Skip to main content

Inter-Agent Trust Protocol (IATP) - The Envoy for AI Agents. A sidecar architecture with typed IPC pipes for preventing cascading hallucinations in autonomous agent networks.

Project description

Inter-Agent Trust Protocol (IATP)

PyPI version License: MIT Build Status

Sidecar-based trust protocol for agent-to-agent communication. Part of the Agent OS ecosystem.


Why IATP?

Multi-agent systems fail because agents are forced to embed trust logic, security validation, and audit trails directly into their code. This creates tight coupling, makes agents fragile, and prevents interoperability.

We built IATP because hard-coding trust into every agent is the wrong abstraction. By extracting trust, policy enforcement, and governance into a sidecar proxy—similar to how Envoy extracts networking concerns from microservices—we subtract complexity from agents while adding scalability to the system.

Scale by Subtraction: Remove trust logic from agents. Remove policy checks from agents. Remove audit logging from agents. Put it all in the sidecar. Agents become simple functions. The infrastructure handles reliability.


🔒 Removing Implicit Trust

IATP eliminates implicit trust through two key features:

1. Agent Attestation (Verifiable Credentials)

The Problem: How do we know an agent running on a different server is running the verified code and not a hacked version?

The Fix: Attestation Handshake. Agents exchange a hash of their codebase/configuration signed by the Control Plane before talking.

  • Cryptographic proof that agents run verified code
  • Signed by trusted Control Plane
  • Prevents running modified/hacked agent versions
  • No need for complex firewalls—security is in the protocol

2. Reputation Slashing

The Problem: Agents that hallucinate or misbehave continue to be trusted by the network.

The Fix: If cmvk (Context Memory Verification Kit) catches an agent hallucinating, IATP automatically lowers that agent's trust score across the network. Other agents stop listening to it.

  • Network-wide reputation tracking
  • Automatic slashing when misbehavior detected
  • cmvk integration for hallucination detection
  • Conservative reputation propagation across nodes

Installation

pip install inter-agent-trust-protocol

Quick Start

from iatp import create_sidecar, CapabilityManifest, AgentCapabilities, PrivacyContract, RetentionPolicy

manifest = CapabilityManifest(agent_id="my-agent", capabilities=AgentCapabilities(), privacy_contract=PrivacyContract(retention=RetentionPolicy.EPHEMERAL))
sidecar = create_sidecar(agent_url="http://localhost:8000", manifest=manifest, port=8001)
sidecar.run()

Your agent is now protected by IATP. Requests are validated, policies enforced, and all actions logged.

Using Attestation and Reputation

from iatp import create_sidecar, CapabilityManifest, AgentCapabilities, PrivacyContract, RetentionPolicy
from iatp.attestation import AttestationValidator, ReputationManager

# Create attestation for your agent (done by Control Plane)
validator = AttestationValidator()
validator.add_trusted_key("control-plane-key", "-----BEGIN PUBLIC KEY-----...")

attestation = validator.create_attestation(
    agent_id="my-agent",
    codebase_hash="sha256_of_codebase",
    config_hash="sha256_of_config",
    signing_key_id="control-plane-key",
    expires_in_hours=24
)

# Create sidecar with attestation
manifest = CapabilityManifest(...)
sidecar = create_sidecar(
    agent_url="http://localhost:8000",
    manifest=manifest,
    port=8001,
    attestation=attestation  # Proves you're running verified code
)

# Track reputation
reputation = ReputationManager()

# Record hallucination (called by cmvk)
reputation.record_hallucination(
    agent_id="misbehaving-agent",
    severity="high",
    details={"reason": "fabricated data"}
)

# Get reputation score
score = reputation.get_score("misbehaving-agent")
print(f"Trust score: {score.score}/10")
print(f"Trust level: {score.get_trust_level()}")

Run the demo:

python examples/demo_attestation_reputation.py

Architecture

IATP sits in Layer 2 (Infrastructure) of the Agent OS. It acts as a sidecar proxy that intercepts agent-to-agent communication and enforces trust policies before forwarding requests.

Layer 3: Framework       [agent-control-plane, scak]
Layer 2: Infrastructure  [iatp, amb, atr]        ← IATP lives here
Layer 1: Primitives      [caas, cmvk, emk]

IATP receives requests from other agents or clients, validates the requester's capabilities against the target agent's requirements, enforces privacy and security policies, logs all transactions for auditability, and forwards approved requests to the backend agent.

The protocol defines a standard .well-known/agent-manifest endpoint that publishes trust levels, reversibility guarantees, privacy contracts, and SLA commitments. Trust scores are calculated automatically based on these attributes, and policies can block, warn, or allow operations accordingly.


The Ecosystem Map

IATP is part of a modular Agent OS built on the "Scale by Subtraction" philosophy:

Layer Component Purpose
Primitives caas Context as a Service – Shared context management
cmvk Context Memory Verification Kit – Verify context integrity
emk Episodic Memory Kit – Long-term memory storage
Infrastructure iatp Inter-Agent Trust Protocol – Trust and security sidecar
amb Agent Message Bus – Reliable message transport
atr Agent Tool Registry – Discover and invoke agent tools
Framework agent-control-plane Agent Control Plane – Orchestration and lifecycle management
scak Self-Correction Autonomy Kit – Automated error recovery

Explore the ecosystem:


Citation

If you use IATP in your research or production systems, please cite:

@software{iatp2024,
  author = {Siddique, Imran},
  title = {Inter-Agent Trust Protocol: Sidecar-Based Trust for Multi-Agent Systems},
  year = {2024},
  publisher = {GitHub},
  journal = {GitHub repository},
  howpublished = {\url{https://github.com/imran-siddique/inter-agent-trust-protocol}},
  version = {0.3.1}
}

License

MIT License. See LICENSE for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

inter_agent_trust_protocol-0.5.0.tar.gz (53.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

inter_agent_trust_protocol-0.5.0-py3-none-any.whl (45.0 kB view details)

Uploaded Python 3

File details

Details for the file inter_agent_trust_protocol-0.5.0.tar.gz.

File metadata

File hashes

Hashes for inter_agent_trust_protocol-0.5.0.tar.gz
Algorithm Hash digest
SHA256 bf1d80f0e770b328f396b73d9c14b464dcc63db8d217e87b9eccdd147feee042
MD5 06300a1bec0720e207ae1ee7927efb08
BLAKE2b-256 8f62adac18a3616d82de499f93210e66179e1d0fced7bbddb422b11a82764611

See more details on using hashes here.

File details

Details for the file inter_agent_trust_protocol-0.5.0-py3-none-any.whl.

File metadata

File hashes

Hashes for inter_agent_trust_protocol-0.5.0-py3-none-any.whl
Algorithm Hash digest
SHA256 3cb42c5a2e82204d3f76ba2d07ddffb74cd6cdda2cf61b7180cc587b1ad65111
MD5 dcac8f6883225bae887ebe2db7c66f5c
BLAKE2b-256 359d829085099210ebfe112cead0f5f229c3a2173e44e69cc2389dd2f6e3041c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page