Key Management

Generate and manage cryptographic keys for agent identity.

Commands


keygen

Generate a new Ed25519 keypair for signing your agent.

bash
sekuire keygen [OPTIONS]

Options

OptionDescription
--forceOverwrite existing keys

Example

Terminalbash
$ sekuire keygen 🔑 Generating Ed25519 Keypair... ✅ Keys generated! Private: .sekuire/secret.key (KEEP SAFE) Public: .sekuire/public.key Public Key Hash: a1b2c3d4e5f6...

Generated Files

FileDescription
.sekuire/secret.keyPrivate key (hex-encoded) — Never share or commit
.sekuire/public.keyPublic key (hex-encoded) — Safe to share
Add .sekuire/secret.key to your .gitignore. Losing your private key means losing your agent identity.

hash

Calculate the deterministic Sekuire ID (fingerprint) for your agent.

bash
sekuire hash

The Sekuire ID is computed from your sekuire.yml manifest and uniquely identifies your agent.

Example

Terminalbash
$ sekuire hash 🥝 Sekuire ID (Fingerprint): 7f8a9b3c2d1e...

What's Hashed

The ID is derived from:

  • Project name and version
  • Identity configuration (model, provider)
  • Capabilities and tools
  • Public key

Any change to these values produces a different ID.


Key Security

Best Practices

  1. Never commit .sekuire/secret.key
  2. Backup your private key securely
  3. Rotate keys if compromised using sekuire keygen --force
  4. Use different keys for dev/staging/production

Recovery

If you lose your private key:

  • Generate a new keypair with sekuire keygen --force
  • Re-publish your agent with sekuire push
  • Your agent will have a new identity