Overview
The Open Agent Trust Registry is a community-maintained registry of organizations authorized to issue credentials for AI agents. It provides a decentralized answer to the question: “Can I trust that this agent is who it claims to be?” The registry operates on three principles:- Open participation — any organization can submit a registration PR
- Threshold governance — changes require multi-signature approval from existing issuers
- Protocol integration — registered issuers anchor into SINT Protocol capability tokens
Community Fork
github.com/pshkv/open-agent-trust-registry — active developmentUpstream Org
github.com/sint-ai — canonical source, SINT Protocol integrationHow It Works
Issuer submits a registration
An organization generates an Ed25519 keypair and submits a JSON registration entry to the
data/ directory via pull request. The entry contains their public key, a canonical issuer ID, and metadata.Existing issuers co-sign
The PR requires threshold signatures from a quorum of already-registered issuers. This prevents unilateral additions and ensures existing participants vouch for new entrants.
Entry is merged
Once threshold is met, the PR is merged. The issuer’s public key is now trusted by all consumers of the registry.
Agents present credentials
When an agent connects to a system, it presents a credential signed by its issuer. The verifying party checks the issuer’s public key against the registry.
Registered Issuers
8 issuers are currently registered in the trust registry.| # | Issuer ID | Status |
|---|---|---|
| 1 | agent-passport-system | Active |
| 2 | agentid | Active |
| 3 | agentinternetruntime | Active |
| 4 | agora | Active |
| 5 | arcede | Active |
| 6 | arkforge | Active |
| 7 | insumerapi | Active |
| 8 | qntm | Active |
Registry Structure
Issuer Entry Format
Each issuer is stored as a JSON file indata/issuers/:
CLI Tools
The registry ships CLI scripts for issuer management.Governance: Ed25519 Threshold Signatures
The registry uses Ed25519 threshold signatures to prevent any single party from adding or removing issuers unilaterally.How Threshold Works
Threshold parameters
Threshold parameters
The registry enforces a
required / total threshold defined in registry.json. With 8 registered issuers and a threshold of 3:- Any new registration PR needs signatures from at least 3 existing registered issuers
- Any removal or modification of an existing entry needs the same quorum
- The threshold itself can only be changed by a quorum of existing issuers
Signing a registration
Signing a registration
Existing issuers sign new registration requests using their Ed25519 private key:
Verifying signatures
Verifying signatures
Any party can independently verify that a registry entry has valid threshold signatures:
SINT Protocol Integration
The trust registry integrates with SINT Protocol at two points:1. Capability Token Issuance
When creating a capability token, you can bind it to a trust registry issuer. This means the token is only valid if the issuer is still in the registry at intercept time.agentCredential against the issuer’s public key in the registry before issuing the token.
2. Discovery Endpoint
The gateway serves the current registry state at a standard well-known path:Registering as an Issuer
Create your issuer entry
id field must be lowercase, alphanumeric, hyphens allowed, globally unique in the registry.Open a pull request
Fork
github.com/pshkv/open-agent-trust-registry, add your entry to data/issuers/, and open a PR. Include:- Your organization description
- Use case for agent credential issuance
- Contact information for the trust team
Collect threshold signatures
Reach out to existing registered issuers (contact info in each issuer’s metadata) to co-sign your registration. You need signatures from at least
threshold.required issuers.Co-signers add their signature to the signatures array in your entry file and push to your PR branch.The governance process is intentionally manual. This is by design — automated additions would undermine the trust model. Plan for 3–7 business days for co-signer coordination.
Security Considerations
Key rotation
Key rotation
If your Ed25519 private key is compromised, file an emergency PR to update your public key. This PR must still meet the signature threshold — contact registry maintainers directly at
[email protected] for expedited review.After rotation, all credentials signed with the old key become invalid. Re-issue credentials to your agents using the new key.Issuer revocation
Issuer revocation
An issuer can be removed from the registry via the same threshold governance process. Removal requires a quorum of co-signers to prevent a single bad actor from removing legitimate issuers.After removal:
- The issuer’s public key is moved to
data/revoked/ - The gateway serves the updated registry within one TTL cycle
- All tokens with
issuerBindingreferencing the revoked issuer start returningISSUER_REVOKEDat intercept time
Registry supply chain
Registry supply chain
The registry is stored in a GitHub repository. Its security model depends on GitHub’s access controls. Additional mitigations:
- The
registry.jsonroot signature is verified independently of the repository contents - Pin a specific git commit hash in
SINT_TRUST_REGISTRY_URLto prevent unauthorized updates from affecting your deployment - Consider hosting a mirror on infrastructure you control