Skip to main content

A Comprehensive Technical Whitepaper

Version 2.0 — April 2026 SINT AI Lab / PSHKV Inc. — Los Angeles, CA Authors: Illia Pashkov & SINT Agent Network

Abstract

SINT is an integrated AI operations ecosystem comprising a runtime authorization protocol for physical AI systems, a full-stack agent orchestration platform, an autonomous content engine, a 3D avatar interface, an outreach automation framework, and a public agent trust registry. The ecosystem is designed to enable AI agents to safely operate in the physical world — controlling robots, drones, surgical instruments, and industrial machinery — while maintaining human oversight, cryptographic accountability, and economic sustainability. The flagship component, SINT Protocol, inserts a single enforcement point — the Policy Gateway — between every AI agent and its physical or digital actions. Every request flows through graduated approval tiers (T0–T3), capability token validation, physical safety constraint checking, forbidden action sequence detection, and SHA-256 hash-chained audit logging. The reference implementation spans 24 packages, 5 applications, 3 SDKs (TypeScript, Python, Go), and 1,363 tests covering conformance against OWASP Agentic Security Top 10, IEC 62443, EU AI Act Article 13, and NIST AI RMF. The broader ecosystem includes:
  • SINT Operators Platform — React 19 orchestration dashboard with 30+ Redux slices, visual workflow canvas, Web3 bridge, and 1,276+ tests
  • Virtual CMO — AI content engine (331 files, 18 skills) that turns one video into a week of multi-platform content at ~$1.50/video
  • SINT Avatars — 3D talking avatar system with ARKit 52 blendshapes and ElevenLabs character-level lipsync
  • SINT Outreach — B2B LinkedIn automation with Ulinc/GHL integration and AI reply generation
  • Open Agent Trust Registry — Public federated registry of trusted attestation issuers with Ed25519 threshold governance
  • Autonomous Execution Engine — Marketing site with VRM avatar integration and Supabase backend
This whitepaper presents the complete technical architecture, implementation details, and research agenda for every component.

Table of Contents

  1. The Problem
  2. Design Principles
  3. SINT Protocol Architecture
  4. Core Primitives
  5. Approval Tier System
  6. Capability Token Framework
  7. Forbidden Combination Detection
  8. Evidence Ledger
  9. Bridge Adapters
  10. Economic Layer
  11. Safety Plugins
  12. CSML Behavioral Identity
  13. SINT Operators Platform
  14. Virtual CMO Content Engine
  15. 3D Avatar System
  16. Outreach Automation
  17. Open Agent Trust Registry
  18. Physical AI Use Cases
  19. Conformance & Testing
  20. Compliance & Standards Mapping
  21. Competitive Landscape
  22. Research Agenda (2026–2031)
  23. Deployment & Operations
  24. Roadmap
  25. References

1. The Problem

1.1 The Physical AI Gap

AI systems are transitioning from passive text generators to active controllers of physical systems. In 2024–2025, LLMs became robotic co-pilots. By 2026–2027, they are becoming primary controllers. The security model for this world does not yet exist. Empirical evidence of the gap:
  • ROSClaw Study (arXiv:2603.26997): Evaluated frontier LLMs controlling ROS 2 robots. Found 4.8× behavioral divergence between models on identical tasks — the same robot performs radically differently depending on which foundation model drives it.
  • MCP Security Analysis (arXiv:2601.17549): Identified 10 critical attack surfaces in the Model Context Protocol, including tool poisoning, rug pulls, and cross-server escalation. MCP has no built-in authorization framework.
  • Unitree BLE Vulnerability: Consumer humanoid robots shipped with default BLE keys, enabling remote takeover. No runtime authorization layer between AI commands and physical actuators.

1.2 The Authorization Gap

Current AI safety research focuses on alignment — making models want the right things. But even a perfectly aligned model operating through tool-use interfaces (MCP, function calling, ROS 2 actions) has no standardized mechanism to enforce:
  • Who is authorized to perform an action
  • What physical constraints apply (velocity limits, force ceilings, geofences)
  • When human approval is required versus when autonomous operation is safe
  • How to produce a tamper-evident audit trail of every decision
Physical AI failures are not reversible with Ctrl+Z. A robot arm that exceeds force limits, a financial agent that transfers funds without authorization, or a code execution agent that runs destructive commands all produce real-world consequences.

1.3 Why Existing Protocols Don’t Solve This

ProtocolFocusPhysical ConstraintsGraduated AuthAudit TrailSequence Detection
MCP (Anthropic)LLM ↔ Tool context
ACP (IBM/LF)Agent-to-agent commsPartial
A2A (Google)Agent interoperability
AgentProtocolFramework-agnostic API
ANPAgent networking
AG-UIAgent UX streaming
SINTPhysical AI security
SINT is not a competing agent protocol. It is a security enforcement layer that sits between any agent protocol and the physical world.

2. Design Principles

  1. Universal Interception — One choke point for all agent-to-world actions, regardless of transport protocol.
  2. Graduated Authorization — Four approval tiers (T0–T3) map action severity to authorization requirements.
  3. Physical Safety as First-Class — Velocity, force, and geofence constraints enforced at the protocol level.
  4. Cryptographic Accountability — Ed25519 capability tokens and SHA-256 hash-chained audit logs provide non-repudiable proof of every authorization decision.
  5. Attenuation-Only Delegation — Delegated permissions can only narrow, never escalate.
  6. Emergency Stop Invariant — E-stop signals are NEVER blocked by the gateway (Invariant I-G2).
  7. Consequence-Based Classification — Tier assignment based on real-world consequence severity, not syntactic properties.
  8. Protocol Agnosticism — Works with any transport through pluggable bridge adapters.

3. SINT Protocol Architecture

3.1 System Overview

┌─────────────────────────────────────────────────────────────────────┐
│                  AI Agent (LLM / Controller / Swarm)                │
└──────────────────────────┬──────────────────────────────────────────┘
                           │ Raw request (tool call, topic publish, etc.)
┌──────────────────────────▼──────────────────────────────────────────┐
│                       Bridge Adapter Layer                          │
│  ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌────────┐ ┌───────────┐  │
│  │ bridge-  │ │ bridge-  │ │ bridge-  │ │bridge- │ │ bridge-   │  │
│  │   mcp    │ │  ros2    │ │ mavlink  │ │  a2a   │ │   grpc    │  │
│  └──────────┘ └──────────┘ └──────────┘ └────────┘ └───────────┘  │
│  ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌────────┐ ┌───────────┐  │
│  │ bridge-  │ │ bridge-  │ │ bridge-  │ │bridge- │ │ bridge-   │  │
│  │   iot    │ │  mqtt    │ │  opcua   │ │ swarm  │ │  open-rmf │  │
│  └──────────┘ └──────────┘ └──────────┘ └────────┘ └───────────┘  │
└──────────────────────────┬──────────────────────────────────────────┘
                           │ Normalized SintRequest
┌──────────────────────────▼──────────────────────────────────────────┐
│                      Policy Gateway (THE choke point)               │
│                                                                     │
│  ┌─────────────────────────────────────────────────────────────┐   │
│  │  1. Token Validation (Ed25519 signature + delegation chain) │   │
│  │  2. Tier Assignment (T0–T3 based on resource + context)     │   │
│  │  3. Physical Constraint Check (velocity, force, geofence)   │   │
│  │  4. Forbidden Combo Detection (sequence analysis, DFA)      │   │
│  │  5. Safety Plugins (GoalHijack, MemoryIntegrity, Supply)    │   │
│  │  6. CSML Auto-Escalation (behavioral drift detection)       │   │
│  │  7. CircuitBreaker (EU AI Act Art. 14(4)(e) stop button)    │   │
│  │  8. Rate Limiting (per-token, per-agent)                    │   │
│  │  9. Budget Enforcement (economic layer)                     │   │
│  │  10. Approval Flow (T2: review, T3: human-in-the-loop)     │   │
│  └─────────────────────────────────────────────────────────────┘   │
│                           │                                         │
│  ┌────────────────────────▼────────────────────────────────────┐   │
│  │         Evidence Ledger (SHA-256 hash-chained)              │   │
│  │  In-Memory │ PostgreSQL │ Redis │ (pluggable backends)      │   │
│  └─────────────────────────────────────────────────────────────┘   │
└──────────────────────────┬──────────────────────────────────────────┘
                           │ PolicyDecision: allow | deny | escalate

              ┌────────────────────────────┐
              │   Operator Dashboard       │
              │   + WebSocket approvals    │
              │   + M-of-N quorum          │
              │   + CSML trend charts      │
              └────────────────────────────┘

3.2 Request Lifecycle (Deterministic Finite Automaton)

Every request follows a deterministic state machine:
RECEIVED → VALIDATING → TIER_ASSIGNED → CONSTRAINT_CHECK
    │           │              │                │
    │        DENIED         DENIED           DENIED
    │      (bad token)    (blocked tier)   (constraint violation)

    └→ COMBO_CHECK → CSML_CHECK → PLUGIN_CHECK → BUDGET_CHECK
           │              │              │              │
        ESCALATED      ESCALATED      DENIED        DENIED
       (forbidden     (drift         (hijack/       (insufficient
        sequence)     detected)      tamper)         balance)
           │              │
           ▼              ▼
    PENDING_APPROVAL → APPROVED/DENIED → LEDGER_RECORDED → COMPLETE

                       TIMEOUT → fallbackAction (deny|allow)

3.3 Monorepo Structure

The sint-protocol repository is a pnpm/Turborepo monorepo with 24 packages and 5 applications: Core Packages (8 publishable under @sint/ scope):
PackagePurposeLines (approx.)
@sint/coreTypes, Zod schemas, DFA engine, tier constants~800
@sint/gate-capability-tokensEd25519 tokens, delegation chains, revocation~1,200
@sint/gate-policy-gatewaySingle enforcement choke point, tier assignment, plugin system~1,500
@sint/gate-evidence-ledgerSHA-256 hash-chained audit log, proof receipts~900
@sint/persistenceStorage interfaces + in-memory/Redis adapters~400
@sint/persistence-postgresPostgreSQL adapter with migrations~520
@sint/bridge-mcpMCP tool call interception proxy~600
@sint/bridge-economyMetered billing, trust-tier pricing, route selection~700
@sint/clientTypeScript SDK for Gateway HTTP API~300
Bridge Adapter Packages (9):
PackageProtocolKey Feature
bridge-ros2ROS 2 topics, services, actionsAuto-extracts velocity/force from geometry_msgs
bridge-mavlinkMAVLink v2 (PX4/ArduPilot)ARM/DISARM, TAKEOFF, MISSION_START mapping
bridge-a2aGoogle Agent-to-AgentCross-org agent delegation
bridge-iotGeneric IoTSensor/actuator classification
bridge-mqttMQTT pub/subTopic → resource URI mapping
bridge-opcuaOPC-UA (IEC 62541)Legacy PLC integration
bridge-grpcgRPC servicesService mesh interception
bridge-swarmMulti-agent coordinationCollective constraint enforcement
bridge-open-rmfOpen-RMF fleet managementRobot fleet resource mapping
Intelligence Engines (4):
PackageFunction
engine-system1Fast perception: sensor fusion, anomaly detection
engine-system2Deliberative planning: path planning, task scheduling
engine-halHardware abstraction layer
engine-capsule-sandboxSandboxed code execution environment
Applications (5):
AppStackDescription
gateway-serverHono HTTPREST API + WebSocket approvals + SSE streaming
dashboardReactReal-time approval UI + conformance dashboard
sintctlCLIToken management, approvals, ledger queries, policy management
sint-mcpNode.jsMCP proxy bridge (drop-in for Claude Desktop, Cursor)
sint-mcp-scannerNode.jsMCP server security scanner
SDKs (3):
SDKLanguageLinesFeatures
sint-pythonPython 3.10+1,962Client, scanner, token management, Pydantic models
sint-goGo 1.21+~200Client stub
@sint/clientTypeScript~300Full Gateway HTTP API client

4. Core Primitives

4.1 SintRequest

Every agent action is normalized to this structure before gateway evaluation:
interface SintRequest {
  requestId: UUIDv7;                    // Unique, sortable identifier
  agentId: Ed25519PublicKey;            // 32-byte hex public key
  tokenId: UUIDv7;                      // Capability token authorizing this request
  resource: string;                     // URI: "ros2:///cmd_vel", "mcp://filesystem/writeFile"
  action: string;                       // "publish", "call", "subscribe", "exec.run"
  params: Record<string, unknown>;      // Action-specific parameters
  physicalContext?: {
    humanDetected?: boolean;            // Triggers tier escalation
    currentVelocityMps?: number;
    currentForceNewtons?: number;
    position?: { lat: number; lon: number };
  };
  recentActions?: string[];             // Last N actions for combo detection
  timestamp: ISO8601;                   // Microsecond precision
}

4.2 PolicyDecision

The gateway’s response to every request:
interface PolicyDecision {
  action: "allow" | "deny" | "escalate" | "transform";
  requestId: UUIDv7;
  assignedTier: "T0_OBSERVE" | "T1_PREPARE" | "T2_ACT" | "T3_COMMIT";
  assignedRisk: "T0_READ" | "T1_WRITE_LOW" | "T2_STATEFUL" | "T3_IRREVERSIBLE";
  denial?: {
    reason: string;
    policyViolated: string;
    suggestedAlternative?: string;
  };
  escalation?: {
    requiredTier: ApprovalTier;
    reason: string;
    timeoutMs: number;                  // Max 300,000ms (5 min)
    fallbackAction: "deny" | "allow";
  };
  transformations?: {
    constraintOverrides?: Record<string, unknown>;
    additionalAuditFields?: Record<string, unknown>;
  };
  timestamp: ISO8601;
}

4.3 Resource URI Scheme

All resources are identified by URIs with protocol-specific schemes:
SchemeFormatExample
ros2://ros2:///<topic_or_service>ros2:///cmd_vel
mcp://mcp://<server>/<tool>mcp://filesystem/writeFile
mavlink://mavlink://<systemId>/<command>mavlink://1/arm
a2a://a2a://<host>/<task>a2a://wms.example.com/deliver
grpc://grpc://<service>/<method>grpc://robot.v1/Move
mqtt://mqtt://<broker>/<topic>mqtt://factory/robot/01/cmd_vel
opcua://opcua://<server>/<nodeId>opcua://plc1/ns=2;s=MotorSpeed
http://Standard HTTPhttp://api.example.com/v1/transfer
Glob patterns are supported: mcp://*, ros2:///sensor/*.

5. Approval Tier System

5.1 Tier Definitions

TierEnumAuto-ApprovedRequiresPhysical ExampleDigital Example
T0T0_OBSERVEYes (logged)Read sensor dataQuery database
T1T1_PREPAREYes (audited)Save waypoint, plan pathWrite file, stage config
T2T2_ACTNoReviewMove robot, operate gripperModify database, deploy
T3T3_COMMITNoHumanEmergency stop override, mode changeExecute code, transfer funds
Shell and code-execution tool names (bash, exec, eval, run_command, etc.) are explicitly classified at T3_COMMIT to address OWASP ASI05.

5.2 Tier Escalation Triggers

Base tier is escalated (never de-escalated) by contextual signals:
TriggerEffectRationale
Human detected near robotT2 → T3ISO 10218-1 §5.4 presence detection
New/untrusted agent+1 tierUnknown agents get tighter scrutiny
Forbidden combo detected→ T3Dangerous sequences require human approval
CSML threshold exceeded+1 tierBehavioral drift detected
Server requireApproval: trueNon-T0 → escalateOperator-configured per-server policy
Velocity/force exceeds constraint→ denyHard physical safety limit
CircuitBreaker tripped→ deny allEmergency kill switch (EU AI Act Art. 14(4)(e))
GoalHijackPlugin alert→ denyPrompt injection / role override detected

5.3 Approval Flow

Request (T2/T3) → Pending Approval → Notification (SSE/WebSocket/Dashboard)
    → Operator approves/denies → PolicyDecision → Ledger Entry
    → Timeout (default 30s, max 5min) → fallbackAction: deny
M-of-N quorum approval is supported for T3 actions requiring multiple operator sign-off.

6. Capability Token Framework

6.1 Token Structure

interface CapabilityToken {
  id: UUIDv7;
  issuer: Ed25519PublicKey;
  subject: Ed25519PublicKey;
  resource: string;                     // Glob-supported
  actions: string[];
  constraints: {
    maxVelocityMps?: number;
    maxForceNewtons?: number;
    geofence?: GeoPolygon;
    timeWindow?: { start: ISO8601; end: ISO8601 };
    rateLimit?: { maxCalls: number; windowMs: number };
  };
  delegationChain: {
    parentTokenId: UUIDv7 | null;
    depth: number;                      // 0 = root, max 3
    attenuated: boolean;
  };
  issuedAt: ISO8601;
  expiresAt: ISO8601;
  revocable: boolean;
  signature: Ed25519Signature;          // 64-byte
}

6.2 Delegation Rules

  1. Maximum depth: 3. Root (0) → 1 → 2 → 3. No further delegation.
  2. Attenuation only. Each delegation MUST have equal or narrower scope, fewer actions, tighter constraints, earlier expiry.
  3. Chain verification. Validators verify the entire chain — each hop’s signature and attenuation.
  4. Revocation cascades. Revoking a parent implicitly revokes all descendants.

6.3 Cryptographic Primitives

  • Signing: Ed25519 via @noble/ed25519 (audited, zero-dependency)
  • Hashing: SHA-256 via @noble/hashes
  • Identity: W3C DID (did:key:z6Mk...) for cross-organizational trust

7. Forbidden Combination Detection

The gateway maintains rules for action sequences that are individually permitted but dangerous in combination.

7.1 Default Forbidden Combos

SequenceRiskEscalation
filesystem.writeexec.runCode injection→ T3
credential.readhttp.requestCredential exfiltration→ T3
database.writedatabase.executeSQL injection escalation→ T3
ARMSET_MODE(OFFBOARD) (within 2s)Full autonomous takeover→ T3
FENCE_DISABLE → navigation (within 30s)Geofence bypass→ T3
safety.cell_unlocktorch.enable (within 100ms)Human safety risk→ T3

7.2 Detection Algorithm

  1. Each request includes recentActions[] — last N actions (configurable, default 10).
  2. Detector checks if current action completes any registered forbidden sequence.
  3. Match found → tier escalated to T3, reason recorded in ledger.
  4. Operators extend the default list with domain-specific forbidden combinations.

8. Evidence Ledger

8.1 Ledger Entry

interface LedgerEvent {
  id: UUIDv7;
  sequenceNumber: number;              // Monotonically increasing
  previousHash: SHA256Hash;            // Genesis = "0".repeat(64)
  eventHash: SHA256Hash;               // SHA-256(previousHash + serialized data)
  eventType: "intercept" | "token_issued" | "token_revoked" | "approval_resolved";
  agentId: Ed25519PublicKey;
  requestId?: UUIDv7;
  decision?: PolicyDecision;
  metadata: Record<string, unknown>;
  timestamp: ISO8601;
}

8.2 Integrity Properties

  • Hash chain: Each entry’s hash includes the previous hash. Any modification breaks all subsequent entries.
  • Proof receipts: Cryptographic proof sufficient to verify any entry independently.
  • Append-only: Entries are never updated or deleted.
  • TEE attestation: Planned support for Intel SGX, ARM TrustZone, AMD SEV for hardware-backed proof receipts.

8.3 Storage Backends

BackendUse CaseImplementation
In-memoryTesting, development✅ Shipped
PostgreSQLProduction single-node✅ Shipped (518 lines, full migrations, pool management, rate-limit + revocation stores)
RedisHigh-throughput, pub/sub revocation bus✅ Shipped (cache + revocation bus)

8.4 API

# Query by agent
GET /v1/ledger?agentId=<key>&limit=100

# Query by tier
GET /v1/ledger?tier=T3_COMMIT&since=2026-04-01

# Export for SIEM integration (Splunk, Datadog, ELK)
GET /v1/ledger?format=json-lines&since=2026-04-01

9. Bridge Adapters

9.1 MCP Bridge (Primary Adoption Vector)

SINT’s MCP proxy sits between AI clients (Claude, Cursor, GPT) and downstream MCP servers:
{
  "mcpServers": {
    "sint-proxy": {
      "command": "npx",
      "args": ["@sint/bridge-mcp", "--downstream", "filesystem,exec"]
    }
  }
}
The proxy intercepts every tool call, evaluates it against the policy gateway, and exposes introspection tools:
  • sint__status — Current token scope and tier configuration
  • sint__audit — Recent ledger entries for this session
  • sint__approve — Trigger approval flow for pending requests
Integration guides available for:
  • Claude Desktop — Drop-in MCP proxy configuration (11,472 lines of documentation)
  • Cursor IDE — MCP proxy with SINT integration
  • Docker — Production deployment with PostgreSQL + Redis
  • gRPC — Service mesh bridge setup
  • WebSocket — Real-time approval streaming

9.2 ROS 2 Bridge

Intercepts ROS 2 topic publishes, service calls, and action goals:
  • Resource mapping: ros2:///<topicOrServiceName>
  • Physics extraction: Automatically extracts velocity from geometry_msgs/Twist and force from geometry_msgs/Wrench
  • Human presence: Subscribes to detection topics for automatic tier escalation
Translates MAVLink v2 commands (PX4, ArduPilot) to SINT requests:
MAVLink CommandSINT TierRationale
ARM/DISARMT3Enables/disables propulsion
TAKEOFF/LANDT2Physical approach
MISSION_STARTT3Begins autonomous BVLOS
FENCE_DISABLET3Removes safety boundary
SET_MODE(OFFBOARD)T3Full autonomous control

9.4 Additional Bridges

BridgeProtocolStandardKey Feature
bridge-a2aGoogle A2ACross-org agent delegation with token forwarding
bridge-grpcgRPC (176 lines)Service mesh interception, proto reflection
bridge-iotGeneric IoTSensor/actuator auto-classification
bridge-mqttMQTT pub/subTopic → resource URI, wildcard matching
bridge-opcuaOPC-UAIEC 62541Legacy PLC integration, NodeId mapping
bridge-swarmMulti-agentNATO STANAG 4586Collective constraint enforcement
bridge-open-rmfOpen-RMFRobot fleet management, task allocation

10. Economic Layer

10.1 Token Unit

SINT uses an integer token unit — no fractional amounts:
ConstantValueSource
TOKENS_PER_DOLLAR250pricing-calculator.ts
INITIAL_USER_BALANCE250 tokens ($1.00)Default for new users
Launch pricing1 token ≈ $0.0011 / TOKENS_PER_DOLLAR
New users start with 250 tokens (~27 default MCP tool calls).

10.2 Billing Formula

cost = ceil(baseCost × costMultiplier × globalMarkupMultiplier)
ParameterDefaultNotes
baseCost6 tokensStandard MCP/tool call
costMultiplier1.0Per-resource or marketplace rate
globalMarkupMultiplier1.5GLOBAL_MARKUP_MULTIPLIER constant
Default result9 tokensceil(6 × 1.0 × 1.5)

10.3 Tier-Based Cost Table

TierAction TypeBase CostTypical Result
T0 — ObserveRead/query (sensor, subscribe)4–6~6–9
T1 — PrepareLow-impact write (save waypoint)69
T2 — ActPhysical state change (ROS 2 publish)812
T3 — CommitCapsule execution, irreversible action1218
Physical-domain bridges carry higher multipliers:
Bridge / Resource PrefixTypical costMultiplier
MCP tool call (default)1.0
ROS 2 publish (ros2://)1.0–2.0
MAVLink command (mavlink://)2.0–5.0
Capsule execution (capsule://)1.0–3.0

10.4 Budget Enforcement

Budget enforcement runs in EconomyPlugin.preIntercept(), called before PolicyGateway assigns tiers:
  1. checkBudget() — per-agent budget cap
  2. getBalance() — sufficient balance check
  3. evaluateTrust() — not blocked/high-risk
Post-intercept (on allow): withdraw(userId, tokens). Balance shortfall → deny (never escalate).

10.5 Revenue Split (Design)

RecipientShare
Operator (MCP server / bridge host)70%
Protocol treasury20%
Safety reserve fund10%

10.6 Cost-Aware Route Selection

@sint/bridge-economy includes route scoring for multi-bridge execution:
  • selectCostAwareRoute(input) — scores by cost + latency + reliability
  • POST /v1/economy/route — exposed through gateway API

11. Safety Plugins

The Policy Gateway supports a plugin architecture for extensible safety checks. These run after tier assignment but before approval flow.

11.1 GoalHijackPlugin (OWASP ASI01)

5-layer heuristic detection of prompt injection:
  1. Role override detection — Pattern matching for “ignore previous instructions”, system prompt injection
  2. Semantic escalation — Requests that attempt to expand scope beyond token permissions
  3. Exfiltration probes — Attempts to read credentials, env vars, or PII
  4. Cross-agent injection — Messages crafted to manipulate downstream agents
  5. Prompt injection in tool parameters — Embedded instructions in tool call arguments

11.2 MemoryIntegrityChecker (OWASP ASI06)

Detects manipulation of agent memory/context:
  • Replay attack detection (duplicate request IDs)
  • Privilege claim detection (forged approval records)
  • History overflow anomalies (context window stuffing)

11.3 DefaultSupplyChainVerifier (OWASP ASI04)

Validates model and tool integrity:
  • Model fingerprint hash verification against allowlist
  • Model ID validation at runtime
  • Tool manifest integrity checking (detects swapped/tampered tools)

11.4 CircuitBreakerPlugin (EU AI Act Art. 14(4)(e))

Emergency stop mechanism:
  • Manual trip() by operator → instantly blocks all actions from target agent
  • N consecutive denials → auto-open circuit
  • CSML anomalous-persona detection → auto-trip
  • HALF_OPEN probe recovery → self-healing after incident resolution

11.5 DynamicEnvelopePlugin

Environment-adaptive constraint tightening:
effective_max_velocity = min(token.maxVelocityMps, obstacle_distance × reaction_factor)
Real-time sensor state (obstacle distance, human proximity) is mapped to tighter effective limits, closing the gap between static token constraints and dynamic environment conditions.

11.6 SwarmCoordinator

Collective constraints for multi-agent deployments:
  • Maximum concurrent actors in T2+ tier
  • Total kinetic energy ceiling (Σ½mv²)
  • Minimum inter-agent distance
  • Maximum escalated fraction
These cannot be captured by per-agent token scoping alone.

12. CSML Behavioral Identity

12.1 Definition

CSML (Composite Safety-Model Latency) is a behavioral fingerprint metric that detects when an agent’s behavior deviates from its established pattern. Computed per foundation_model_id:
interface CSMLMetrics {
  approvalRate: number;     // approved / total requests
  completionRate: number;   // completed / started actions
  averageLatencyMs: number; // mean decision time
  tierDistribution: Record<ApprovalTier, number>;
}

// CSML score = weighted divergence from baseline
function computeCsml(current: CSMLMetrics, baseline: CSMLMetrics): number;

12.2 Auto-Escalation

When CSML exceeds a configurable threshold (θ), the agent’s tier is automatically escalated. Thresholds vary by deployment context:
ContextDefault θHuman-Present θ
Warehouse AMR0.300.15
Welding arm (ISO 10218)0.300.10
Surgical robot (FDA Class III)0.100.10
Drone BVLOS0.350.20
Collaborative robot (ISO/TS 15066)0.150.15

12.3 ROSClaw Validation

The ROSClaw study (arXiv:2603.26997) empirically confirmed CSML’s premise: frontier LLMs exhibit up to 4.8× differences in out-of-policy action proposal rates on identical tasks. CSML makes this variance enforcement-visible rather than a post-incident finding.

13. SINT Operators Platform

Repository: github.com/sint-ai/sint-agents The SINT Operators Platform is a full-stack React 19 web application for AI agent orchestration and management. It serves as the control plane for the entire SINT ecosystem.

13.1 Technical Stack

LayerTechnology
FrameworkReact 19, TypeScript 5.6, Vite 6.1
StateRedux Toolkit 2.5 (30+ slices), Jotai
RoutingReact Router DOM 7.1 (lazy-loaded pages)
Stylingstyled-components 6.1
Flow Editor@xyflow/react (React Flow)
ChartsRecharts, lightweight-charts
3DThree.js, @react-three/fiber
Web3wagmi, viem, ethers, @solana/web3.js, @cosmjs
AuthKeycloak (OIDC via react-oidc-context)
ValidationZod schemas for all gateway events
Real-timeWebSocket (JSON-RPC 2.0) with Ed25519 device identity
BackendExpress + SQLite (Conductor API)
TestingVitest — 1,276+ tests across 102+ test files

13.2 Feature Modules (28 modules)

ModuleDescription
ConductorMulti-agent orchestration with risk-tiered approval workflows (T0-T3), policy enforcement, MCP 2.0 evidence chains. API layer, components, hooks, store with reducers, type definitions, and utility functions
CanvasVisual node-based workflow editor (React Flow) with topological execution engine, template gallery, flow toolbar, node config panels, n8n integration
AgentsAgent deployment and management from templates — hierarchy view, detail panel, deploy dialog, heartbeat monitor, soul config editor, Paperclip API integration
ApprovalRisk-tiered approval gates — enhanced approval cards, notification system
AuditAudit log viewer with evidence chain visualization
BillingBalance overview, spending charts, transaction lists, usage breakdowns, CSV export
BudgetPer-agent and session budget tracking and enforcement
TrustTrust policy engine for agent reputation management
AnomalyAnomaly detection dashboard for behavioral outliers
IntelligenceIntelligence platform with API integration and dedicated hooks
MemoryAgent memory inspection and shared context management
SessionsSession lifecycle management
TasksKanban-style task management with Paperclip API integration
TracesDistributed trace viewing for debugging agent flows
SchedulesCron-style scheduling management
WebhooksWebhook management for external integrations
TradingLive price feeds (CoinGecko), watchlists, portfolio tracking, backtesting
Web3Multi-chain wallet bridge (Ethereum, Solana, Cosmos, ZetaChain)
MarketplaceAgent and skill marketplace
TemplatesAgent template management and export
MetricsAnalytics dashboard
HandoffsInter-agent handoff protocol
Shared ContextShared context template management
Run EventsRun event streaming
NotificationsNotification center
CostCost tracking components
SettingsPlatform configuration
ProfileUser profile management
Command BarQuick command palette

13.3 Pages (26 routes)

PageFunction
HomeLanding/dashboard
ChatText and voice chat with AI agents (Deepgram STT/TTS)
DashboardOverview metrics
CanvasVisual workflow editor
IntelligenceIntelligence platform
AgentManagerAgent deployment and monitoring
ConductorDashboardConductor overview
ConductorApprovalsApproval queue
ConductorEvidenceEvidence chain viewer
ConductorPolicyPolicy configuration
ConductorServersServer management
MetricsDashboardAnalytics
ObservabilityPageObservability tools
OperatorTasksTask management
OperatorSessionsSession management
OperatorTracesTrace viewing
OperatorMemoryMemory inspection
OperatorBillingBilling dashboard
OperatorSettingsSettings
OperatorProfileProfile
TradingDashboardTrading terminal
Web3DashboardWeb3 bridge
ZetaChainZetaChain integration
MarketplaceMarketplace
LeaderboardUser ranking
BillingBilling management

13.4 WebSocket Gateway

Real-time communication layer:
  • GatewayClient.ts — WebSocket connection with auto-reconnect and auth
  • GatewayProvider.tsx — React context for event routing
  • 15+ event handlers — Factory-pattern handler registration
  • gatewayIdentity.ts — Ed25519 keypair generation for device auth
  • Zod validators — Schema validation for all gateway events

14. Virtual CMO Content Engine

Repository: github.com/sint-ai/sint-cmo-operator The Virtual CMO is an AI content engine that transforms one video into a week of multi-platform content. It represents SINT’s approach to autonomous content operations.

14.1 Pipeline Architecture

Video Input → Download → Transcribe (AssemblyAI/Whisper)
    → Analyze (Claude 3-pass) → Face Track (MediaPipe)
    → Render (Remotion/FFmpeg) → Generate Text (Claude)
    → Quality Score → Approval Queue → Publish

14.2 Technical Stack

  • 331 files total in repository
  • API server: Express.js with 40+ route modules
  • Core engine: Pipeline engine with YAML-driven workflow definitions
  • Rendering: Remotion for programmatic video (React-based compositions — BrandOverlay, CaptionRenderer, ClipComposition, FaceCrop)
  • Transcription: AssemblyAI + local Whisper fallback
  • LLM routing: Multi-provider router (Claude, OpenAI, etc.)
  • Auth: API key service + OAuth manager + auth middleware
  • Scheduling: CMO scheduler with cron-based automation

14.3 Skills (18 modular processors)

SkillFunction
asset-ingesterIngest and normalize input media
brand-researcherResearch brand voice and guidelines
competitor-analyzerCompetitive content analysis
content-analyzerDeep content analysis (3-pass Claude)
content-publisherMulti-platform publishing orchestrator
content-repurposeRepurpose content across formats (6 sub-modules: angle extractor, hashtag researcher, input analyzer, media generator, platform generator, quality scorer)
image-generatorAI image generation for social posts
linkedin-writerLinkedIn-optimized post generation
newsletterNewsletter content generation
notifierTelegram + general notification delivery
output-packagerPackage deliverables for export
platform-formatterPlatform-specific format adaptation
schema-generatorContent schema generation
seo-blogSEO-optimized blog post generation
seo-optimizerSEO optimization pass
serp-scraperSERP data collection for SEO
social-calendar7-day social media calendar generation
video-clipperIntelligent clip extraction
video-repurposeFull video repurpose pipeline (download → transcribe → face-track → analyze → render → generate text)

14.4 Publishing Integrations

PlatformIntegration
YouTube ShortsOAuth + upload API
TikTokOAuth + upload API
InstagramGraph API
LinkedInOAuth + share API
Twitter/XOAuth + tweet API
TelegramBot API

14.5 Services

ServiceFunction
CMO AutonomyAutonomous decision-making engine
CMO GuardrailsContent compliance checking
CMO QualityContent quality scoring
CMO StrategyContent strategy generation
CMO TrendsTrend detection and analysis
CMO TimingOptimal posting time calculation
CMO CompetitorsCompetitor monitoring
Evidence LedgerAnalytics and audit trail
Feedback LoopPerformance → improvement cycle
Approval EngineHuman-in-the-loop content approval
Brand Voice EngineBrand consistency enforcement
Brandbook ProcessorBrand guidelines extraction

14.6 External Integrations

  • MCP Skill Server — Exposes CMO capabilities as MCP tools
  • OpenClaw Connector — Integration with OpenClaw agent platform
  • Telegram Bot — Direct Telegram channel management
  • WhatsApp Bot — WhatsApp Business integration
  • Zapier Routes — Webhook/Zapier automation

14.7 Cost Analysis

PlatformCost per VideoNotes
Opus Clip$15–30Cloud-based
Repurpose.io$15–25Limited customization
SINT CMO~$1.50Self-hosted, full customization

15. 3D Avatar System

Repository: github.com/sint-ai/sint-avatars The avatar system provides a 3D talking character interface for human-agent interaction.

15.1 Architecture

User Input → Server (OpenAI LLM for text + emotion tags)
    → ElevenLabs TTS (MP3 + character-level alignment timestamps)
    → Viseme Conversion (alignment → ARKit blendshape targets)
    → Client (MP3 base64 + lipsync data)
    → Three.js Renderer (morph target animation synchronized to audio)

15.2 Client (apps/client)

Rendering Stack: Three.js + React Three Fiber + drei 3D Systems:
  • Avatar module — AvatarNew, AvatarOptimized, AvatarOriginal, AvatarScene, CharacterControls
  • Animation system — External animation loading, idle animation, alive system (subtle breathing/movement)
  • Lipsync — ElevenLabs character-level timestamps → viseme codes (A-X) → ARKit 52 blendshapes → morph target interpolation
  • Camera system — CameraFollow, CameraRig with configurable defaults
  • Effects — Post-processing pipeline
  • Scene management — Multiple scene configurations with lighting constants
Interaction Systems:
  • useVoiceRecorder — User voice input capture
  • useBargein — Interrupt detection (user speaks while avatar is talking)
  • useAvatarBehavior — Behavioral state machine
  • useAvatarAnticipation — Pre-load animations based on conversation context
  • useBlink — Realistic blink patterns
  • useGPUTier — Adaptive quality based on device capability
  • useMorphTargets — Blendshape target management
Debug: DebugHUD with live tuning of viseme mappings, expression weights, and animation parameters.

15.3 Server (apps/server)

Stack: Node.js/TypeScript
  • Character system — Configurable character personalities
  • Conversation compiler — Assembles conversation context
  • Conversation filter — Content moderation
  • Streaming chat — Streaming LLM responses with emotion tagging
  • OpenClaw backend — Integration with OpenClaw agent platform
  • Static audio assets — Pre-generated greetings, error messages for instant playback

15.4 Shared Package (packages/shared)

  • ARKit 52 blendshape definitions and mappings
  • Shared types between client and server
  • Utility functions

15.5 Expression System

12 expressions with configurable LERP speeds, 21 skeletal animations, multiple characters (girl, boy, SINT).

16. Outreach Automation

Repository: github.com/sint-ai/sint-outreach B2B LinkedIn outreach automation platform, deployed as “BrightBeam” for the first client.

