Your agent dies every session. Its identity doesn't have to.
Give your agent a permanent address, credentials, audit trail, and namespace — everything it needs to operate across sessions.
Verify any agent → Paste a DID or AAT to see the full attestation chain.
Watch the substrate live → Real-time SCITT receipts, trust histogram, signed by AgentLair.
Clone-and-run examples → Three repos: BCC, x402-on-Base, audit-chain dispute resolution.
Permanent address
@agentlair.dev email that survives session restarts.
Permanent credentials
Zero-knowledge vault. Not env vars.
Permanent record
Every action signed, chained, provable.
Permanent namespace
Isolated pods. One per client.
Permanent reputation
Behavioral trust scores across sessions. Observable, not declarative.
$ curl -X POST https://agentlair.dev/v1/register \
-H "Content-Type: application/json" \
-d '{"name": "my-agent"}'
{
"api_key": "al_live_k7x9m2p4...",
"account_id": "acc_7kX9mP2qR4wL",
"email_address": "my-agent@agentlair.dev",
"tier": "free"
}Trust earned, not claimed
Every tool call, credential read, and escalation feeds the trust engine. Scores come from the audit trail — not from what an agent says about itself.
Healthy agent
productivity-agent
↑ Improving
1,240 observations
Regular sessions, appropriate escalations, minimal credential access.
Suspicious agent
exfil-agent
↓ Declining
89 observations
10 vault reads per session, 3 rate-limit hits, zero escalations.
New agent
new-agent
→ Stable
12 observations
Insufficient history — trust builds with each verified action.
Payments are solved. Identity isn't.
Circle, Stripe, and Coinbase now handle x402 nanopayments at 50M+ transactions. None of them answer the follow-on question: which agent made the call, who owns it, and should I trust it? AgentLair's Agent Authentication Token (AAT) is the cryptographic answer — EdDSA-signed, JWKS-verifiable, tethered to a named owner. Identity that travels with every payment.
# Circle / Stripe / Coinbase handle the payment. # AgentLair answers: which agent sent it? curl https://agentlair.dev/v1/trust/acc_abc123 \ -H "Authorization: Bearer <AAT>" # → 200 OK: identity verified, trust score 94, owner: hakon@example.com # → 403: agent unknown — no registered identity, reject or charge more
Top agents this week
50 agents in the directory. Every one scores 0 on behavioral trust (L4). The top scorer hit 48/100 by having a well-formed AgentCard and a working A2A endpoint. Behavioral trust, the kind that builds across sessions from verified actions? Zero, universally. That's the problem AgentLair was built to fix.
| # | Agent | Score |
|---|---|---|
| 1 | Lexicon — Comparison Intelligence Engine | 48 |
| 2 | Microquery | 45 |
| 3 | Pictomancer.ai | 45 |
| 4 | Buywhere Product Catalog | 42 |
| 5 | Anlora | 40 |
| 6 | ANP2 Network Relay | 40 |
| 7 | BidMachine Ad Exchange | 40 |
| 8 | CyMetica AI | 40 |
| 9 | Fodda | 40 |
| 10 | GdayJames | 40 |
Full results at agentlair.dev/leaderboard/a2a (50 agents) →
Not yet ranked. Run the free 4-layer A2A audit — behavioral trust, endpoint verification, and AgentCard compliance scored end-to-end. Under 3 minutes.
Identity that outlasts the session
Agents are stateless by default. AgentLair gives each agent a durable identity layer — address, credentials, record, namespace, and reputation — that persists regardless of where or how often the agent runs.
Permanent address
"Your agent wanted an email. CAPTCHA said no."
Claim @agentlair.dev addresses. Send and receive email via REST API — no SMTP, no CAPTCHA, no browser required. Drafts, threading, and webhooks included.
Permanent credentials
"Your secrets shouldn't live in env vars."
Zero-knowledge credential storage. Your agent encrypts locally, we store opaque blobs. Versioned, recoverable, edge-deployed. Survives container restarts. Agents without persistent credentials fall back to browser automation. Reflex benchmarked the cost: 551k tokens and 17 minutes vs 12k tokens and 20 seconds — same task, same model. The 45x gap isn't a model problem. It's a credential problem.
Permanent record
"Every action signed, chained, provable."
Log every tool call, LLM invocation, and decision to a persistent, queryable audit trail. EdDSA-signed entries — tamper-evident by construction. Verify any attestation receipt in your browser.
Permanent namespace
"Isolated environments that persist."
Multi-tenant isolation via pods. Each pod gets its own API key, email, vault, and audit trail — fully sandboxed per client, persistent across sessions.
Permanent reputation
"Behavioral trust across sessions."
Trust scores computed from observed behavior — consistency, transparency, topic diversity, and activity volume. Four tiers from untrusted to verified. Query via API to gate permissions or surface agent credibility.
Circle, Stripe, and Coinbase solved payments. No one solved identity.
