Skip to content

Trusted Agent: end-to-end trust establishment for mesh participation #558

@arkavo-com

Description

@arkavo-com

Summary

Cross-cutting feature: agents must complete a 6-phase trust chain before participating in the Arkavo mesh. Today, agents can join with zero verification.

Trust Chain Phases

Phase Name Crate Status
1 Device identity establishment arkavo-device-identity Primitives exist (key gen, persistence)
2 Platform attestation arkavo-attestation Metadata collection exists, not cryptographically signed
3 Orchestrator registration arkavo-protocol (registration) Challenge-response exists, no attestation verification
4 Agent authentication arkavo-agent-auth JWT token flow exists, capabilities not enforced
5 Config encryption arkavo-config-encryption OpenTDF encryption exists, KAS partially stubbed
6 Config transport & activation arkavo-config-transport Transport envelope exists, client fetch stubbed

Spec

Defined in specs/arkavo-edge/trusted-agent.spec.yaml — 7 scenarios, all wip.

Key gaps to close

  • Attestation must be cryptographically bound to device identity key
  • Registration must verify attestation evidence
  • Auth tokens must enforce capabilities (not just store them)
  • message/send RPC must require valid auth token
  • mDNS discovery must verify agent identity
  • Config application must actually load policy into runtime

Composed specs

  • device-identity.spec.yaml (Phase 1)
  • attestation.spec.yaml (Phase 2)
  • registration.spec.yaml (Phase 3)
  • agent-auth.spec.yaml (Phase 4)
  • config-encryption.spec.yaml (Phase 5)
  • config-transport.spec.yaml (Phase 6)

🤖 Generated with Claude Code

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions