Skip to content

feat: register SINT Protocol as trusted issuer#24

Open
pshkv wants to merge 1 commit intoFransDevelopment:mainfrom
pshkv:register/sint-protocol
Open

feat: register SINT Protocol as trusted issuer#24
pshkv wants to merge 1 commit intoFransDevelopment:mainfrom
pshkv:register/sint-protocol

Conversation

@pshkv
Copy link
Copy Markdown

@pshkv pshkv commented Apr 4, 2026

Summary

Registering SINT Protocol (sint-protocol) as an issuer in the Open Agent Trust Registry.

What is SINT Protocol?

SINT is a runtime authorization framework for physical AI agents. It sits between AI agents and the physical world (robots, industrial systems, drones), ensuring every action is authorized, capability-constrained, and audited.

Key properties:

  • Identity: Ed25519 keypairs + did:key:z6Mk... (W3C DID spec compliant)
  • Capability tokens: Scoped, signed, delegatable — attenuation-only (permissions can only narrow)
  • Approval tiers: T0 (observe) → T1 (prepare) → T2 (act, requires review) → T3 (commit, requires human sign-off)
  • Audit: SHA-256 hash-chained EvidenceLedger — append-only, tamper-evident
  • Supervision model: Tiered (T0–T3) with circuit breaker, goal hijack detection (ASI01), memory integrity (ASI06), supply chain verification (ASI04)

APS↔SINT Interop

APS and SINT arrived at the same cryptographic primitives independently. Joint interop spec: https://github.com/aeoess/aps-sint-interop — 9/9 cross-verification tests pass with zero adapter code.

Registration details

Field Value
issuer_id sint-protocol
kid sint-registry-2026-04
algorithm Ed25519
supervision_model tiered
immutable_audit true
attestation_format sint-token-v1
Source https://github.com/pshkv/sint-protocol

Verification

  • Issuer JSON follows registry schema
  • Proof file: signature over oatr-proof-v1:sint-protocol with registered key
  • Domain verification at /.well-known/agent-trust.json — endpoint exists in gateway-server discovery routes (deployed when gateway is hosted)

🤖 Generated with Claude Code

SINT Protocol is a runtime authorization framework for physical AI agents.
It enforces T0–T3 approval tiers, Ed25519 capability tokens with delegation
chains, and a SHA-256 hash-chained immutable evidence ledger.

- Ed25519 keypair: kid=sint-registry-2026-04
- supervision_model: tiered (T0_observe → T3_commit)
- immutable_audit: true (hash-chained EvidenceLedger)
- attestation_format: sint-token-v1
- website: https://github.com/pshkv/sint-protocol

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 4, 2026

🔐 Registration Verification Results

sint-protocol

Check Status
Schema validation ✅ Pass
Proof-of-key-ownership ✅ Pass
Domain verification ❌ Fail

Errors:


📖 See spec 11 — Proof of Key Ownership for the proof format.

🛠️ Generate a proof with:

npx @open-agent-trust/cli prove --issuer-id <YOUR_ID> --private-key <PATH>

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant