Show HN: 저는 15살이고 AI 에이전트를 위한 암호화 책임 계층을 구축했습니다.

hackernews | | 🔬 연구
#claude #review
원문 출처: hackernews · Genesis Park에서 요약 및 분석

요약

15세 개발자가 AI 에이전트의 행동을 감시하는 암호화 기반 책임성 프로토콜을 개발했습니다. 규칙 선언, 실행 시 강제, 해시 체인을 통한 증명의 3가지 기본 원칙으로 구성된 이 프로토콜은 위변조 방지 로그를 통해 행동을 검증합니다. 신경망 자체를 감사할 수는 없지만, 약속된 규칙에 대한 에이전트의 행동 로그는 효율적이고 결정적으로 검증할 수 있도록 설계되었습니다.

본문

AI agents can't prove they followed their own rules. Nobulex fixes that. $ npx tsx examples/demo.ts Agent A declares covenant: permit read, forbid transfer > 500 Agent A executes 5 actions... ✓ read /data/users — allowed ✓ transfer $300 — allowed ✓ read /data/orders — allowed ✗ transfer $600 — BLOCKED by covenant ✓ read /data/config — allowed Agent B verifies Agent A... ✓ Step 1: Covenant signature valid ✓ Step 2: Proof signature valid ✓ Step 3: Log integrity verified (5 entries, chain intact) ✓ Step 4: Compliance check passed (0 violations) ✓ Step 5: History length sufficient (5 ≥ 1) ✓ Step 6: Covenant matches requirements ✓ Step 7: Audience binding confirmed ✓ Step 8: Task class verified Result: Agent B trusts Agent A ✅ Agent C presents tampered proof... ✓ Step 1: Covenant signature valid ✓ Step 2: Proof signature valid ✗ Step 3: FAILED — hash chain broken at entry 2 Result: Agent B refuses Agent C ❌ Three primitives. That's the whole protocol: - Declare — write rules: permit ,forbid ,require - Enforce — check every action before it runs - Prove — tamper-evident hash chain anyone can verify Try it live · Policy Designer · Quickstart · Compare · Receipt Schema · Pricing · IETF Draft You can't audit a neural network. But you can audit actions against stated commitments. verify(covenant, actionLog) → { compliant: boolean, violations: Violation[] } This is always decidable, always deterministic, always efficient. No ML, no heuristics — mathematical proof. Proof-of-behavior means every autonomous agent action is: - Declared — behavioral rules defined before deployment in a formal language - Enforced — violations blocked at runtime, before execution - Proven — every action hash-chained into a tamper-evident audit trail that third parties can independently verify npm install @nobulex/sdk import { createDID, parseSource, EnforcementMiddleware, verify } from '@nobulex/core'; // 1. Create an agent identity const agent = await createDID(); // 2. Write behavioral rules const spec = parseSource(` covenant SafeTrader { permit read; permit transfer (amount 500); forbid delete; } `); // 3. Enforce at runtime const mw = new EnforcementMiddleware({ agentDid: agent.did, spec }); // $300 transfer — allowed await mw.execute( { action: 'transfer', params: { amount: 300 } }, async () => ({ success: true }), ); // $600 transfer — BLOCKED before execution await mw.execute( { action: 'transfer', params: { amount: 600 } }, async () => ({ success: true }), // never runs ); // 4. Prove compliance const result = verify(spec, mw.getLog()); console.log(result.compliant); // true console.log(result.violations); // [] Before two agents transact, they verify each other's proof-of-behavior. No proof, no transaction. import { generateProof, verifyCounterparty } from '@nobulex/sdk'; // Agent A generates its proof-of-behavior const proof = await generateProof({ identity: agentA, covenant: spec, actionLog: middleware.getLog(), }); // Agent B verifies Agent A before transacting const result = await verifyCounterparty(proof); if (!result.trusted) { console.log('Refusing transaction:', result.reason); return; // No proof, no transaction } // Safe to transact — Agent A is verified await executeTransaction(proof.agentDid, amount); The handshake checks eight things in order: covenant signature, proof signature, log integrity, compliance, minimum history, required covenant, audience binding, and task class scoping. If any check fails, the transaction is refused. | What exists today | What's missing | |---|---| | Guardrails filter prompts and outputs | No proof the agent followed rules at the action layer | | Monitoring watches what agents do after the fact | No enforcement before execution | | Identity verifies who the agent is | No verification of what the agent did | | Governance platforms provide dashboards and policies | No cryptographic evidence a third party can independently verify | Proof-of-behavior fills the gap: declare → enforce → prove. covenant SafeTrader { permit read; permit transfer (amount 500); forbid delete; require counterparty.compliance_score >= 0.8; } Forbid wins. If any forbid matches, the action is immediately blocked regardless of permits. Default deny for unmatched actions. Conditions support > , = , <= , == , != on numeric, string, and boolean fields. Three keywords. No configuration files. No YAML. No JSON schemas. Just rules. ┌─────────────────────────────────────────────────────────────┐ │ Integrations │ │ mcp-server · a2a · langchain │ ├─────────────────────────────────────────────────────────────┤ │ User API │ │ sdk │ ├─────────────────────────────────────────────────────────────┤ │ Proof-of-Behavior │ │ │ │ identity · covenant-lang · action-log · enforcement │ │ middleware · verification · crypto · merkle · proofs │ │ │ │ core │ └─────────────────────────────────────────────────────────────┘ | Package | What It Does | |---|---| @nobulex/core | Everything — identity (DIDs), covenant DSL, hash-chained action logs, enforcement middleware, verification, cryptographic proofs | @nobulex/sdk | User-facing API — NobulexClient , CovenantAgent , cross-agent handshake | @nobulex/mcp-server | MCP compliance server for Claude Desktop, Cursor, VS Code | @nobulex/a2a | A2A Agent Card behavioral attestation extension | @nobulex/langchain | LangChain callback integration | @nobulex/claude-agent-sdk | Claude Agent SDK compliance hooks — PreToolUse/PostToolUse gating, tamper-evident tool-call logs | - npm — npm install @nobulex/sdk - MCP — npx @nobulex/mcp-server (works with Claude Desktop, Cursor, VS Code) - A2A — Agent Card behavioral attestation extension - LangChain — drop-in compliance callbacks | Bitcoin | Ethereum | Nobulex | | |---|---|---|---| | What it verifies | Monetary transfers | Contract execution | Agent behavior | | Mechanism | Proof of Work | Proof of Stake | Proof of Behavior | | What's proven | Transaction validity | State transitions | Behavioral compliance | | Guarantee | Trustless money | Trustless contracts | Trustless agents | npx tsx examples/demo.ts Creates two agents, defines behavioral rules, enforces at runtime, blocks a forbidden transfer, generates a proof-of-behavior, runs the 8-step handshake, and then shows the same handshake rejecting a third agent whose log was tampered with — all in one script. npx tsx examples/langchain-agent.ts # covenant enforcement around a mocked LangChain agent npx tsx benchmarks/bench.ts # protocol performance on your hardware We've conducted an internal security review. Here's what we tested and what we found: Verified secure: - Hash chain integrity: modifying any entry breaks the chain (property-tested with fast-check across random chains of varying length). - Signature forgery: invalid signatures are rejected 100% of the time. - Replay attack prevention: audience-bound proofs fail when replayed to a different verifier (property-tested). - Covenant enforcement: forbidden actions are blocked before execution, never after — the handler never runs. Known limitations: - No key revocation mechanism yet — compromised keys remain trusted until removed out-of-band. - No rate limiting on handshake verification — potential DoS vector under adversarial load. - Single-threaded chain verification — chains above ~100K entries take visible time (see benchmarks). - Clock skew tolerance is 0 — agents with desynchronized clocks may fail timestamp checks. Not in scope: - Model-level safety (prompt injection, jailbreaking) — use guardrails for that. - Network transport security — use TLS. - Key storage — use your platform's HSM or key vault. See docs/threat-model.md for the full threat model. git clone https://github.com/arian-gogani/nobulex.git cd nobulex npm install npx vitest run # full test suite (incl. fast-check property tests) npx tsx examples/demo.ts # see the protocol run end-to-end npx tsx benchmarks/bench.ts - IETF Internet-Draft — draft-gogani-nobulex-proof-of-behavior-00 : Proof-of-Behavior Protocol for Autonomous AI Agents - LangChain RFC #35691 — ComplianceCallbackHandler, 10+ implementations converging - NIST RFI Response — Formal comments to NIST AI Agent Standards Initiative Projects building on or composing with Nobulex: | Partner | Layer | Integration | |---|---|---| | Dominion Observatory | Pre-call trust scores | Feeds trust_score into covenant require | | SidClaw | HITL approval | Signed state-transition receipts | | Aira | Authorization + audit | Multi-party signing with RFC 3161 | | Signet | Signing layer | Bilateral co-signing, policy attestation | | AgentMint | Runtime enforcement | Ed25519 plan signing, scope matching | | APS | Receipt schema | Co-designed outcome_hash format | - API Reference — Full API docs generated with TypeDoc ( npm run docs:api ) - Proof-of-Behavior Spec — Formal standard specification (CC-BY-4.0) - White Paper — Formal protocol specification - Receipt Schema — Every field, verification steps, examples - Getting Started — Developer guide - Website: nobulex.com - Try it: nobulex.com/try - Policy Designer: nobulex.com/designer - Compare: nobulex.com/compare - npm: @nobulex - PyPI: langchain-nobulex - IETF: draft-gogani-nobulex-proof-of-behavior-00 MIT — use it for anything.

Genesis Park 편집팀이 AI를 활용하여 작성한 분석입니다. 원문은 출처 링크를 통해 확인할 수 있습니다.

공유

관련 저널 읽기

전체 보기 →