Skip to main content

Trust-based agent selection for multi-agent systems

Project description

agent-trust

Add one agent that controls every other agent. An autonomous agent that verifies, scores, and enforces what other agents are allowed to do - using cryptographic proof.

Langfuse can tell you an agent failed. Agent Trust can prove it failed and revoke its permissions before it fails again.

pip install kanoniv-trust

Quick Start

from agent_trust import TrustAgent

trust = TrustAgent()  # SQLite, zero infra

# Register agents with verified identity (Ed25519 DIDs)
trust.register("researcher", capabilities=["search"])
trust.register("writer", capabilities=["write"])

# Grant scoped delegation - cryptographic, not advisory
trust.delegate("researcher", scopes=["search", "analyze"])
trust.delegate("writer", scopes=["write", "summarize"])

# Observe outcomes - creates signed provenance
trust.observe("researcher", action="search", result="success", reward=0.9)
trust.observe("writer", action="write", result="failure", reward=-0.5)

# Select best agent - UCB exploration, verified reputation
best = trust.select(["researcher", "writer"])  # -> "researcher"

# Enforce - real authority, not a recommendation
trust.restrict("writer", scopes=["summarize"])  # limit permissions
trust.revoke("writer")                           # revoke all access

# Reputation from verified, signed outcomes - not self-reported metrics
trust.reputation("writer")
# -> ReputationReport(score=18, success_rate=0.0, trend="declining", current_scopes=[])

CrewAI Integration

from crewai import Agent, Crew, Process
from agent_trust.integrations.crewai import TrustManager

# Create agents
researcher = Agent(role="Researcher", goal="Find information", backstory="Expert researcher")
writer = Agent(role="Writer", goal="Write content", backstory="Expert writer")

# Trust-based manager replaces hardcoded delegation
manager = TrustManager()
manager.register_crew([researcher, writer])

crew = Crew(
    agents=[researcher, writer],
    tasks=[...],
    process=Process.hierarchical,
    manager_agent=manager.as_agent(),
    task_callback=manager.task_callback,  # auto-records outcomes
)

# Before: allowed_agents=["researcher", "writer"]  -> random/first-match
# After:  trust.select(["researcher", "writer"])    -> earned reputation

How It Works

Agents produce actions
       |
Protocol verifies actions (signed provenance, DIDs, delegation)
       |
TrustAgent interprets + enforces (reputation, UCB, restrict/revoke)

Every trust decision rests on cryptographic verification:

  • Identity: Each agent gets an Ed25519 key pair and a did:key identifier
  • Provenance: Every action is signed. Tamper-proof audit trail.
  • Delegation: Scoped permissions that can be restricted or revoked in real time
  • Reputation: Computed from verified, signed outcomes - not self-reported metrics or LLM judgment
  • Selection: UCB (Upper Confidence Bound) balances exploiting proven agents with exploring under-tested ones

API Reference

TrustAgent(db_path=None, url=None, private_key=None)

Create a trust orchestrator. It has its own DID and signing keys.

  • TrustAgent() - SQLite at ~/.agent-trust/trust.db
  • TrustAgent(db_path=":memory:") - in-memory (testing)
  • TrustAgent(url="http://...") - hosted backend (shared reputation)
  • TrustAgent(private_key="base64...") - persistent identity across restarts

Methods

Method Description
register(name, capabilities) Register an agent with verified identity
delegate(agent, scopes) Grant scoped delegation (signed)
observe(agent, action, result, reward) Record outcome with signed provenance
select(agents, strategy="ucb") Select best agent from verified reputation
rank(agents, strategy="ucb") Rank agents by reputation (best first)
reputation(agent) Get full reputation report
restrict(agent, scopes) Limit an agent's permissions
revoke(agent) Revoke all delegation

Selection Strategies

  • ucb (default) - Upper Confidence Bound. Balances exploiting known-good agents with exploring under-tested ones. Mathematically principled.
  • greedy - Always picks the highest avg reward. No exploration. Can get stuck.

What Makes This Different

Langfuse AgentOps CrewAI Agent Trust
Agent Identity (DIDs) No No No Yes
Signed Provenance No No No Yes
Scoped Delegation No No Hardcoded Cryptographic
Reputation Scoring No No No Yes
RL / Adaptive Routing No No No UCB
Enforcement (restrict/revoke) No No No Yes

Hosted Backend

Local SQLite is great for development. For shared reputation across teams and systems:

trust = TrustAgent(url="http://your-agent-trust-api:4100")

Same API, shared persistence. An agent's reputation follows it across systems.

pip install kanoniv-trust[hosted]  # adds httpx

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

kanoniv_trust-0.1.6.tar.gz (26.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

kanoniv_trust-0.1.6-py3-none-any.whl (24.9 kB view details)

Uploaded Python 3

File details

Details for the file kanoniv_trust-0.1.6.tar.gz.

File metadata

  • Download URL: kanoniv_trust-0.1.6.tar.gz
  • Upload date:
  • Size: 26.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for kanoniv_trust-0.1.6.tar.gz
Algorithm Hash digest
SHA256 dcebfad21f367115a5476b88d8b450e3bede040055793d77b4b5c4ab634b02cb
MD5 4acad8d5873a9f304f3a03b7ebd40734
BLAKE2b-256 e6349979bd7da2c9798e114f63d162edb0b3ada19dac20ed613ad95319c60615

See more details on using hashes here.

Provenance

The following attestation bundles were made for kanoniv_trust-0.1.6.tar.gz:

Publisher: release-sdk.yml on kanoniv/agent-trust

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file kanoniv_trust-0.1.6-py3-none-any.whl.

File metadata

  • Download URL: kanoniv_trust-0.1.6-py3-none-any.whl
  • Upload date:
  • Size: 24.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for kanoniv_trust-0.1.6-py3-none-any.whl
Algorithm Hash digest
SHA256 ead85d069ad99d948f37b3481bd45255edef6596b0e5a525017f417772b7bb70
MD5 d69083179083c0b38ad9b25c951c99ea
BLAKE2b-256 64dba69cbf6ad944f46c31d9220d7d832921876119312ae55ed4b7269fb3f077

See more details on using hashes here.

Provenance

The following attestation bundles were made for kanoniv_trust-0.1.6-py3-none-any.whl:

Publisher: release-sdk.yml on kanoniv/agent-trust

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page