Circle's Agent Stack launched in May 2026 — wallets, nanopayments down to 0.000001 USDC, an agent marketplace, all built on x402. Stripe and Coinbase followed. The payment layer is commoditized. What none of them answer: which agent made the call, who is its owner, and do I trust it? Today's answer is git commit metadata. That's the gap. AgentLair issues a cryptographically signed Agent Authentication Token (AAT) per session — EdDSA-signed, JWKS-verifiable at agentlair.dev, tethered to a named human owner. Every action is logged to a tamper-evident ledger. Circle processes the nanopayment. AgentLair tells you who sent it and whether to trust them.
| LAYER | HANDLED BY | WHAT IT ANSWERS |
|---|---|---|
| Payments | Circle · Stripe · Coinbase | Can the agent spend? How much? Gas-free USDC on-chain in seconds. |
| Execution | Cloudflare · AWS | Did the agent successfully run? Did it provision the infrastructure? |
| Identity | AgentLair | Which agent acted? Who owns it? Is it trusted — and can I prove it? |
Who deploys AgentLair
Named use cases for the cross-org behavioral trust layer — from autonomous security fleets to regulated agentic commerce.
AUTONOMOUS SECURITY AGENT GOVERNANCE
Govern your security agent fleet
Microsoft MDASH runs 100+ adversarial agents simultaneously. OpenAI Codex Security is GA across Enterprise, Business, and Edu tiers. Neither ships with a behavioral audit trail — or a way to prove scope constraints were honored. AgentLair gives each security agent a cryptographic identity, logs every tool call to a tamper-evident ledger, and surfaces a trust score across sessions. When your pentest agent found CVE-2026-42945, AgentLair can prove what it touched — and what it didn't.
AGENTIC COMMERCE
Know which agent is buying
Circle, Stripe, and Coinbase handle the payment rail. AgentLair answers the identity question above it: is this agent who it claims to be, who owns it, and what's its track record? Gate API access by trust tier — verified agents get lower prices, unknown agents get higher friction. The AAT travels with every request so the seller always knows their buyer.
EU AI ACT COMPLIANCE
Audit artifacts for regulated industries
EU AI Act full enforcement lands August 2026. Every agentic deployment in healthcare, finance, and critical infrastructure needs behavioral accountability infrastructure — not just logs, but tamper-evident records an auditor can independently verify. AgentLair's hash-chained attestation ledger is that artifact. One URL per agent per session, verifiable in a browser.
vs AgentMail
They give you a permanent address.
We give you a permanent identity.
vs Keycard
Ephemeral credentials per session.
Persistent vault that survives restarts.
vs Enterprise IAM
Corporate infra, SSO required.
Internet-native, no org required.
Agents are scaling faster than governance
The adoption-governance gap is not a prediction — it's already measured. Enterprises are deploying agents without the behavioral visibility to know what those agents are actually doing.
74%
of enterprises expect to use AI agents by 2027
n=3,235 across 24 countries
21%
have mature governance in place for those agents
The other 79% are running blind.
Forrester AEGIS Framework (Aug 2025)
Forrester's enterprise security framework for agentic AI names "least agency" as a core principle — constraining what agents can do based on observed behavior, not claimed intent. Six domains. Thirty-nine controls. The governance layer most enterprises are still missing.
Read the framework ↗Shipped in the wild
Two open-source agent frameworks have already integrated AgentLair in production — JWKS identity verification and behavioral telemetry running on real agent workloads.
task-orchestrator
by jpicklyk
MCP-based workflow automation for Claude agents. Added JWKS ActorVerifier pointing to AgentLair as the reference identity provider — every audited action now verifies agent identity against AgentLair's trust store.
springdrift
by seamus-brady
Gleam/BEAM agent platform. Integrated behavioral telemetry via fire-and-forget POSTs — every gate event builds a persistent audit record on AgentLair, compounding the agent's trust score over time.
3 packages on npm
@agentlair/sdk
v0.4.2Agent identity & trust API
npm i @agentlair/sdk
@agentlair/mcp
v1.2.0MCP server — trust queries in one command
npx @agentlair/mcp@latest
@agentlair/vault-crypto
v0.1.0Zero-knowledge credential encryption
npm i @agentlair/vault-crypto
Simple, transparent pricing
Start free. Identity verification from day one. Report behavioral events to build compounding trust scores as your agent fleet grows.
Free
Starter
Pro
Enterprise
Pay-as-you-go
0.01 USDC per trust query — no subscription
AI agents query /v1/trust/:agent_id, receive HTTP 402 with an x402 v2 payment manifest, pay on Base, and retry. Settles on-chain in seconds. No account required.
curl https://agentlair.dev/v1/trust/acc_abc123 # → HTTP 402 x402Version: 2 # maxAmountRequired: 10000 (0.01 USDC) network: eip155:8453
Got Questions?
If you can't find what you're looking for, get in touch.