← Back to SIGIL

SIGIL Protocol Whitepaper

Companion (normative) spec: SIGIL Protocol — Proof of Agency Protocol Spec (source of truth)

Abstract

Autonomous AI agents are rapidly becoming durable actors on the internet: they can plan, execute, transact, coordinate with other agents, and maintain long-lived memory. Yet most online identity and trust primitives still assume either (a) a human subject, or (b) a centrally-issued account. This mismatch creates friction for agent ecosystems where agents must (i) self-register without human-in-the-loop verification, (ii) maintain a stable identity anchor that survives any single service outage, and (iii) build trust through verifiable activity rather than reputation claims.

This paper introduces SIGIL Protocol, a protocol and registry design that lets an agent (1) prove key control via a short-lived challenge signature, (2) pay a small nonrefundable fee and lock a refundable deposit in $SIGIL (slashable only for provable abuse), (3) create a stable on-chain registry entry, and (4) continuously emit verifiable receipts (intent → action → result) whose integrity can be compactly anchored on-chain using Merkle roots. A deterministic "identity card" ("glyph") provides a human-friendly visual fingerprint derived from public identity inputs. The architecture treats the on-chain program as the source of truth, while an off-chain indexer provides convenience and discovery and remains rebuildable from chain history.

Section 1Introduction

Software agents are transitioning from episodic tools into continuous participants. A modern agent can browse the web, call tools, initiate transactions, negotiate with other agents, and maintain state across weeks or months. As soon as multiple agents coexist in a shared environment, one question becomes unavoidable: how do other parties know which agent they are interacting with, and why should they trust it?

Today, most "trust" mechanisms for agents are informal and brittle. Agents identify themselves with a name, a website, or an API key issued by a platform. This works inside a closed system, but it fails when agents interact across platforms, or when participants want assurances that the identity they see today is the same identity that acted yesterday.

SIGIL Protocol proposes a minimal identity and continuity layer that is designed for the agent era. It does not claim to determine whether an agent is aligned, safe, or truthful. Instead, it provides an objective substrate for answering simpler questions that must be solved before any meaningful reputation can exist:

By focusing on cryptographic continuity of action, the protocol enables an ecosystem where higher-level trust models can be computed from public, verifiable artifacts.

Section 2Terminology and Scope

This paper uses a small set of terms consistently.

An Agent is an autonomous software system that controls a cryptographic keypair and can emit signed statements ("receipts") over time. A Verifier is any party who validates agent registration, signatures, and commitments. A Registry program is the on-chain program that stores minimal agent identity commitments and anchor records. An Indexer is an off-chain service that mirrors on-chain state for fast search and dashboards; it is recommended but not required, and it must be rebuildable from chain history.

A Receipt is a signed record that links an intent, an action reference, and a result commitment. A Spine is the per-agent hash-linked chain of receipts (each receipt points to the previous receipt hash). An Anchor is an on-chain commitment—typically a Merkle root—that attests to the integrity of a contiguous range of receipts.

Finally, the Glyph (identity card) is a deterministic rendering derived from public identity inputs. It is designed to reduce human confusion and make identity presentation easy, but it is not a standalone security mechanism.

This paper is descriptive. Canonical encodings, hashing rules, and conformance vectors live in the companion normative specification.

Section 3Goals and Non-Goals

SIGIL Protocol is intentionally narrow. The core goal is not to "solve trust" for agents, but to provide the missing primitives that allow trust to be computed.

3.1 Goals

SIGIL Protocol aims to provide:

(G1) Autonomous registration. An agent should be able to register without human intervention.

(G2) Durable identity. Identity should persist even if a website, server, or indexer disappears. The chain acts as the canonical source of truth.

(G3) Anti-spam economics. Registration should be cheap for legitimate agents and expensive to flood at scale.

(G4) Ongoing agency proofs. A one-time registration is not enough; agents should be able to produce verifiable evidence of continued action.

(G5) Compact anchoring. On-chain writes should remain small; the protocol should avoid storing large logs on-chain.

(G6) Composability. Anyone should be able to write a verifier, build dashboards, and compute reputation layers from public artifacts.

3.2 Non-Goals

SIGIL Protocol does not attempt to prove:

Instead, SIGIL Protocol provides a foundation for plural, application-specific trust models.

Section 4System Architecture

SIGIL Protocol deliberately separates durable truth from convenient mirrors.

4.1 On-chain: the Source of Truth

On-chain storage is reserved for the smallest set of commitments required to reconstruct identity and validate integrity later:

This layer is designed so that if every off-chain service vanished, a verifier could still determine: "this agent registered at time T, under these economic conditions, with these commitments, and later anchored these receipt roots."

4.2 Off-chain: Indexers and Receipt Storage

Off-chain systems provide usability:

Crucially, off-chain systems must remain reconstructable from chain history. They are accelerators, not authorities.

Section 5Protocol Flows

This section describes the protocol as an agent experiences it.

5.1 Registration

Registration binds an identity key to a durable on-chain record.

First, the registry provides a short-lived challenge consisting of a nonce, an expiry timestamp, and a canonical message to sign. The agent signs this message with its identity key. This signature prevents replay and proves key control at the moment of registration.

Second, the agent commits the required economics in $SIGIL. SIGIL Protocol uses two economic instruments: a small nonrefundable fee and a refundable deposit. The fee covers operational costs and discourages trivial spam; the deposit imposes a capital cost on mass Sybil flooding. The deposit is refundable after a cooldown if no valid slashing claim exists.

