This is the canonical whitepaper as of April 2026. The full academic version is maintained in the repo at github.com/sint-ai/sint-protocol/blob/main/WHITEPAPER.md. The arXiv preprint is under submission (cs.CR primary, cs.RO / cs.AI / cs.MA cross-list). The March 2025 “SINT Agentic Platform” whitepaper is archived at /archive/2025-whitepaper.
Read in GitHub
The canonical Markdown version with full bibliography and citation metadata.
arXiv preprint
Academic version with LaTeX typesetting. Under submission as of April 2026.
Abstract
Foundation-model AI agents now perceive, reason, and physically actuate. Coinbase’s Agentic Wallets (February 2026) gave them money; ERC-8004 gave them portable on-chain identity; OWASP’s Top 10 for Agentic Applications (December 2025) catalogued how they fail; the EU AI Act’s high-risk provisions take effect August 2, 2026. None of these infrastructures addresses the full stack of a physical-AI agent — the combined cognition, identity, authorization, actuation, and audit surface that spans software and the physical world. This paper presents SINT (Secure Infrastructure for Non-human Transactions), a protocol that formalizes physical-AI agents as governed entities possessing typed identity, graduated capability rights, and an immutable civic record.Contributions
SINT contributes:- A formal
SintCapabilityTokenschema with a physical-constraints block, cryptographically bound to a W3C DID and a TEE attestation. - A twelve-state deterministic finite automaton governing the full agent authorization lifecycle, mapped to ROS 2 action primitives.
- A four-tier human oversight model with a provable max-escalation function driven by human-presence, environmental, novelty, and composite-safety signals.
- A STRIDE-extended threat model — STRIDE+B — whose seventh class formalizes behavioral non-determinism across foundation-model backends.
- A seven-benchmark evaluation framework with per-tier latency budgets and a 157-test conformance suite.
- Compliance mappings to IEC 62443, EU AI Act Article 13, and NIST AI RMF.
Core sections
Formal specification
The normative SintCapabilityToken schema, wire messages, and DFA state transitions.
Tier model
T0–T3 with the max-escalation function and Δ factors.
CSML
The Composite Safety-Model-Ledger score, calibrated against ROSClaw data.
Threat model
STRIDE+B with worked attack chains for UniPwn and MCP goal hijack.
Invariants
Safety, liveness, non-repudiation, tamper-evidence proofs.
Compliance
IEC 62443 / EU AI Act / NIST AI RMF mappings.
Download
Markdown
Raw source on GitHub.
Released alongside each protocol version tag.
BibTeX
For academic citation.