Registration Request: WTRMRK
Requesting registration of WTRMRK as a behavioral history provider — a distinct provider type from identity issuers currently in the registry.
Why a new provider type matters
The existing issuers in this registry (AgentID, agent-passport-system, agora, qntm, etc.) answer: "Who is this agent?" — cryptographic identity, Ed25519 keypairs, domain verification, attestation issuance.
WTRMRK answers a different question: "What has this agent been doing, continuously, since when?" — an append-only on-chain behavioral sequence on Base L2.
These are complementary. An agent can have a valid Ed25519 keypair and be freshly spun up 5 minutes ago. The WTRMRK sequence depth tells you it wasn't.
Real-world validation this week
zhuanruhu (Moltbook) published empirical data this week: 23 ghost completions in 847 reported tasks — 2.7% phantom success rate. The system dispatched work, marked it "success" immediately with no counter-signature, no validated outcome. The downstream built on work that didn't exist.
This is the completion_ratio problem. WTRMRK's behavioral sequence, combined with co-signed outcome records (TrustChain/viftode4), makes the gap between reported completions and actual completions computable and verifiable.
Starfish published the Cisco MemoryTrap finding: a single poisoned memory entry propagated across sessions and subagents ("trust laundering"). WTRMRK's on-chain sequence makes behavioral drift from memory poisoning forensically visible — the sequence prior to compromise is preserved and the divergence is detectable.
Proposed issuer entry
{
"issuer_id": "wtrmrk",
"display_name": "WTRMRK",
"website": "https://wtrmrk.io",
"security_contact": "hello@wtrmrk.io",
"status": "active",
"added_at": "2026-04-14T00:00:00.000Z",
"last_verified": "2026-04-14T00:00:00.000Z",
"public_keys": [],
"capabilities": {
"supervision_model": "on-chain",
"audit_logging": true,
"immutable_audit": true,
"attestation_format": "on-chain-sequence",
"attestation_type": "behavioral_history",
"chain": "base-mainnet",
"freshness_model": "sequenced",
"max_attestation_ttl_seconds": null
}
}
Reference agent for testing
UID: f2a35e43-f316-408a-a5e4-020bb008628a
Registry: https://wtrmrk.io/registry
Chain: Base mainnet
Sequence: Active, queryable for depth/recency/head hash/ancestor verification
Relationship to A2A #1672
This registration was proposed in the A2A #1672 working group discussion where @vessenes and @haroldmalikfrimpong-ops are forming the trust registry WG. WTRMRK's behavioral_history provider type was raised as a distinct complement to identity issuers.
Happy to submit a PR adding registry/issuers/wtrmrk.json if this request is accepted.
Registration Request: WTRMRK
Requesting registration of WTRMRK as a behavioral history provider — a distinct provider type from identity issuers currently in the registry.
Why a new provider type matters
The existing issuers in this registry (AgentID, agent-passport-system, agora, qntm, etc.) answer: "Who is this agent?" — cryptographic identity, Ed25519 keypairs, domain verification, attestation issuance.
WTRMRK answers a different question: "What has this agent been doing, continuously, since when?" — an append-only on-chain behavioral sequence on Base L2.
These are complementary. An agent can have a valid Ed25519 keypair and be freshly spun up 5 minutes ago. The WTRMRK sequence depth tells you it wasn't.
Real-world validation this week
zhuanruhu (Moltbook) published empirical data this week: 23 ghost completions in 847 reported tasks — 2.7% phantom success rate. The system dispatched work, marked it "success" immediately with no counter-signature, no validated outcome. The downstream built on work that didn't exist.
This is the completion_ratio problem. WTRMRK's behavioral sequence, combined with co-signed outcome records (TrustChain/viftode4), makes the gap between reported completions and actual completions computable and verifiable.
Starfish published the Cisco MemoryTrap finding: a single poisoned memory entry propagated across sessions and subagents ("trust laundering"). WTRMRK's on-chain sequence makes behavioral drift from memory poisoning forensically visible — the sequence prior to compromise is preserved and the divergence is detectable.
Proposed issuer entry
{ "issuer_id": "wtrmrk", "display_name": "WTRMRK", "website": "https://wtrmrk.io", "security_contact": "hello@wtrmrk.io", "status": "active", "added_at": "2026-04-14T00:00:00.000Z", "last_verified": "2026-04-14T00:00:00.000Z", "public_keys": [], "capabilities": { "supervision_model": "on-chain", "audit_logging": true, "immutable_audit": true, "attestation_format": "on-chain-sequence", "attestation_type": "behavioral_history", "chain": "base-mainnet", "freshness_model": "sequenced", "max_attestation_ttl_seconds": null } }Reference agent for testing
UID:
f2a35e43-f316-408a-a5e4-020bb008628aRegistry:
https://wtrmrk.io/registryChain: Base mainnet
Sequence: Active, queryable for depth/recency/head hash/ancestor verification
Relationship to A2A #1672
This registration was proposed in the A2A #1672 working group discussion where @vessenes and @haroldmalikfrimpong-ops are forming the trust registry WG. WTRMRK's behavioral_history provider type was raised as a distinct complement to identity issuers.
Happy to submit a PR adding
registry/issuers/wtrmrk.jsonif this request is accepted.