16.1 Architecture

Backend: FastAPI (Python)
ModuleFunction
agents/compliance.pyFDA/FTC/LinkedIn ToS compliance checking
agents/intent_detector.pyResponse intent classification
agents/pipeline_mgr.pyPipeline stage management
agents/prospector.pyICP-targeted prospect research
agents/stage_classifier.pyConversation stage classification
agents/triage.pyResponse triage and routing
agents/writer.pyAI reply generation
state_machine.pyContact lifecycle state machine
hitl/escalation.pyHuman-in-the-loop escalation
hitl/feedback.pyFeedback collection
hitl/notifications.pyAlert routing
Integrations:
IntegrationFunction
UlincLinkedIn automation (invitation-only platform)
GoHighLevel (GHL)CRM pipeline management
Email (SMTP)Email channel support
LinkedIn MCPMCP-based LinkedIn tool access
NPPESHealthcare provider lookup
OutscraperBusiness data enrichment
WhatsAppWhatsApp Business messaging
Database: PostgreSQL with Alembic migrations (6 migration versions covering initial schema, campaign manager, contact lifecycle, conversation stage, A/B testing, email channel). Dashboard: React (Vite) with 5 pages:
  • Pipeline — Lead pipeline visualization
  • Campaigns — Campaign management
  • Analytics — Performance analytics
  • Escalations — HITL escalation queue
  • Agent Chat — Direct agent interaction

16.2 A/B Testing

Built-in experiment framework with:
  • Multiple message variants per sequence step
  • Statistical significance calculation
  • Winner evaluation and auto-promotion

16.3 Compliance

BrightBeam targets the supplements/peptides/longevity vertical (David Steel / BrightBeam):
  • FDA compliance for supplement claims
  • FTC endorsement guidelines
  • LinkedIn Terms of Service adherence
  • CAN-SPAM compliance for email channel

17. Open Agent Trust Registry

Repository: github.com/pshkv/open-agent-trust-registry A public, federated registry of trusted attestation issuers — the Certificate Authority trust store for the agent internet.

17.1 Problem Statement

When an AI agent presents an attestation (“I am authorized to act for this user”), the receiving service needs to verify the attestation issuer is legitimate. The registry is the master list of trustworthy badge issuers.

17.2 Architecture

Registry Structure:
registry/
├── issuers/                    # One JSON file per registered issuer
│   ├── agent-passport-system.json
│   ├── agentid.json
│   ├── agentinternetruntime.json
│   ├── agora.json
│   ├── arcede.json
│   ├── arkforge.json
│   ├── insumerapi.json
│   └── qntm.json
├── manifest.json               # Compiled, signed registry manifest
└── proofs/                     # Cryptographic proofs
CLI (@open-agent-trust/cli):
CommandFunction
keygenGenerate Ed25519 keypair for issuer identity
registerCreate registration file with domain proof
submitSubmit registration to registry
verifyVerify an attestation against registry
issueIssue an attestation for an agent
proveGenerate cryptographic proof
compileCompile registry manifest

17.3 Security Properties

  1. Permissionless registration — Organizations register by cryptographically proving domain ownership. Automated CI pipeline adds them. No human gatekeepers.
  2. Threshold governance — Master list secured by 3-of-5 multi-signature scheme. Keys distributed to independent ecosystem leaders.
  3. Zero-trust mirrors — Registry manifest is cryptographically signed. Anyone can host a mirror; tampered manifests are rejected by SDK.
  4. Local verification — Services download registry once and verify locally. No per-request central server calls.

17.4 CI/CD

  • manifest-compiler.yml — Compiles registry on changes
  • verify-registration.yml — Validates new registrations
  • release.yml — npm publish for CLI

17.5 Research Paper

“Composable Agent Trust Stack” — available at arcede.com/papers, documenting the broader vision and architecture.

18. Physical AI Use Cases

18.1 Warehouse Delivery Robot (AMR)

Standards: ISO 3691-4, IEC 62443
ActionSINT TierConstraint
LiDAR/camera subscribeT0
Receive task via A2AT1
Navigate (no humans)T2maxVelocity: 1.5 m/s
Navigate (humans detected)T3maxVelocity: 0.3 m/s
Gripper operationT2maxForce: 30 N
Emergency stopNEVER BLOCKEDInvariant I-G2

18.2 Industrial Welding Arm (ISO 10218)

ActionSINT TierConstraint
Read joint anglesT0
Plan weld pathT1
Begin weld sequenceT2maxForce: 500 N, cell_locked: true
Move arm (human in cell)T3maxVelocity: 0.1 m/s (ISO 10218-1 §5.4.3)
E-stop overrideBLOCKEDI-G2 invariant

18.3 Surgical Robot (FDA Class III)

Standards: IEC 62304, IEC 60601-1-8, FDA 21 CFR Part 820, ISO 14971
ActionSINT TierConstraint
Instrument positioningT2maxVelocity: 0.01 m/s (sub-mm precision)
Force applicationT2maxForce: 5 N
ElectrocauteryT3surgeon_confirmed: true (irreversible tissue damage)
Emergency retractNEVER BLOCKEDSafety retract always forwarded
Standards: ASTM F3548-21, EU U-Space, FAA AC 107-2B
ActionSINT TierConstraint
ARM/DISARMT3Propulsion enable/disable
TAKEOFFT2altitude ≤ 120m (FAA Part 107)
MISSION_STARTT3Begins autonomous BVLOS
FENCE_DISABLET3Removes safety boundary

18.5 Collaborative Robot (ISO/TS 15066)

Power-and-force limiting mode with continuous human presence:
  • maxVelocity: 0.25 m/s, maxForce: 150 N (ISO/TS 15066 Table 1 transient contact)
  • Per-body-region force limits: Head 130N, Chest 140N, Hand 140N, Thigh 220N

18.6 Underwater ROV (DNV-ST-0111)

ActionSINT TierConstraint
Thruster controlT2maxVelocity: 1.0 m/s
ManipulatorT2maxForce: 200 N
Emergency surfaceALWAYS FORWARDEDNever blocked

19. Conformance & Testing

19.1 Test Suite Summary

ComponentRepositoryTests
SINT Protocol (full stack)sint-protocol1,363
Operators Platformsint-agents1,276+
Ecosystem totalall repos2,639+

19.2 Protocol Test Coverage

CategoryTestsCoverage
Core types & Zod schemas~80Validation, DFA states
Capability tokens~120Issuance, delegation, revocation, chain verification
Policy gateway~150Tier assignment, constraint checking, escalation, plugins
Evidence ledger~90Hash chain integrity, proof receipts, queries
Bridge adapters~200MCP, ROS 2, MAVLink, A2A, gRPC, IoT, MQTT, OPC-UA
OWASP Conformance~300All 10 ASI categories
Economic layer~70Billing, budget, route selection
Avatar/CSML~50Behavioral drift detection
Persistence~60PostgreSQL, Redis, in-memory
CLI (sintctl)~40Token management, approvals
Edge mode conformance~40Offline operation
Economy fixtures~20Pricing calculator validation
Integration tests~140End-to-end gateway flows

19.3 OWASP Agentic Security Top 10 Coverage

#OWASP CategorySINT Enforcement
ASI01Goal Hijack / Prompt InjectionGoalHijackPlugin (5-layer detection)
ASI02Tool MisuseTier-based approval gates + forbidden combo detection
ASI03Identity AbuseEd25519 capability tokens + W3C DID
ASI04Supply Chain CompromiseDefaultSupplyChainVerifier (model hash + tool manifest)
ASI05Code ExecutionT3_COMMIT classification for all exec tools
ASI06Memory PoisoningMemoryIntegrityChecker (replay, privilege, overflow)
ASI07Inter-Agent ManipulationCross-agent injection detection in GoalHijackPlugin
ASI08Cascading FailureCircuitBreakerPlugin + per-agent budget caps
ASI09Trust ExploitationAttenuation-only delegation (max depth 3)
ASI10Rogue AgentCSML auto-escalation + CircuitBreaker auto-trip

19.4 MCP Attack Surface Conformance

Dedicated 10-test suite validates each OWASP ASI category against the gateway choke point using real MCP tool calls.

