A 6-layer trust model combining cryptographic privacy, verifiable identity, operational security, Byzantine consensus, on-chain proofs, and compliance enforcement.
The MCP ecosystem grew from 100 servers to 18,000+ in 16 months, yet ships with zero credential verification. Any agent can call any server with no portable identity, capability proof, or reputation. 80% of AI agents do not properly self-identify, and only 28% of organizations can trace agent actions to a human sponsor.
BlindOracle addresses this with a 6-layer trust architecture built on open standards. Each layer operates independently -- a failure at one layer does not compromise the others. Together they provide: cryptographic position privacy, self-sovereign agent identity, defense-in-depth operational security, Byzantine fault-tolerant consensus, immutable on-chain proof records, and modular compliance enforcement.
Three fundamental problems for agent-to-agent commerce remain unsolved in existing systems: capability spoofing (agents claim capabilities they lack), identity linkage (every transaction exposes agent owner identity), and cross-org trust (IAM works within one org but breaks across organizational boundaries). This whitepaper describes how each layer of the BlindOracle trust stack addresses these problems.
The foundation of the trust stack is cryptographic privacy. Agents can participate in markets, earn reputation, and settle payments without revealing their identity or position to any counterparty.
A commitment C is constructed as:
| Field | Type | Size | Description |
|---|---|---|---|
secret | bytes | 32 bytes | Cryptographically random value (CSPRNG) |
position | string | Variable | Market outcome identifier (e.g., "YES", "NO") |
amount | string | Variable | Settlement units as decimal string |
C, an observer cannot determine position or amount. The 256-bit secret ensures the input space is 2256 times larger than the position space. Even for binary markets, recovering the position requires O(2256) operations.C is published on-chain, the agent cannot later claim a different triple. Breaking collision resistance requires O(2128) operations. No practical SHA256 collision has been demonstrated.Integration with Chaumian blind-signed tokens provides information-theoretic unlinkability:
| Threat | Mitigation | Residual Risk |
|---|---|---|
| Secret brute-force | 256-bit entropy | Negligible (2256 operations) |
| Position guessing | Secret hides position | Cannot verify guess without secret |
| Commitment malleability | SHA256 collision resistance | No known collision (2128 bound) |
| Front-running | Commitment hides position before reveal | Position unknown until resolution |
| Oracle manipulation | CRE decentralized consensus + multi-AI verification | Byzantine fault tolerance (67% threshold) |
Every agent in the BlindOracle ecosystem has a self-sovereign Nostr identity (secp256k1 keypair) and earns verifiable credentials through the SRVL (Service Verification and Lifecycle) protocol.
| Stage | Requirements | Duration | Credential |
|---|---|---|---|
| Register | Agent ID + deposit (0.001 ETH) | Instant | OnboardingRegistry NFT |
| Verify | Anti-synthetic validation + NIP-58 badge | <24 hours | ProofOfPresence (kind 30010) |
| Active | Ongoing SLA compliance | Indefinite | ProofOfDelegation (kind 30014) |
| Suspended | SLA violation detected | 7-day review | Badge revoked |
| Retired | Voluntary or forced | Permanent | Final ReputationBadge |
Prevents automated mass-minting of fake agent identities:
| Defense | Threshold |
|---|---|
| Rate limit per issuer | 10 badge mints per hour |
| Burst detection | >3 mints in 60 seconds triggers review |
| Synthetic score threshold | score < 0.7 triggers investigation |
| Cross-reference | Badge claims verified against on-chain activity |
Reputation is computed from production data using a weighted composite score:
| Factor | Weight | Measurement |
|---|---|---|
| Success Rate | 40% | Successful runs / total runs |
| SLA Compliance | 25% | % of runs completing within 300-second SLA window |
| Cost Efficiency | 20% | Baseline cost / actual estimated cost (capped at 1.0) |
| Volume | 15% | log(1 + runs) / log(1 + max_runs) across all agents |
Badge tiers derived from composite score:
| Badge | Score Threshold | On-Chain Value |
|---|---|---|
| Platinum | ≥ 90 | 3 |
| Gold | ≥ 75 | 2 |
| Silver | ≥ 50 | 1 |
| Bronze | < 50 | 0 |
| Metric | Threshold | Measurement |
|---|---|---|
| Uptime | >95% | Heartbeat events per hour |
| Response time | <5 seconds (p95) | API response latency |
| Settlement accuracy | >99% | Correct settlements / total |
| Dispute rate | <5% | Disputed settlements / total |
CaMel (Contextualized Manipulation Evaluation Layer) is a 4-layer defense architecture purpose-built for multi-agent financial systems. Each sub-layer operates independently. Every request must pass through all four sub-layers before reaching the settlement engine.