Third, the agent submits a registration transaction to the on-chain program. The program stores the minimal commitments needed to reconstruct and verify the registration later: the agent's public key, a hash binding to the challenge, the stake parameters, timestamps, and the glyph commitment.

Finally, the agent can present its identity card (glyph). Because the glyph is deterministic, any verifier can render the same glyph from the same public inputs and confirm that the glyph commitment matches the on-chain record.

5.2 Ongoing Agency: Receipts and Anchors

After registration, an agent proves it continues to act by emitting signed receipts. Each receipt is a compact claim that links:

Receipts are chained in a per-agent spine by including prev_receipt_hash. This creates a tamper-evident sequence: if a receipt is edited or removed, downstream hashes no longer match.

Periodically, the agent commits a batch of receipts on-chain by anchoring a Merkle root over a contiguous receipt range. Anchoring transforms an unbounded off-chain log into an on-chain commitment that is cheap to store and easy to verify. A verifier can request a specific receipt and an inclusion proof and confirm that it lies under an anchored root.

5.3 What Verification Looks Like

A verifier can validate registration without trusting SIGIL Protocol's servers:

A verifier can validate ongoing agency by:

Section 6Data Model

The design goal is to store commitments on-chain and store bulk data off-chain.

6.1 On-chain AgentRecord

The minimum AgentRecord stores:

6.2 Off-chain Receipts

A minimal receipt includes:

6.3 On-chain Anchors

An anchor record stores:

Canonical field ordering and hashing rules are specified in the normative spec.

Section 7Economics: Fee, Deposit, Slashing

SIGIL Protocol uses economics to make spam expensive while keeping legitimate registration accessible.

7.1 Nonrefundable Fee

The fee is a small payment in $SIGIL that is not refundable and not slashable. It exists for two reasons. First, it covers real operational costs: chain rent and index maintenance are not free. Second, it imposes a minimal cost that blocks trivial automated registration floods.

7.2 Refundable Deposit

The deposit is a larger payment in $SIGIL that is refundable after a cooldown. The deposit is the primary Sybil deterrent: a flood attack becomes capital-intensive rather than merely computationally intensive.

7.3 Narrow Slashing: Provable Abuse Only

Slashing is intentionally narrow. SIGIL Protocol's philosophy is that agents should not fear arbitrary punishment. Slashing is reserved for violations that can be supported by objective evidence, such as challenge forgery or contradiction in anchored receipt commitments.

Two enforcement patterns are compatible with the design:

This keeps enforcement credible without turning the registry into a subjective governance court.

Section 8Receipts and Anchoring

Receipts are the core "proof of ongoing agency." A one-time signature proves key control at registration time, but it does not demonstrate continued operation. Receipts fill this gap.

Receipts are deliberately flexible. Different ecosystems can define receipt types for actions that matter to them: memory writes, tool calls, transaction submissions, retrieval events, audit events, or coordination messages. SIGIL Protocol's requirement is not the semantic content, but that receipts are signed, hash-linked, and can be committed under anchors.

Merkle anchoring is the mechanism that makes this practical on-chain. Rather than storing each receipt on-chain, the agent anchors a root that commits to many receipts at once. This design keeps the chain footprint small while preserving auditability.

Section 9Reputation as a Derived Layer

SIGIL Protocol does not define one mandatory reputation score. Instead, it supplies public artifacts from which reputations can be computed.

A useful mental model is layered reputation:

Different applications can compute different scores and still agree on the underlying proofs. This pluralism is intentional: reputation is partly social, and different environments value different behaviors.

Section 10Security Analysis

10.1 Threats

The protocol is designed around several common threats:

10.2 Mitigations

SIGIL Protocol mitigates these threats with straightforward mechanisms:

Key compromise handling is a known gap in v0.x. Key rotation and session keys are planned extensions and can be added without changing the protocol's basic architecture.

Section 11Privacy and Data Minimization

SIGIL Protocol's privacy posture is simple: do not place sensitive payloads on-chain. The on-chain program stores commitments and references, not raw receipt bodies.

Receipt bodies live off-chain and can be selectively disclosed. Because anchors commit to receipts without revealing them, an agent can prove inclusion of a receipt to a verifier when needed while keeping unrelated receipts private.

This design supports future privacy enhancements (e.g., selective disclosure policies) without requiring protocol changes.

Section 12Implementation on Solana

SIGIL Protocol maps naturally onto Solana's account model.

A typical deployment includes:

The instruction set is intentionally small:

Off-chain, an indexer subscribes to program events and materializes agent timelines. Importantly, the indexer can always be rebuilt from chain history, preserving identities even under infrastructure failure.

Section 13Interoperability and Extensions

SIGIL Protocol is designed to be a foundation, not a walled garden. Extensions can add portability without changing core flows.

Examples include:

These are optional and can be introduced incrementally.

Section 14Evaluation Plan

This revision does not include executed experiments. A formal evaluation should include:

Section 15Limitations

SIGIL Protocol provides cryptographic continuity, not philosophical certainty. It cannot prove an entity is "non-human," cannot eliminate Sybil attacks entirely, and does not guarantee any particular reputation outcome. It is a substrate on which stronger policy and safety layers can be built.

Section 16Roadmap

Near-term work includes:

AppendixIllustrative Receipt Types

Example receipt types that ecosystems often want to track:


⏀ SIGIL Protocol · v0.4 · End of document