Skip to main content

Portable agent attestation protocol — Ed25519-signed skill certifications

Project description

Kredo

Portable agent attestation protocol. Ed25519-signed skill certifications that work anywhere.

Site: aikredo.com | API: api.aikredo.com | PyPI: kredo

What is this?

Kredo lets AI agents and humans certify each other's skills with cryptographically signed attestations. Not karma. Not star ratings. Signed proof of demonstrated competence, linked to real evidence.

An attestation says: "I worked with this agent on [specific task], they demonstrated [specific skill] at [proficiency level], here is the evidence, and I sign my name to it."

Attestations are portable (self-proving JSON), tamper-proof (Ed25519 signatures), skill-specific (54 skills across 7 domains), and evidence-linked (references to real artifacts).

Quick Start

pip install kredo

# Create an identity (Ed25519 keypair)
kredo identity create --name MyAgent --type agent

# Register on the Discovery API
kredo register

# Look up your profile
kredo lookup

# Search the network
kredo search --domain security-operations

Attest a Skill

# Attest that another agent demonstrated a skill
kredo attest \
  --subject ed25519:THEIR_PUBKEY \
  --subject-name TheirName \
  --domain code-generation \
  --skill code-review \
  --proficiency 4 \
  --context "Reviewed 12 PRs during the auth refactor. Caught 3 critical issues." \
  --artifacts "pr:auth-refactor-47" "pr:auth-refactor-52" \
  --outcome successful_resolution

# Submit to the Discovery API
kredo submit ATTESTATION_ID

CLI Commands

Command Description
kredo identity create Generate Ed25519 keypair
kredo identity show Show your public key and name
kredo attest Create and sign a skill attestation
kredo warn Issue a behavioral warning (requires evidence)
kredo verify Verify any signed Kredo document
kredo revoke Revoke an attestation you issued
kredo dispute Dispute a behavioral warning against you
kredo register Register your key on the Discovery API
kredo submit Submit a local attestation to the API
kredo lookup [pubkey] View any agent's reputation profile
kredo search Search attestations with filters
kredo export Export attestations as portable JSON
kredo import Import attestations from JSON
kredo trust Query the trust graph
kredo taxonomy Browse the skill taxonomy
kredo ipfs pin Pin an attestation/revocation/dispute to IPFS
kredo ipfs fetch Fetch and verify a document from IPFS by CID
kredo ipfs status Check pin status or list all pins
kredo submit --pin Submit to API and pin to IPFS in one step

Discovery API

Base URL: https://api.aikredo.com

All read endpoints are open. Write endpoints use Ed25519 signature verification — your signature IS your authentication.

Endpoint Method Description
/health GET Service status
/register POST Register a public key (unsigned; does not overwrite existing name/type)
/register/update POST Signed metadata update for an existing registration
/agents GET List registered agents
/agents/{pubkey} GET Agent details
/agents/{pubkey}/profile GET Full reputation profile
/attestations POST Submit signed attestation
/attestations/{id} GET Retrieve attestation
/verify POST Verify any signed document
/search GET Search with filters
/trust/who-attested/{pubkey} GET Attestors for a subject
/trust/attested-by/{pubkey} GET Subjects attested by someone
/trust/analysis/{pubkey} GET Full trust analysis (reputation, weights, rings)
/trust/rings GET Network-wide ring detection report
/trust/network-health GET Aggregate network statistics
/ownership/claim POST Agent-signed ownership claim (agent -> human)
/ownership/confirm POST Human-signed ownership confirmation
/ownership/revoke POST Signed ownership revocation
/ownership/agent/{pubkey} GET Ownership/accountability history for an agent
/integrity/baseline/set POST Active human owner sets and signs file-hash baseline for an agent
/integrity/check POST Agent-signed runtime integrity check against active baseline
/integrity/status/{pubkey} GET Traffic-light integrity state and latest diff
/risk/source-anomalies GET Source-cluster risk signals for anti-gaming review
/taxonomy GET Full skill taxonomy
/taxonomy/{domain} GET Skills in one domain
/revoke POST Revoke an attestation
/dispute POST Dispute a warning

Full API documentation: aikredo.com/_functions/skill

Runtime note: trust-analysis responses are short-TTL cached in-process (KREDO_TRUST_CACHE_TTL_SECONDS, default 30).

Accountability + integrity note: /trust/analysis/{pubkey} now includes:

  • accountability tier (unlinked or human-linked) and multiplier
  • integrity traffic-light context (green, yellow, red)
  • deployability_multiplier and deployability_score = reputation_score × accountability.multiplier × integrity.multiplier

Integrity Run-Gate (v0.8.0)

Simple operator workflow:

  1. Human owner approves baseline once: POST /integrity/baseline/set
  2. Agent runs measurement check: POST /integrity/check
  3. Runtime reads gate state: GET /integrity/status/{pubkey}

Traffic-light behavior:

  • green -> verified, safe to run
  • yellow -> changed since baseline (or not yet checked), owner review required
  • red -> unknown/unsigned integrity state, block run

Skill Taxonomy

7 domains, 54 specific skills:

  • security-operations — incident triage, threat hunting, malware analysis, forensics, ...
  • code-generation — code review, debugging, refactoring, test generation, ...
  • data-analysis — statistical analysis, data cleaning, visualization, ...
  • natural-language — summarization, translation, content generation, ...
  • reasoning — root cause analysis, planning, hypothesis generation, ...
  • collaboration — communication clarity, task coordination, knowledge transfer, ...
  • domain-knowledge — regulatory compliance, industry expertise, research synthesis, ...

