feat: register SINT Protocol as trusted issuer#24
feat: register SINT Protocol as trusted issuer#24pshkv wants to merge 2 commits intoFransDevelopment:mainfrom
Conversation
SINT Protocol is a runtime authorization framework for physical AI agents. It enforces T0–T3 approval tiers, Ed25519 capability tokens with delegation chains, and a SHA-256 hash-chained immutable evidence ledger. - Ed25519 keypair: kid=sint-registry-2026-04 - supervision_model: tiered (T0_observe → T3_commit) - immutable_audit: true (hash-chained EvidenceLedger) - attestation_format: sint-token-v1 - website: https://github.com/pshkv/sint-protocol Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
🔐 Registration Verification Results❌
|
| Check | Status |
|---|---|
| Schema validation | ✅ Pass |
| Proof-of-key-ownership | ✅ Pass |
| Domain verification | ❌ Fail |
Errors:
- Domain verification failed: could not fetch agent.json or agent-trust.json from https://github.com/pshkv/sint-protocol — HTTP 404 Not Found
📖 See spec 11 — Proof of Key Ownership for the proof format.
🛠️ Generate a proof with:
npx @open-agent-trust/cli prove --issuer-id <YOUR_ID> --private-key <PATH>|
@pshkv — the CI failure on this PR is just a domain-verification path issue, not a substance problem. The registry verifier looks for The fix is to host the verification file at a domain you control rather than the GitHub repo. Two options:
The proof-of-key-ownership check already passed (your signature is valid), and the schema check passed. Only the domain-verification step is left. Once that's green, the CI auto-merges without human approval. Happy to help debug if the file placement doesn't resolve it on first try. APS registered through the same flow a few weeks back ( |
|
Confirmed: only blocker is domain verification (the verifier fetches I’m going to host Proposed file (exact shape I’ll serve): {
"issuer_id": "sint-protocol",
"public_key_fingerprint": "sint-registry-2026-04"
}If the verifier expects a different field name for the fingerprint/kid (some registries use |
🔐 Registration Verification Results❌
|
| Check | Status |
|---|---|
| Schema validation | ✅ Pass |
| Proof-of-key-ownership | ✅ Pass |
| Domain verification | ❌ Fail |
Errors:
- Domain verification failed: could not fetch agent.json or agent-trust.json from https://sint.gg — HTTP 404 Not Found
📖 See spec 11 — Proof of Key Ownership for the proof format.
🛠️ Generate a proof with:
npx @open-agent-trust/cli prove --issuer-id <YOUR_ID> --private-key <PATH>|
@pshkv — two things needed to close this out. The bot is still hitting Two paths — pick either: Path A: Host on sint.gg root (keep the PR as-is). {
"issuer_id": "sint-protocol",
"public_key_fingerprint": "BQBoYRC6sSrtgRwYdmX8vPxiJIiM3OlO7IZMK-OPGdI"
}Path B: Host on docs.sint.gg (update the PR). Important correction on the fingerprint value. Your earlier proposed JSON had I computed it from the public key in your PR ( echo -n "Yq-yYyx7sLaMHE_jmTkgYPQoSJVJMDRfdAcInJxnV0E" | \
base64 -d --ignore-garbage 2>/dev/null | \
openssl dgst -sha256 -binary | \
base64 | tr '+/' '-_' | tr -d '='(For reference: APS's working entry at Once the file is live with that fingerprint value at whichever domain you picked, re-run the verify workflow. Should go green in one iteration. |
Summary
Registering SINT Protocol (
sint-protocol) as an issuer in the Open Agent Trust Registry.What is SINT Protocol?
SINT is a runtime authorization framework for physical AI agents. It sits between AI agents and the physical world (robots, industrial systems, drones), ensuring every action is authorized, capability-constrained, and audited.
Key properties:
did:key:z6Mk...(W3C DID spec compliant)EvidenceLedger— append-only, tamper-evidentAPS↔SINT Interop
APS and SINT arrived at the same cryptographic primitives independently. Joint interop spec: https://github.com/aeoess/aps-sint-interop — 9/9 cross-verification tests pass with zero adapter code.
Registration details
issuer_idsint-protocolkidsint-registry-2026-04algorithmsupervision_modelimmutable_auditattestation_formatVerification
oatr-proof-v1:sint-protocolwith registered key/.well-known/agent-trust.json— endpoint exists in gateway-server discovery routes (deployed when gateway is hosted)🤖 Generated with Claude Code