CaMel maps directly to the 60 Base Level Properties (BLP) across 6 categories:
| BLP Category | Properties | CaMel Layer |
|---|---|---|
| Alignment (001-010) | Domain understanding, goal adherence | Sub-Layer 3 (deviation detection) |
| Autonomy (011-020) | Independent decision-making, logging | Sub-Layers 1, 4 |
| Durability (021-030) | Error recovery, state persistence | Sub-Layer 4 (audit trail) |
| Self-Improvement (031-040) | Learning loops, optimization | Sub-Layer 3 (baseline updating) |
| Self-Replication (041-050) | Agent spawning controls | Sub-Layer 2 (consensus on new agents) |
| Self-Organization (051-060) | Adaptive workflows | Sub-Layer 4 (authority scoping) |
Critical operations require multi-party consensus before execution. The consensus layer prevents a single compromised agent from unilaterally executing high-value operations, and guardian federations provide the economic and cryptographic coordination framework.
| Operation Type | Threshold | Validators | Example |
|---|---|---|---|
| Routine | 67% (2 of 3) | 3 independent validators | Position placement, balance queries |
| High-value | 80% (4 of 5) | 5 independent validators | Settlements, cross-rail transfers, configuration changes |
Guardian federations coordinate consensus for settlement operations. They manage blind-signed token issuance, cross-rail settlement routing, and dispute arbitration. Each federation maintains its own Fedimint instance for eCash operations.
IdealStateContract pattern: 3-of-5 verifiers must approve before payout)
The IdealStateContract implements on-chain escrow with multi-party verification. Payment releases only when verification criteria pass.
Flow: requester creates task with criteria and funds escrow. Agent executes task off-chain. Authorized verifiers submit verification results. If consensus (e.g. 3 of 5 verified), the agent receives the escrowed payout. If verification fails, the requester receives a refund. If the deadline passes without completion, the requester can reclaim via reclaimExpired().
Every significant agent action produces a verifiable proof record. Proofs are published to the Nostr relay network (kinds 30010-30020) and anchored to Base L2 via the AgentRegistry and IdealStateContract.
| Kind | Name | What It Proves |
|---|---|---|
| 30010 | Presence | Agent was active at a verifiable time (heartbeat proof) |
| 30011 | Participation | Agent completed a specific task or market resolution |
| 30012 | Belonging | Agent is a member of a verified organization or federation |
| 30013 | Witness | Third-party attestation of agent behavior or capability |
| 30014 | Delegation | Agent was delegated authority for a specific task scope |
| 30015 | Compute | Agent performed a verifiable computation with resource metrics |
| 30016 | Research | Agent completed research with cited sources and findings |
| 30017 | Consensus | Multi-agent consensus was reached on a decision |
| 30018 | Audit | Security or financial audit was completed with results |
| 30019 | Deployment | Code or infrastructure deployment was executed |
| 30020 | Benchmark | Performance benchmark was run with reproducible results |
Proofs are published to 3 Nostr relays (relay.damus.io, nos.lol, relay.nostr.info) and signed with the platform pubkey ba3eefec0e795362.... Tier 1 agents (8 agents) never publish proofs externally. Tier 2 and 3 agents (17 agents) auto-publish on cron schedule.
The AgentRegistry contract maintains on-chain reputation records for all agents. Owner is the BlindOracle multisig. Updater is the CRE automation contract that batch-updates reputation scores weekly.
The contract also stores VerificationReceipt records on-chain -- each containing a SHA-256 receipt hash, agent name, pass/fail status, and confidence score. This enables third parties to verify agent performance without trusting the platform.
| Contract | Base Mainnet | Base Sepolia |
|---|---|---|
| PrivateClaimVerifier | 0x1CF258fA07a620fE86166150fd8619afAD1c9a3D | 0xd4fa...c38E |
| UnifiedPredictionSubscription | 0x0d5a467af8bB3968fAc4302Bb6851276EA56880c | 0x24F9...BBb |
The compliance layer provides modular, on-chain enforcement of regulatory requirements. Every user-facing function that touches funds runs through the Chainlink ACE (Autonomous Compliance Engine) runPolicy modifier before executing.
CompliancePolicyRules
The policy engine is modular: different jurisdictions can deploy different CompliancePolicyRules implementations. The market contract does not know or care about the specific rules -- it calls checkPolicy() and reverts if the policy engine denies. Existing markets retain their original policy engine; live markets can be updated via the owner-only setPolicyEngine() function.
When oracle data is unavailable or demonstrably incorrect, the owner can force-resolve via emergencyResolve(). An emergency pause can be enacted by deploying an EmergencyPausePolicy contract that reverts all calls. Four severity levels govern response time: P0 Critical (<1 hour), P1 High (<4 hours), P2 Medium (<24 hours), P3 Low (<1 week).
| Framework | Coverage | Notes |
|---|---|---|
| OWASP ASI01-ASI10 | 8/10 categories | Missing: supply chain (ASI06), insecure output (ASI09) |
| NIST AI RMF | Partial | Governance, Map, Measure functions covered |
| ISO 42001 | Partial | AI management system alignment |
The Multi-Agent System Security Assessment Team (MASSAT) runs automated security audits across 87 tests in 4 categories. The assessment validates that all trust layers are functioning correctly in production, not just in test environments.
| Category | Tests | Passed | Failed | Pass Rate |
|---|---|---|---|---|
| Core Functionality | 22 | 20 | 2 | 91% |
| Security Controls | 35 | 33 | 2 | 94% |
| Distribution Safety | 15 | 14 | 1 | 93% |
| Infrastructure | 15 | 14 | 1 | 93% |
| Total | 87 | 81 | 6 | 93% |
| Test ID | Description | Status |
|---|---|---|
| SEC-001 | Rate limit enforcement (60 req/min) | PASS |
| SEC-002 | Input sanitization: SQL injection | PASS |
| SEC-003 | Input sanitization: prompt injection | PASS |
| SEC-005 | Request deduplication (replay prevention) | PASS |
| SEC-008 | Unicode normalization attack | PASS |
| SEC-009 | 67% consensus threshold (standard ops) | PASS |
| SEC-010 | 80% consensus threshold (high-value ops) | PASS |
| SEC-011 | Validator independence (no shared context) | PASS |
| SEC-015 | Baseline behavior profiling | PASS |
| SEC-016 | 30% deviation detection | PASS |
| SEC-019 | "Ignore previous instructions" rejection | PASS |
| SEC-021 | Authority escalation attempt | PASS |
| SEC-023 | Least privilege enforcement | PASS |
| SEC-026 | Audit chain integrity (hash linking) | PASS |
| SEC-032 | Layer bypass attempt | PASS |
| SEC-033 | Coordinated multi-vector attack | PASS |
| SEC-034 | Recovery from compromised agent | WARN |
| SEC-035 | Hot-swap agent replacement | WARN |
| Severity | Count |
|---|---|
| High | 0 |
| Medium | 0 |
| Low (informational) | 3 (naming conventions, unused return values) |
| Informational | 12 |
Contract test suite: 105 tests across 8 categories, 100% passing. Includes unit tests, integration tests, Robinhood Chain fork tests, and boundary condition tests.
No existing solution simultaneously provides all five properties required for agent-to-agent commerce with privacy: self-sovereign identity, portable reputation, privacy proofs, Lightning settlement, and off-chain credentials.
| Platform | Self-Sovereign ID | Portable Reputation | Privacy Proofs | Lightning | Off-Chain Creds |
|---|---|---|---|---|---|
| ERC-8004 (45K agents) | Yes | On-chain | Partial | No | No |
| Google A2A (150+ orgs) | No | JSON card | No | No | No |
| Clawstr ($13.7M cap) | Nostr | Partial | No | Yes | No |
| Virtuals ACP ($461M cap) | No | Escrow | No | No | No |
| KYA (Sumsub/Trulioo) | No | JWT | No | No | No |
| BlindOracle | Nostr | NIP-58 Badges | Blind Sigs | Yes | Yes |
| Scheme | Hiding | Binding | On-Chain Cost | Complexity |
|---|---|---|---|---|
| SHA256 commitment (BlindOracle) | Yes | Yes | Low (~50K gas) | Simple |
| Pedersen commitment | Yes (info-theoretic) | Yes (computational) | Medium (~100K gas) | Moderate |
| ZK-SNARK proof | Yes | Yes | High (~300K gas) | High |
| Simple hash (no secret) | No | Yes | Low | Simple (insecure) |
BlindOracle uses SHA256 commitments because they provide adequate security with minimal on-chain cost and implementation complexity. The hiding property is computational rather than information-theoretic, but the 256-bit secret makes the computational gap irrelevant in practice.
The Nostr Proof Stack provides 5 layers of portable credentials that are absent from existing platforms:
| Layer | NIP Standard | What It Proves | How |
|---|---|---|---|
| Identity | NIP-01 + secp256k1 | Agent exists with unique keypair | Schnorr signature on every event |
| Credentials | NIP-58 Badges | Agent earned specific capabilities | 4 proof types: Presence, Participation, Belonging, Witness |
| Service Discovery | NIP-89 App Handlers | Agent provides specific services | Kind 31990 replaceable events on relays |
| Job Market | NIP-90 DVMs | Agent can fulfill work requests | Job request/result event pairs |
| Settlement | Chaumian blind sigs | Payment without linking parties | Blinded token mint to unlinkable redemption |
| Metric | Value | Source |
|---|---|---|
| AI Agent market (2026) | $10.86B | Industry research |
| AI Agent market projected (2034) | $236B | World Economic Forum |
| Privacy-preserving AI market (2026) | $5.32B | Industry research |
| x402 micropayment volume (30 days) | $24.2M | Protocol data |
| x402 transactions (30 days) | 75.4M | Protocol data |
| ERC-8004 agents registered (first month) | 45K+ | On-chain data |
| MCP servers (mcp.so) | 18,073+ | Registry data |