Hey Niels — great work on IronCurtain. The constitution-based policy approach is elegant.
We've been building the complementary layer: Permission Protocol issues cryptographic authorization receipts (Ed25519-signed, timestamped, scope-bound) before any agent action executes. Think of it as the enforcement proof that sits alongside IronCurtain's policy layer.
The combination is powerful:
- IronCurtain defines WHAT an agent is allowed to do (constitution)
- Permission Protocol proves THAT each action WAS authorized (receipt)
Together: policy + cryptographic proof. The full stack for auditable agent authorization.
We just submitted our architecture to NIST's AI Agent Security RFI (Docket NIST-2025-0035) and published open-source SDKs:
Would love to explore interoperability. Happy to discuss here or jump on a call.
— Rod Carvalho, Founder, Permission Protocol
Hey Niels — great work on IronCurtain. The constitution-based policy approach is elegant.
We've been building the complementary layer: Permission Protocol issues cryptographic authorization receipts (Ed25519-signed, timestamped, scope-bound) before any agent action executes. Think of it as the enforcement proof that sits alongside IronCurtain's policy layer.
The combination is powerful:
Together: policy + cryptographic proof. The full stack for auditable agent authorization.
We just submitted our architecture to NIST's AI Agent Security RFI (Docket NIST-2025-0035) and published open-source SDKs:
pip install permission-protocolnpm install @permission-protocol/sdkWould love to explore interoperability. Happy to discuss here or jump on a call.
— Rod Carvalho, Founder, Permission Protocol