Skip to main content

Trust-based agent selection for multi-agent systems

Project description

agent-trust

Verified trust for multi-agent systems. An autonomous trust agent that verifies, scores, and controls other agents using cryptographic guarantees.

Langfuse can tell you an agent failed. Agent Trust can prove it failed and revoke its permissions before it fails again.

pip install agent-trust

Quick Start

from agent_trust import TrustAgent

trust = TrustAgent()  # SQLite, zero infra

# Register agents with verified identity (Ed25519 DIDs)
trust.register("researcher", capabilities=["search"])
trust.register("writer", capabilities=["write"])

# Grant scoped delegation - cryptographic, not advisory
trust.delegate("researcher", scopes=["search", "analyze"])
trust.delegate("writer", scopes=["write", "summarize"])

# Observe outcomes - creates signed provenance
trust.observe("researcher", action="search", result="success", reward=0.9)
trust.observe("writer", action="write", result="failure", reward=-0.5)

# Select best agent - UCB exploration, verified reputation
best = trust.select(["researcher", "writer"])  # -> "researcher"

# Enforce - real authority, not a recommendation
trust.restrict("writer", scopes=["summarize"])  # limit permissions
trust.revoke("writer")                           # revoke all access

CrewAI Integration

from crewai import Agent, Crew, Process
from agent_trust.integrations.crewai import TrustManager

# Create agents
researcher = Agent(role="Researcher", goal="Find information", backstory="Expert researcher")
writer = Agent(role="Writer", goal="Write content", backstory="Expert writer")

# Trust-based manager replaces hardcoded delegation
manager = TrustManager()
manager.register_crew([researcher, writer])

crew = Crew(
    agents=[researcher, writer],
    tasks=[...],
    process=Process.hierarchical,
    manager_agent=manager.as_agent(),
    task_callback=manager.task_callback,  # auto-records outcomes
)

# Before: allowed_agents=["researcher", "writer"]  -> random/first-match
# After:  trust.select(["researcher", "writer"])    -> earned reputation

How It Works

Agents produce actions
       |
Protocol verifies actions (signed provenance, DIDs, delegation)
       |
TrustAgent interprets + enforces (reputation, UCB, restrict/revoke)

Every trust decision rests on cryptographic verification:

  • Identity: Each agent gets an Ed25519 key pair and a did:key identifier
  • Provenance: Every action is signed. Tamper-proof audit trail.
  • Delegation: Scoped permissions that can be restricted or revoked in real time
  • Reputation: Computed from verified outcomes, not self-reported metrics
  • Selection: UCB (Upper Confidence Bound) balances exploiting proven agents with exploring under-tested ones

API Reference

TrustAgent(db_path=None, url=None, private_key=None)

Create a trust orchestrator. It has its own DID and signing keys.

  • TrustAgent() - SQLite at ~/.agent-trust/trust.db
  • TrustAgent(db_path=":memory:") - in-memory (testing)
  • TrustAgent(url="http://...") - hosted backend (shared reputation)
  • TrustAgent(private_key="base64...") - persistent identity across restarts

Methods

Method Description
register(name, capabilities) Register an agent with verified identity
delegate(agent, scopes) Grant scoped delegation (signed)
observe(agent, action, result, reward) Record outcome with signed provenance
select(agents, strategy="ucb") Select best agent from verified reputation
rank(agents, strategy="ucb") Rank agents by reputation (best first)
reputation(agent) Get full reputation report
restrict(agent, scopes) Limit an agent's permissions
revoke(agent) Revoke all delegation

Selection Strategies

  • ucb (default) - Upper Confidence Bound. Balances exploiting known-good agents with exploring under-tested ones. Mathematically principled.
  • greedy - Always picks the highest avg reward. No exploration. Can get stuck.

What Makes This Different

Langfuse AgentOps CrewAI Agent Trust
Agent Identity (DIDs) No No No Yes
Signed Provenance No No No Yes
Scoped Delegation No No Hardcoded Cryptographic
Reputation Scoring No No No Yes
RL / Adaptive Routing No No No UCB
Enforcement (restrict/revoke) No No No Yes

Hosted Backend

Local SQLite is great for development. For shared reputation across teams and systems:

trust = TrustAgent(url="http://your-agent-trust-api:4100")

Same API, shared persistence. An agent's reputation follows it across systems.

pip install agent-trust[hosted]  # adds httpx

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

kanoniv_trust-0.1.0.tar.gz (20.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

kanoniv_trust-0.1.0-py3-none-any.whl (19.0 kB view details)

Uploaded Python 3

File details

Details for the file kanoniv_trust-0.1.0.tar.gz.

File metadata

  • Download URL: kanoniv_trust-0.1.0.tar.gz
  • Upload date:
  • Size: 20.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for kanoniv_trust-0.1.0.tar.gz
Algorithm Hash digest
SHA256 ff459594e751327db07dad1e812af2db743c02b17fa0a8046a129b36cd5ae681
MD5 55ee97e6f5c945497db9fd21563b3aa1
BLAKE2b-256 181393cfa2eb547d9e21e53012405b946ab9364222d9b36a712ea332ff9ac165

See more details on using hashes here.

Provenance

The following attestation bundles were made for kanoniv_trust-0.1.0.tar.gz:

Publisher: release-sdk.yml on kanoniv/agent-trust

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file kanoniv_trust-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: kanoniv_trust-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 19.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for kanoniv_trust-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 55d8b91d771aa68c566614000ed140cc63cc8a65269333c056b310586301e20c
MD5 da3954d76f618ef693cf17516cdb1e76
BLAKE2b-256 19e3f07da0fdc2dbc86589d02640790eb9d9ef3834927c586c1148490409272c

See more details on using hashes here.

Provenance

The following attestation bundles were made for kanoniv_trust-0.1.0-py3-none-any.whl:

Publisher: release-sdk.yml on kanoniv/agent-trust

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page