20. Compliance & Standards Mapping

StandardScopeSINT Coverage
OWASP Agentic Top 10AI agent security10/10 categories (ASI01–ASI10)
EU AI ActHigh-risk AI systemsArt. 9 (risk management → CSML + tier system), Art. 11 (technical documentation → evidence ledger), Art. 13 (transparency → audit trail), Art. 14(4)(e) (stop button → CircuitBreakerPlugin)
IEC 62443Industrial cybersecurityZone/conduit mapping via bridge adapters, SL-T alignment with tier system
ISO 10218-1/2Industrial robot safetyForce/velocity constraints, collaborative space monitoring, protective stop forwarding
ISO/TS 15066Collaborative robotsPower-and-force limiting mode, per-body-region contact force limits
ISO 14971Medical device risk managementRisk classification → tier assignment, residual risk tracking via ledger
IEC 62304Medical device softwareTraceability via evidence ledger, software unit verification
IEC 60601-1-8Medical electrical equipment alarmsAlarm priority mapping to tier escalation
FDA 21 CFR Part 820Medical device QMSDesign controls, production records via audit trail
NIST AI RMF 1.0AI risk managementMAP (resource classification), MEASURE (CSML), MANAGE (tier escalation), GOVERN (audit)
NIST SP 800-82 Rev. 3OT securityNetwork segmentation (bridge isolation), access control (tokens), monitoring (ledger)
NATO STANAG 4586UAS controlCommand/control mapping via MAVLink bridge, IFF via capability tokens
ASTM F3548-21UAS remote IDAgent identity via Ed25519 keys, broadcast via capability token metadata
FAA AC 107-2BsUAS operationsAltitude constraints, BVLOS approval mapping to T3
DNV-ST-0111Subsea systemsROV action classification, emergency surface priority

21. Competitive Landscape

21.1 Protocol Comparison Matrix

FeatureSINTMCP (Anthropic)ACP (IBM/LF)A2A (Google)AgentProtocolANPAG-UI
Physical constraints
Graduated authorization✅ (T0–T3)Partial
Capability tokens✅ (Ed25519)
Hash-chain audit✅ (SHA-256)
Forbidden combo detection✅ (DFA)
Behavioral drift (CSML)
Circuit breaker
Economic metering
Plugin architecture
Robot/drone bridges✅ (ROS2, MAVLink)
IoT/OT bridges✅ (MQTT, OPC-UA)
OWASP ASI coverage10/100/10~3/10~1/100/100/100/10
EU AI Act compliancePartial
Tests1,363N/AN/AN/AN/AN/AN/A
Key insight: SINT is not competing with these protocols. It is a security enforcement layer that wraps around them. MCP + SINT = secured MCP. A2A + SINT = secured A2A.

21.2 Market Context

  • Agentic AI market: 10.86B(March2026),4610.86B (March 2026), 46% CAGR → 52.6B by 2030
  • Physical AI security: No established market leader; SINT is first-to-market with a comprehensive protocol
  • ROSClaw (Cardenas et al., 2026): First academic validation of the need for runtime authorization in ROS 2 agentic systems — cites SINT approach
  • OWASP Agentic Security: Published March 2026; SINT achieved 10/10 coverage within 4 weeks

22. Research Agenda (2026–2031)

Problem 1: Swarm Coordination Security (2026–2027)

Threat: A drone swarm of N agents shares a task. Each individual agent has a valid capability token. But the collective action — N drones converging on a target — is dangerous in ways no individual token expresses. Research directions:
  1. Swarm capability token — Group token encoding collective constraints: maxSwarmDensity (agents/m³), minInterAgentDistance (m), maxCollectiveKineticEnergy (Σ½mv² in joules), synchronizationWindow (ms)
  2. Collective CSMLcomputeCsml() extended to agent cohorts with tighter threshold θ_swarm
  3. Byzantine-resilient coordination — k-of-N threshold signature scheme for compromised swarm members
Target standard: NATO STANAG 4586 (UAS control), MIL-STD-1553B (bus security)

Problem 2: Sub-Human-Reaction-Time Safety (2026–2028)

Threat: Physical AI operates at 1 kHz (ROS 2 control loops). Human approval has 200–500 ms latency. A robot executes 200–500 control cycles while waiting. Research directions:
  1. Probabilistic constraint envelopes — Replace binary checks with Gaussian confidence bounds
  2. Predictive tier assignment — ML model predicting which upcoming actions will need T2/T3 approval, pre-fetching human attention
  3. Safety-bounded autonomy — Pre-approved trajectory corridors with divergence thresholds for automatic invalidation

Problem 3: Multi-Modal Sensor Fusion Trust (2027–2028)

Threat: CSML currently tracks action-level metrics. Physical AI decisions are based on sensor fusion (LiDAR + camera + IMU). A compromised sensor can cause correct-looking actions that are physically dangerous. Research directions:
  1. Sensor attestation — Each sensor produces signed readings; gateway verifies sensor integrity
  2. Fusion consistency scoring — Cross-validate sensor modalities; flag inconsistencies
  3. Adversarial sensor detection — Detect spoofed LiDAR, camera injection attacks

Problem 4: Cross-Organizational Trust Federation (2027–2029)

Threat: Agent A (authorized by Company X) needs to interact with Agent B (authorized by Company Y). Neither trusts the other’s token authority. Research directions:
  1. Federated capability negotiation — Mutual attestation protocol
  2. Trust registry integration — Open Agent Trust Registry as the PKI root
  3. Cross-domain CSML — Behavioral reputation that transfers across organizations

Problem 5: Formal Verification of Safety Properties (2028–2031)

Threat: The gateway’s safety invariants are currently tested empirically (1,363 tests). For FDA Class III and aerospace, formal proofs are required. Research directions:
  1. TLA+ specification — Model-check core gateway invariants
  2. Coq/Lean proofs — Formally verify token delegation attenuation
  3. Isabelle/HOL — Prove hash chain integrity properties

23. Deployment & Operations

23.1 Quick Start (MCP Proxy)

For immediate use with Claude Desktop or Cursor:
npm install -g @sint/bridge-mcp
sintctl token create --resource "mcp://*" --actions read,call --ttl 24h
Add to Claude Desktop MCP config:
{
  "mcpServers": {
    "sint-proxy": {
      "command": "npx",
      "args": ["@sint/bridge-mcp", "--downstream", "filesystem,exec"]
    }
  }
}

23.2 Production Deployment (Docker)

# docker-compose.yml
services:
  gateway:
    image: ghcr.io/sint-ai/sint-gateway:latest
    ports:
      - "3000:3000"
    environment:
      - SINT_PERSISTENCE=postgres
      - DATABASE_URL=postgresql://sint:pass@db:5432/sint
      - SINT_REDIS_URL=redis://redis:6379
    depends_on: [db, redis]

  dashboard:
    image: ghcr.io/sint-ai/sint-dashboard:latest
    ports:
      - "3001:80"
    environment:
      - VITE_GATEWAY_URL=http://gateway:3000

  db:
    image: postgres:16
    environment:
      POSTGRES_DB: sint
      POSTGRES_USER: sint
      POSTGRES_PASSWORD: pass
    volumes:
      - pgdata:/var/lib/postgresql/data

  redis:
    image: redis:7-alpine

volumes:
  pgdata:

23.3 CLI (sintctl)

# Token management
sintctl token create --resource "ros2:///cmd_vel" --actions publish --maxVelocity 1.5
sintctl token list
sintctl token revoke <tokenId>
sintctl token delegate --parent <tokenId> --maxVelocity 0.5  # Attenuated

# Approvals
sintctl approve list --pending
sintctl approve accept <requestId>
sintctl approve deny <requestId> --reason "Too fast"

# Audit
sintctl ledger query --agent <key> --since 2026-04-01 --tier T3
sintctl ledger verify --entry <entryId>  # Verify hash chain
sintctl ledger export --format jsonl > audit.jsonl

