2b-256 |
43b409301c73831794bbe12e43ec1719cac6970aaab0cf18488d2de7a925283a
|
File details
Details for the file fortsignal_deepagents-0.1.4-py3-none-any.whl.
File metadata
- Download URL: fortsignal_deepagents-0.1.4-py3-none-any.whl
- Upload date:
- Size: 13.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.11.11 {"installer":{"name":"uv","version":"0.11.11","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Fedora Linux","version":"43","id":"","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4bd24684b8493921f97af9a408a04439b2630d98128bc806124060708262e9f1
|
|
| MD5 |
f5985a672753356d17ae4d6ae2d8240c
|
|
| BLAKE2b-256 |
8677fb5fc7603deecdb9e9bffb92c75bddd764705662eba8c0231942c6a39a59
|