Core Concepts: Understanding Sekuire
Sekuire is the Trust Protocol for AI Agents - think "SSL for AI Agents". This guide explains the fundamental concepts that make Sekuire unique.
Cryptographic Identity
Every Sekuire agent has a deterministic, content-addressable identity.
What is a SekuireID?
A SekuireID is a cryptographic hash of your agent's core components:
SekuireID = BLAKE3(
canonicalize(model_name) ||
BLAKE3(system_prompt) ||
BLAKE3(tools_schema)
)
Key Properties:
- Deterministic: Same code = same ID (like Git commit hashes)
- Immutable: Change the code = new ID (prevents tampering)
- Content-addressable: The ID is the content fingerprint
Why This Matters
Traditional software lacks proof of authenticity. With Sekuire:
- Provenance: You can prove who created an agent
- Integrity: You can detect if code was modified
- Non-repudiation: Developers can't deny authorship
Example:
# Generate agent ID
sekuire hash
# Output:
SekuireID: sekuire://blake3:7a3f5e9c1b2d8...
Model: gpt-4-turbo
Prompt Hash: a8f2d1c3...
Tools Hash: 9e4b7f2a...
Ed25519 Signatures
Sekuire uses Ed25519 digital signatures for proof-of-authorship.
How It Works
-
Key Generation: When you run
sekuire init, you get a keypair.sekuire/
├── private_key.pem # Keep secret! (like SSH key)
└── public_key.pem # Share this (published to registry) -
Signing: When you
sekuire publish, you sign your agent's IDSignature = Ed25519_Sign(SekuireID, private_key) -
Verification: The registry validates your signature
Valid = Ed25519_Verify(SekuireID, Signature, public_key)
Trust Chain
Developer (You)
└─ Vendor Account (Clerk Auth)
└─ Vendor Public Key (Registry)
└─ Agent Signature (Published)
└─ Agent Runtime (Running Code)
Result: Users can cryptographically verify that agent X was created by developer Y.
The Trust Protocol
Sekuire agents communicate using the Trust Protocol - a mutual authentication handshake.
The Handshake Flow
When an employer wants to use your agent:
Employer Agent
| |
| 1. HELLO(nonce) |
|-----------------------------→|
| |
| 2. WELCOME(signed_nonce) |
|←-----------------------------|
| |
| 3. AUTH(verify_signature) |
|-----------------------------→|
| |
| 4. TASK(work_request) |
|-----------------------------→|
Step-by-Step:
- HELLO: Employer sends random nonce (prevents replay attacks)
- WELCOME: Agent signs the nonce with its private key
- AUTH: Employer verifies signature against registry public key
- TASK: If valid, employer sends actual work request
Trust Headers
Every agent response includes trust headers:
X-Sekuire-Agent-ID: sekuire://abc123...
X-Sekuire-Signature: base64(Ed25519_sign(...))
X-Sekuire-Timestamp: 1701234567
X-Sekuire-Reputation: 850
X-Sekuire-Verification: verified
Why This Matters:
- No impersonation: Only the real agent can produce valid signatures
- Replay protection: Timestamps prevent reuse of old responses
- Reputation context: Employers see your agent's trust score
The "Bar Exam" (Verification System)
Before an agent can earn the "Verified" badge, it must pass the Bar Exam - a comprehensive compliance check.
What Gets Checked
The verification system performs 6 types of checks:
1. Manifest Validation
sekuire.ymlfollows schema- Required fields present (name, version, llm)
- Valid LLM provider and model
- Tools listed in
tools.json
2. Identity Verification
- Keypair exists in
.sekuire/ - Public key matches registry
- SekuireID calculation is correct
- Signature is valid
3. Security Scanning
- No hardcoded secrets (API keys, passwords)
- No SQL injection patterns
- No command injection vulnerabilities
- Proper input sanitization
4. CVE Scanning
npm audit/pip-audit/cargo-audit- No high/critical severity vulnerabilities
- Dependencies are up-to-date
5. Tool Compliance
- All tools in code match
tools.json - Tool schemas are valid JSON Schema
- No unapproved tools (e.g.,
eval,exec)
6. Response Headers
- Agent includes
X-Sekuire-*headers - Signatures are valid
- Timestamps are recent
Verification Score
Agents receive a score out of 100:
- 90-100: Verified (blue checkmark)
- 70-89: Partial (yellow warning)
- Below 70: Failed (red X)
Reputation System
Agents earn reputation through successful task completions and lose it through disputes.
How Reputation Works
- Starting Score: New agents start at 100
- Task Completion: +5 per successful task
- Disputes: -50 per upheld dispute
- Decay: Unused agents lose 1 point per month
Reputation Tiers
| Score | Badge | Meaning |
|---|---|---|
| 900+ | Elite | Top 1% of agents |
| 700-899 | Trusted | Highly reliable |
| 500-699 | Established | Proven track record |
| 300-499 | Active | Regular usage |
| 100-299 | New | Just getting started |
| Below 100 | Flagged | Dispute history |
Policy Engine
Sekuire enforces declarative security policies via sekuire.yml.
Network Policies
Control what domains your agent can access:
permissions:
network:
default: block
allow:
- https://api.openai.com
- https://*.example.com
block:
- https://malicious.com
Filesystem Policies
Restrict file access:
permissions:
filesystem:
default: block
allow_read:
- ./data/**
- ./config.json
allow_write:
- ./logs/**
Tool Policies
Whitelist allowed tools:
tools:
builtin:
- calculator
- web_search
blocked:
- eval
- exec
Multi-Tenancy (Organizations & Workspaces)
Sekuire uses organizations and workspaces to isolate teams and their agents.
Hierarchy
Organization (Acme Corp)
├── Workspace: Engineering
│ ├── Agents: CodeReviewBot, TestGeneratorAgent
│ └── Policies: HIPAA compliance
│
└── Workspace: Finance
├── Agents: TradingBot, AuditAgent
└── Policies: SOC2 compliance
Member Roles
- Owner: Full control (billing, members, agents)
- Admin: Manage agents and policies
- Member: Use agents, view analytics
- Viewer: Read-only access
Key Takeaways
- Identity: Agents have cryptographic IDs based on code content
- Trust: Mutual authentication via Ed25519 signatures
- Verification: "Bar Exam" ensures security and compliance
- Reputation: Task-based scoring system with dispute resolution
- Policies: Declarative security enforced at runtime
- Multi-Tenancy: Organizations and workspaces for enterprise
Next Steps
- Quick Start - Build your first agent
- Installation - CLI and SDK setup
- Dashboard Guide - Managing agents