Protocol Overview: Agentic Identity & Responsibility

This overview consolidates the current repository into one compare-ready narrative. It is designed to answer: what the protocol claims, how it works, where responsibility is enforced, and what exists today in this repo.

Table of Contents

  1. Executive Snapshot
  2. Core Architecture (Identity → Delegation → Audit)
  3. Governance and Judiciary Model
  4. Terms, Liability, and Slashing
  5. Forensic Accountability and Backtracking
  6. Developer Integration Path
  7. Launch Readiness and Roadmap State
  8. Implementation Surface in This Repo
  9. Comparison View: Current State vs Intended Protocol
  10. Open Questions and Suggested Next Moves

1. Executive Snapshot

The current protocol vision is a hardware-anchored trust stack for autonomous agents:

In practical terms, this repo currently reads as a design and operating doctrine with selective proof-of-concept code snippets, not yet a full runnable platform.

2. Core Architecture (Identity → Delegation → Audit)

2.1 Identity Layer

The system roots trust in TPM-derived keys and measured boot/PCR state:

2.2 Delegation Layer

Delegation is framed as MCP with hardened wrapper semantics:

2.3 Audit Layer

Audit combines cryptographic verification and semantic review:

3. Governance and Judiciary Model

The governance model introduces a dedicated Judge layer with explicit anti-collusion controls:

This is notable because governance is treated as a first-class protocol subsystem, not an afterthought.

4. Terms, Liability, and Slashing

The ToS material defines accountability aggressively:

This creates a tight coupling between technical controls and legal/commercial responsibility.

5. Forensic Accountability and Backtracking

A major strength of this doc set is recursive forensic logic:

The protocol therefore targets both “was this authentic?” and “was this sensible?”.

6. Developer Integration Path

The developer guide prescribes a fairly clean adoption flow:

  1. Prepare TPM/TEE-capable environment.
  2. Wrap existing MCP tools with trusted middleware.
  3. Register attestation material with the identity registry.
  4. Receive reputation updates via periodic platform root sync.
  5. Accept that revocation and kill-switch rules are enforceable.

The onboarding narrative is coherent, though implementation details are still mostly reference-level.

7. Launch Readiness and Roadmap State

The 30-day roadmap has clear sequencing:

As of current repo content, this remains a planning-state roadmap rather than a completed milestone report.

8. Implementation Surface in This Repo

What exists now

What does not yet exist (in this repo)

9. Comparison View: Current State vs Intended Protocol

Area Intended Protocol Current Repo State Comparison Note
Identity Attestation TPM-backed registration and quote verification Described in docs + command examples Strong design, limited executable implementation
Secure Delegation Shield-MCP wrappers with signed metadata POC snippets and workflow docs Architecture is clear, not productized
Deterministic verification Re-run exact context with reproducible state Detailed concept in forensic docs Missing concrete replay runtime
Judiciary Operations Blind-assigned judges + anti-collusion checks Governance rules and pseudologic Governance is robust on paper
Reputation Engine Dual score with periodic Merkle root publication Formula and process documented Needs running scoring pipeline
Revocation/Slashing Immediate and permanent penalties as needed Policy and ToS coverage complete Enforcement stack not implemented here
Developer Experience SDK, registration flow, daily proof updates Guide and roadmap present Good narrative, minimal code artifacts

10. Open Questions and Suggested Next Moves

Open questions

Suggested next moves

  1. Freeze a canonical protocol schema (initialize, tools/call, evidence packet, verdict packet).
  2. Build a minimal runnable reference stack (registry + signer + verifier + replay worker).
  3. Add conformance tests for intent-action binding and replay determinism.
  4. Publish a versioned compatibility matrix for clients and agents.