AuthProof commits user intent, scope, and operator instruction hashes to a decentralized append-only log before any agent action executes. Operators cannot exceed the signed boundary. Any deviation is cryptographically detectable.
import { AuthProofClient, Scope, KeyCustody } from 'authproof-sdk'; // User delegates to agent — scope is signed & committed const client = new AuthProofClient({ custody: KeyCustody.HARDWARE }); const receipt = await client.delegate({ scope: new Scope({ allow: ['read:calendar', 'send:email'], deny: ['delete:*', 'payment:*'] }), operatorInstructions: 'Schedule meetings only', expiresIn: '2h' }); // Before any action — verify against the signed receipt const ok = await client.verify(receipt.hash, action); // Any deviation is detectable before execution
Current AI authorization standards delegate trust to the operator. AuthProof removes the operator as a trusted party entirely.
A Delegation Receipt is a signed Authorization Object committed to an append-only log before any action. It contains:
Operators are removed as trusted third parties. The signed receipt is the only authority. Any deviation between operator instructions and the committed hash is detectable by anyone with the public key.
Six deterministic steps from user intent to verifiable delegation.
The user defines an explicit scope (allow list + deny list), time window, and operator instructions. Nothing is assumed or inferred.
Allow and deny lists are parsed into a normalized canonical form. Wildcards (e.g. delete:*) are resolved at verification time, not delegation time.
SHA-256 of the operator's stated instructions is embedded in the receipt. Any subsequent modification produces a detectable mismatch.
The full payload — scope, hashes, timestamps, receipt ID — is signed with the user's private key via the Web Crypto API. The key never leaves the hardware enclave.
The signed receipt and its hash are committed before any agent action executes. The log is immutable — entries can be appended but never modified.
Before execution, each agent action is checked against the signed scope. If the action falls outside the allow list or matches the deny list, it is blocked — cryptographically, not by policy.
Early access to v2.0 features: on-chain log anchoring, multi-party delegation, and WASM verification.
No spam. One email when it ships. Unsubscribe anytime.