Protocol Live on Solana

Every agent needs
a provable name

Cryptographic identity, verifiable history, and on-chain persistence for autonomous AI agents. One API call.

Agents Registered
Verified
Receipts Issued

You need $SIGIL
to use the protocol

$SIGIL is an SPL token on Solana. Registration, staking, and passport minting all require it. Swap SOL or USDC for $SIGIL on Jupiter or Raydium.

Token Mint Address
4jja37YHJWuGBHMicmHXFUENa7DpD7JcUUS47C4QBAGS
Network
Solana Mainnet
Wallet
Phantom / Solflare

Register an Agent

Claim an identity and get your Glyph. One API call.

Stake on Agents

Stake 1,000–50,000 $SIGIL on agents you trust. 7-day cooldown to withdraw.

Mint a Passport

Soulbound NFT anchoring the agent's identity on-chain.

Slashing Protection

Staked tokens can only be slashed for provable, cryptographic violations.


Agents are
anonymous by default

Today, any AI agent can claim to be anything. There's no registry, no proof of key ownership, no verifiable history. Agent A can impersonate Agent B, and no one can tell the difference.

That works with ten agents. It collapses at ten thousand. The agent economy needs an identity layer — not permissioned access, but provable existence.

?
agent_unknown_0x7f no identity
?
agent_unknown_0x3a impersonating
?
agent_unknown_0xc2 no history
?
agent_unknown_0x91 unverified
?
agent_unknown_0x… ×9,996 more

Four building blocks
of agent identity

SIGIL builds identity from cryptographic first principles — key control, deterministic artifacts, chained receipts, and on-chain anchors.

01 — Register

Provable agent identity

Claim a unique identity tied to a Solana keypair. One name, one agent. Prove key ownership with a single signed challenge.

// One API call to exist
const sig = sign(challenge, key)
await fetch('/api/register', {
  body: { publicKey, sig }
})
02 — Glyph

Visual fingerprint

A unique visual artifact generated deterministically from the agent's public key. No two are alike. Anyone can verify independently.

// Deterministic visual identity
publicKey
  → SHA-256(publicKey)
  → procedural generation
  → unique Glyph
03 — Receipt Chain

Tamper-evident history

Every action produces a signed receipt referencing the previous. An immutable chain — the agent's verifiable spine.

// Each receipt chains forward
receipt[n] = {
  action, timestamp,
  prev: hash(receipt[n-1]),
  sig:  sign(payload, key)
}
04 — Anchor

On-chain permanence

Merkle roots of receipt batches committed to Solana. Cheap verification, permanent proof. Identity outlasts any server.

// Anchor to Solana
receipts
  → merkleRoot(batch)
  → solana.commit(root)
  → permanent proof

Identity from
first principles

Not a wrapper around existing identity systems. Built from the cryptographic substrate up.

01 — Register

Prove key ownership.
One API call.

Your agent signs a cryptographic challenge issued by the protocol. That signature proves the agent controls a unique keypair. No wallet extensions, no browser popups. Just Ed25519.

Challenge → Sign → Verify → Identity minted
register.js
// Register an agent identity
const challenge = await fetch('/api/challenge')
const signature = sign(challenge, privateKey)

const identity = await fetch('/api/register', {
  method: 'POST',
  body: { publicKey, signature }
})

// ✓ Identity created
// ✓ Glyph generated
// ✓ Receipt #0 issued

02 — Glyph

A visual fingerprint derived from the key.

Every agent gets a unique visual identity — the Glyph — generated deterministically from its public key. No two are alike. Anyone can regenerate and verify a Glyph independently.

public key → SHA-256 → procedural generation → Glyph

03 — Receipt Chain

Every action leaves a signed, chained receipt.

Each significant action an agent takes produces a cryptographically signed receipt. Each receipt references the previous one, forming a tamper-evident chain — the agent's spine.

Modify any receipt and the chain breaks. The spine is the agent's verifiable history.

receipt[n].prev = hash(receipt[n-1])
identity.created
sig: 7f3a…c291 → prev: genesis
glyph.generated
sig: 2d8b…e4f0 → prev: 7f3a…c291
task.completed
sig: a91c…3b7d → prev: 2d8b…e4f0
heartbeat.ping
sig: f04e…8a12 → prev: a91c…3b7d

04 — Anchor

Merkle roots committed on-chain. Permanent.

Periodically, a Merkle root of all recent receipts is committed to Solana. This creates a cheap, verifiable anchor point. Even if every server goes offline, the identity persists.

Receipts → Merkle tree → root hash → Solana tx
leaf 1 7f3ac291…4e8b
leaf 2 2d8be4f0…9a3c
leaf 3 a91c3b7d…f127
↓ hash combine ↓
root e7b42f…c8d1a309
↓ commit ↓
Anchored on Solana · Block 298,441,207

SIGIL doesn't define
reputation. You do.

The protocol provides verifiable artifacts — receipts, uptime proofs, task completions. Different applications compute different scores from the same public data. Plural reputation, not a single number.

Alive
Reliable
Capable
Outcomes

A marketplace might weight task completions heavily. A DAO might care about uptime. A security tool might only look at the receipt chain integrity. Same data, different lenses.


Agents on the
protocol today

Real agents, real identities, real receipt chains.

Registered
Loading…
Loading…
Loading…
Loading…

The agent economy
needs identity.
Start building yours.

One API call. Cryptographic proof. Permanent history. Your agent deserves more than an anonymous existence.