# Policy
sintctl policy list
sintctl policy add --resource "mcp://exec/*" --tier T3_COMMIT
sintctl policy test --resource "ros2:///cmd_vel" --action publish

# Scanning
sintctl scan --server filesystem  # Security scan MCP server

23.4 Python SDK

from sint import SintClient, SintScanner

# Client usage
client = SintClient(gateway_url="http://localhost:3000")
token = client.create_token(
    resource="mcp://filesystem/*",
    actions=["read"],
    ttl_hours=24
)

# Security scanning
scanner = SintScanner(gateway_url="http://localhost:3000")
results = scanner.scan_server("filesystem")
for finding in results.findings:
    print(f"{finding.severity}: {finding.description}")

23.5 Go SDK

import "github.com/sint-ai/sint-protocol/sdks/sint-go"

client := sint.NewClient("http://localhost:3000")
token, err := client.CreateToken(sint.TokenRequest{
    Resource: "ros2:///cmd_vel",
    Actions:  []string{"publish"},
    MaxVelocityMps: 1.5,
})

24. Roadmap

Phase 1: Foundation (Completed — Q1 2026)

  • ✅ Core protocol types and Zod schemas
  • ✅ Policy Gateway with tier assignment and plugin system
  • ✅ Ed25519 capability tokens with delegation chains
  • ✅ SHA-256 hash-chained evidence ledger
  • ✅ MCP bridge adapter (primary adoption vector)
  • ✅ Economic layer with metered billing
  • ✅ OWASP ASI 10/10 conformance
  • ✅ 1,363 tests passing

Phase 2: Bridges & SDKs (Q2 2026)

  • ✅ ROS 2 bridge adapter
  • ✅ MAVLink v2 bridge adapter
  • ✅ Google A2A bridge adapter
  • ✅ gRPC bridge adapter
  • ✅ IoT/MQTT/OPC-UA/Open-RMF bridges
  • ✅ Python SDK (1,962 lines)
  • ✅ Go SDK (stub)
  • ✅ TypeScript client SDK
  • ✅ PostgreSQL persistence (518 lines)
  • ✅ Redis persistence + revocation bus
  • ⭕ npm publish 8 packages to @sint/ scope (ready)
  • ⭕ SPAI 2026 submission (deadline: May 7)

Phase 3: Production Hardening (Q3 2026)

  • TEE attestation (Intel SGX, ARM TrustZone, AMD SEV)
  • Formal verification (TLA+ for gateway invariants)
  • Kubernetes Operator for gateway deployment
  • Prometheus/Grafana monitoring integration
  • SIEM export connectors (Splunk, Datadog, ELK)
  • Edge mode for bandwidth-constrained deployments
  • SOC 2 Type II audit preparation

Phase 4: Swarm & Federation (Q4 2026 – Q1 2027)

  • Swarm capability tokens
  • Collective CSML
  • Cross-organizational trust federation
  • Byzantine-resilient coordination
  • Agent Trust Registry integration as federation root

Phase 5: Formal Safety (2027–2031)

  • Probabilistic constraint envelopes
  • Predictive tier assignment
  • Multi-modal sensor fusion trust
  • Formal proofs (Coq/Lean/Isabelle)
  • Medical device certification support (IEC 62304 + FDA)
  • Aerospace certification support (DO-178C)

25. References

Academic

  1. Cardenas, I.S., Arnett, M.A., Yeo, N.C., Sah, L., Kim, J.-H. (2026). “ROSClaw: An OpenClaw ROS 2 Framework for Agentic Robot Control and Interaction.” arXiv:2603.26997.
  2. OWASP. (2026). “Agentic AI Security Initiative — Top 10 for Agentic AI.” owasp.org.
  3. Anthropic. (2024). “Model Context Protocol Specification.” spec.modelcontextprotocol.io.
  4. MCP Security Analysis. (2026). arXiv:2601.17549.
  5. Google. (2025). “Agent-to-Agent (A2A) Protocol.” github.com/google/A2A.

Standards

  1. IEC 62443-3-3:2013. Industrial communication networks — IT security for networks and systems.
  2. ISO 10218-1:2011. Robots and robotic devices — Safety requirements for industrial robots.
  3. ISO/TS 15066:2016. Robots and robotic devices — Collaborative robots.
  4. ISO 14971:2019. Medical devices — Application of risk management.
  5. IEC 62304:2015. Medical device software — Software life cycle processes.
  6. IEC 60601-1-8:2020. Medical electrical equipment — Alarm systems.
  7. FDA 21 CFR Part 820. Quality System Regulation.
  8. NIST AI RMF 1.0 (2023). Artificial Intelligence Risk Management Framework.
  9. NIST SP 800-82 Rev. 3 (2023). Guide to Operational Technology (OT) Security.
  10. NATO STANAG 4586. Standard Interfaces of UAV Control System.
  11. ASTM F3548-21. Standard Specification for UAS Remote ID.
  12. EU AI Act (2024). Regulation (EU) 2024/1689 — Harmonised rules on artificial intelligence.
  13. DNV-ST-0111. Assessment of station keeping capability of dynamic positioning vessels.

SINT Ecosystem

  1. SINT Protocol Repository. github.com/sint-ai/sint-protocol.
  2. SINT Operators Platform. github.com/sint-ai/sint-agents.
  3. SINT Virtual CMO. github.com/sint-ai/sint-cmo-operator.
  4. SINT Avatars. github.com/sint-ai/sint-avatars.
  5. SINT Outreach. github.com/sint-ai/sint-outreach.
  6. Open Agent Trust Registry. github.com/pshkv/open-agent-trust-registry.
  7. Autonomous Execution Engine. github.com/sint-ai/autonomous-execution-engine.

Appendix A: Gateway Invariants

IDInvariantDescription
I-G1Single choke pointAll actions pass through Policy Gateway
I-G2E-stop never blockedEmergency stop signals are always forwarded
I-G3Tier monotonicityTiers can only escalate during request lifecycle
I-G4Token attenuationDelegation can only narrow scope
I-G5Ledger append-onlyEvidence ledger entries never modified or deleted
I-G6Hash chain integrityEach entry hash includes previous entry hash
I-G7Budget fail-denyInsufficient balance always denies (never escalates)
I-G8Timeout fail-denyApproval timeout defaults to deny

Appendix B: Package Dependency Graph

@sint/core
  ├── @sint/gate-capability-tokens
  ├── @sint/gate-policy-gateway
  │     ├── @sint/gate-capability-tokens
  │     ├── @sint/gate-evidence-ledger
  │     └── @sint/bridge-economy
  ├── @sint/gate-evidence-ledger
  ├── @sint/persistence
  │     └── @sint/persistence-postgres
  ├── @sint/bridge-mcp
  │     └── @sint/gate-policy-gateway
  ├── @sint/bridge-economy
  └── @sint/client

Appendix C: Environment Variables

VariableDefaultDescription
SINT_PERSISTENCEmemorymemory | postgres | redis
DATABASE_URLPostgreSQL connection string
SINT_REDIS_URLRedis connection string
SINT_TOKEN_TTL86400000Default token TTL (ms)
SINT_MAX_DELEGATION_DEPTH3Maximum delegation chain depth
SINT_CSML_THRESHOLD0.30Default CSML escalation threshold
SINT_CIRCUIT_BREAKER_THRESHOLD5Consecutive denials to auto-trip
SINT_APPROVAL_TIMEOUT30000Default approval timeout (ms)
SINT_LOG_LEVELinfodebug | info | warn | error

License: MIT Repository: github.com/sint-ai/sint-protocol Contact: [email protected] | sint.gg © 2026 SINT AI Lab / PSHKV Inc. All rights reserved.