You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs: rewrite README with Claude Code skill, hierarchical scopes, audit trail
Lead with the skill (the distribution unlock), not the library.
Added: named agents, hierarchical scopes, git pre-push hook,
exec wrapper, audit trail. Removed: Observatory, interop matrix,
competitive table, architecture diagram (moved to docs site).
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
**Your AI agents currently have keys. We give them math instead.**
4
4
5
-
AI agents are being given SSH keys and API tokens like it's 1999. Kanoniv agent-auth replaces long-lived credentials with cryptographic delegation tokens that are scope-confined, time-bounded, and fully auditable.
Now `git push` verifies `git.push.{repo}.{branch}` scope before allowing the push. No wrapper needed - just push as normal.
155
79
156
-
**Ed25519 signatures.** Every delegation is a signed message from the delegator to the delegate. The chain is self-contained - verification requires no network call, no database lookup, no trust in any third party.
80
+
## Exec Wrapper
157
81
158
-
**Scope narrowing.** A delegation can only grant a subset of the parent's scopes. Root grants `[build, test, deploy.staging]`. Sub-delegation can grant `[deploy.staging]` but cannot add `deploy.prod`. This is enforced by the math, not by policy.
82
+
Verify, run, sign in one command:
159
83
160
-
**Token format.** Base64-encoded JSON containing the delegation chain, agent DID, scopes, and expiry. Each link in the chain includes the issuer's public key and signature. Self-contained, verifiable offline.
**Ed25519 signatures.** Every delegation is a signed message. The chain is self-contained - verification requires no network call, no database, no trust in any third party.
200
108
201
-
## Agent Trust Observatory
109
+
**Scope narrowing.** Delegations can only narrow, never widen. Root grants `[build, test, deploy.staging]`. Sub-delegation can grant `[deploy.staging]` but cannot add `deploy.prod`. Enforced by the math, not by policy.
202
110
203
-
For teams that want a visual dashboard: [trust.kanoniv.com](https://trust.kanoniv.com)
111
+
**Offline verification.** Base64-encoded JSON tokens containing the delegation chain, agent DID, scopes, and expiry. Each chain link includes the issuer's public key and signature. Verifiable anywhere.
204
112
205
-
The Observatory shows agent reputation, delegation chains, provenance audit trails, and cross-engine interop verification. Docker Compose for self-hosting:
0 commit comments