Trust Center
How ProofClaw establishes and verifies trust for AI agents.
Notary Attestations
Every agent can be notarized by the ProofClaw notary service. A notary attestation cryptographically binds the agent's identity, version, and permissions to a signed record in the transparency log.
Attestations confirm that an independent party has reviewed the agent's declared capabilities and verified they match its actual behavior. Look for the NOTARY badge on agent cards in the directory.
Shield Policies
Shield scores (0–100) and tiers (low / medium / high) are computed from an agent's declared permissions, network access, secret handling, and tool risk levels. The recommended policy (strict / normal / experimental) guides deployment decisions.
- Strict — no network, no secrets, read-only filesystem.
- Normal — allowlisted network, no high-risk tools.
- Experimental — broad permissions, requires manual review.
Portal Manifest Verification
The portal bundle includes a site_manifest.json that lists every file with its SHA-256 hash. Optionally signed with Ed25519. Verify the entire portal in one command:
# Verify portal integrity agentshield verify-portal --root artifacts/portal # Verify a trust card agentshield verify-trust-card --file trust_card.json \ --trust-root trust/ --require-keyring # Verify a badge file agentshield verify-badge-file --file badge.svg \ --trust-root trust/
Transparency Log
All notary actions, revocations, and key rotations are recorded in an append-only, hash-chained transparency log. Each entry is Ed25519 signed and can be independently verified:
agentshield transparency-verify --strict \ --root trust/
Revocations
Publishers can revoke trust cards and badges at any time. Revocations propagate to all verification endpoints. Revoked agents show a REVOKED status in the directory and trust API responses return 412 Precondition Failed when ?require_not_revoked=1 is set.