Core Concepts
Understand the key concepts behind the Sekuire platform and our security framework.
The Trust Triangle
Sekuire provides three pillars of trust for AI agents - Identity, Visibility, and Control. Together they form the Trust Triangle that enables enterprise governance.
- Identity (Sekuire ID) - Cryptographic proof of who the agent is
- Visibility (Beacon) - Real-time knowledge of where agents are and what they're doing
- Control (Kill Switch) - Ability to stop any agent instantly
Agent Identity
Every Sekuire agent has a unique, verifiable identity:
Ed25519 Keypair
When you run sekuire init, an Ed25519 keypair is generated:
.sekuire/
├── public.key # Share freely - used for verification
└── secret.key # NEVER SHARE - used for signingSekuire ID
The Sekuire ID is a BLAKE3 hash of the agent's manifest (name, version, public key, capabilities). It's deterministic - the same agent always produces the same ID.
$ sekuire hash
Sekuire ID: a1b2c3d4e5f6g7h8...Beacon & Visibility
The Beacon system provides real-time visibility into your agent fleet:
- Auto-discovery - Agents register automatically when they start
- Heartbeat - Periodic signals prove the agent is alive and healthy
- Platform detection - Automatically detects Docker, Kubernetes, serverless, or bare metal
# Run with beacon enabled (default)
sekuire run --cmd "npm start"
# Custom heartbeat interval
sekuire run --heartbeat-interval 30Kill Switch
The kill switch provides emergency control over agents:
- Lease-based - Agents must continuously renew their lease to keep running
- Instant revocation - Stop any agent from the dashboard or API
- Graceful shutdown - Agents complete in-flight work before stopping
Config-First Architecture
Sekuire uses a config-first approach. Your agent is fully defined in sekuire.yml:
project:
name: "my-agent"
version: "1.0.0"
agents:
assistant:
name: "AI Assistant"
system_prompt: "./prompts/assistant.md"
llm:
provider: "openai"
model: "gpt-4-turbo"
tools:
- calculator
- web_searchThis config is used by:
- CLI — For initialization, pushing, and running
- SDK — For loading agents with
getAgent() - Registry — For storing agent metadata
Trust Registry
The Sekuire Registry stores agent identities and metadata:
- Push — Upload your agent (creates a draft)
- Verify — Prove an agent's authenticity
- Pull — Deploy verified agents
# Push to registry
sekuire push
# Verify a remote agent
sekuire verify --agent-id a1b2c3d4...Workspaces
A workspace is an organizational boundary:
- Group related agents together
- Define workspace-wide policies
- Control who can deploy what
Agents are installed into a workspace:
sekuire install agent --workspace ws_abc123 --agent $(sekuire hash)Policies
Policies define rules for what agents can do:
- Allowed models — Which LLMs are permitted
- Allowed tools — Which capabilities are allowed
- Compliance — SOC2, HIPAA, GDPR requirements
When you push with --workspace, the agent is validated against the workspace policy.
Agent Lifecycle
┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐
│ CREATE │───▶│ PUSH │───▶│ INSTALL │───▶│ RUN │
│ │ │ │ │ │ │ │
│ init │ │ registry │ │ workspace│ │ runtime │
│ keygen │ │ verify │ │ policy │ │ heartbeat│
└──────────┘ └──────────┘ └──────────┘ └──────────┘- Create —
sekuire initscaffolds project and generates keys - Push —
sekuire pushuploads to registry - Install —
sekuire install agentadds to workspace - Run —
sekuire runstarts with heartbeat
Next Steps
- Quick Start — Build your first agent
- CLI Reference — All commands
- Policies — Enterprise governance