Security Model
Security by construction
Six layers of defense. Zero compromises. Every layer of the identity stack is built on battle-tested cryptography with formal security properties.
Cryptographic Identity
Ed25519 signatures, HKDF-SHA256 key derivation, BLAKE3 hashing. Every identity is self-certifying and offline-verifiable.
Capability-Based Access
Arsenal Agent Capability Tokens (ACTs) with short TTLs, proof-of-possession binding, and least-privilege scoping.
Threshold Governance
FROST distributed key generation. No single point of compromise. t-of-n humans required for critical operations.
Policy Enforcement
Multi-dimensional policy engine with spending limits, temporal windows, lineage constraints, and contract policies.
Trust Verification
7-step verification pipeline: resolve, validate schema, verify signature, check revocation, verify lineage, liveness, conformance.
Memory Safety
Rust-first with #![forbid(unsafe_code)]. Zeroize on all key material. Constant-time comparisons. No timing side channels.