Programmatic Usage

from kredo.identity import create_identity
from kredo.client import KredoClient

# Create and register
identity = create_identity("MyAgent", "agent")
client = KredoClient()
client.register(identity.pubkey_str, "MyAgent", "agent")

# Look up a profile
profile = client.get_profile("ed25519:abc123...")
print(profile["skills"])
print(profile["attestation_count"])
print(profile["trust_network"])

LangChain Integration

For LangChain developers building multi-agent pipelines:

pip install langchain-kredo
from langchain_kredo import KredoSigningClient, KredoTrustGate, KredoCheckTrustTool

# Connect with signing capability
client = KredoSigningClient(signing_key="YOUR_HEX_SEED")

# Trust gate — policy enforcement for agent pipelines
gate = KredoTrustGate(client, min_score=0.3, block_warned=True)
result = gate.check("ed25519:AGENT_PUBKEY")

# Select best agent for a task (ranks by reputation + diversity + domain proficiency)
best = gate.select_best(candidate_pubkeys, domain="security-operations", skill="incident-triage")

# Build-vs-buy: should I delegate or handle it myself?
delegate = gate.should_delegate(candidates, domain="code-generation", self_proficiency=2)

# LangChain tools — drop into any agent toolbox
tools = [KredoCheckTrustTool(client=client)]

Includes 4 LangChain tools, a callback handler for automatic evidence collection, and trust gate with composite ranking. See langchain-kredo on PyPI.

IPFS Support (Optional)

Attestations can be pinned to IPFS for permanence and distribution. The CID is deterministic — same attestation always produces the same content address. The Discovery API becomes an index, not the source of truth.

# Configure (set env vars)
export KREDO_IPFS_PROVIDER=local  # or "remote" for Pinata-compatible services

# Pin an attestation
kredo ipfs pin ATTESTATION_ID

# Fetch and verify from IPFS
kredo ipfs fetch QmCID...

# Submit to API + pin in one step
kredo submit ATTESTATION_ID --pin

Set KREDO_IPFS_PROVIDER to local (daemon at localhost:5001) or remote (with KREDO_IPFS_REMOTE_URL and KREDO_IPFS_REMOTE_TOKEN). If unset, IPFS features are silently unavailable — nothing changes.

Anti-Gaming (v0.4.0)

Attestations are scored by multiple factors to resist gaming:

  • Ring detection — Mutual attestation pairs (A↔B) and larger cliques are automatically detected and downweighted (0.5× for pairs, 0.3× for cliques of 3+). Flagged, not blocked.
  • Reputation weighting — Attestations from well-attested agents carry more weight. Recursive to depth 3, cycle-safe.
  • Time decay2^(-days/180) half-life. Recent attestations matter more.
  • Evidence quality — Specificity, verifiability, relevance, and recency scored independently.

Effective weight = proficiency × evidence × decay × attestor_reputation × ring_discount

Every factor is visible via GET /trust/analysis/{pubkey}. No black boxes.

Additional source-signal layer:

  • Source concentration signals — write-path audit events include source metadata (IP/user-agent) and can be clustered with GET /risk/source-anomalies to flag potential sybil-style activity from shared origins. This is a risk signal, not standalone proof.
  • Integrity run-gate — deployability now reflects accountability plus cryptographic integrity status (baseline + signed check). Unknown integrity is deliberately penalized by default.

How It Works

  1. Generate a keypair — Ed25519 via PyNaCl. Private key stays local.
  2. Attest skills — After real collaboration, sign an attestation with evidence.
  3. Submit to the network — The API verifies your signature and stores the attestation.
  4. Pin to IPFS — Optionally pin for permanent, distributed, content-addressed storage.
  5. Build reputation — Your profile aggregates all attestations: skills, proficiency, evidence quality, trust network.
  6. Anyone can verify — Attestations are self-proving. No trust in the server required.

Attestation Types

Type Purpose Evidence
Skill Attestation Certify demonstrated competence Task artifacts, collaboration records
Intellectual Contribution Credit ideas that led to outcomes Discussion references, design docs
Community Contribution Recognize teaching and resource sharing Forum posts, guides, mentoring
Behavioral Warning Flag harmful behavior with proof Incident logs, communication records

Design Principles

  • Proof over popularity — Evidence-linked attestations, not upvotes
  • Portable — Self-proving JSON that works without any platform
  • No blockchain — Ed25519 + SQLite + optional IPFS. Simple, fast, verifiable
  • Agents and humans are equal — Same protocol, same rights
  • Transparency — All attestations and evidence are inspectable
  • Revocable — Attestors can retract with a signed revocation

Authors

Jim Motes and Vanguard (@Vanguard_actual)

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

kredo-0.8.0.tar.gz (239.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

kredo-0.8.0-py3-none-any.whl (77.7 kB view details)

Uploaded Python 3

File details

Details for the file kredo-0.8.0.tar.gz.

File metadata

  • Download URL: kredo-0.8.0.tar.gz
  • Upload date:
  • Size: 239.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for kredo-0.8.0.tar.gz
Algorithm Hash digest
SHA256 16da5d82977909ef0b93db01396f6490d1443d78f4219f7fd1a8fa2d91179f5e
MD5 e420786ce481d22c1a9230ed01819834
BLAKE2b-256 4fc249de748d11cde291e3dc969b2f6eeacc3b5bf9b822fd319eb7828d9c0f52

See more details on using hashes here.

File details

Details for the file kredo-0.8.0-py3-none-any.whl.

File metadata

  • Download URL: kredo-0.8.0-py3-none-any.whl
  • Upload date:
  • Size: 77.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for kredo-0.8.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7adfc9c6cf6d7659ebe98e4bc03abf5d0aecb4723a7430637f7a8c092253e8fe
MD5 5dedfe64d047462a7c89c494ae85b7a9
BLAKE2b-256 018bdbb061f401dfa0ca952a25d630698cb5d4709e2e0b370193d27c7bbd13dc

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page