No account. No API key. One curl call.
Then add npm middleware to verify agents in your API. W3C standard. Any framework.
$ npm install @moltrust/sdkOne line in your README. The badge fetches your live trust score automatically.
Protocol-agnostic trust scoring for x402 and MPP payment endpoints. Agents with insufficient trust scores are blocked before payment.
Every MolTrust credential embeds an Agent Authorization Envelope — a machine-readable permission contract your API can inspect before every transaction.
Read the full specification in Protocol Whitepaper v0.8 →
W3C DID Core v1.0 conformant. Create, Resolve, Update, Deactivate. Submitted to W3C DID Spec Registries.
| Option | Type | Default | Description |
|---|---|---|---|
| minScore | number | 0 | Minimum trust score required to pass verification. Agents below this threshold receive a 403. |
| requireAAE | boolean | false | Require a valid Agent Authorization Envelope in the credential. Rejects agents without one. |
| evaluateAction | string | — | Check whether the AAE mandate permits this specific action (e.g. "purchase", "transfer"). |
| evaluateAmount | number | — | Evaluate AAE financial constraints against this transaction amount (USD). |
| evaluateJurisdiction | string | — | Verify the AAE permits operations in this ISO 3166-1 jurisdiction code. |
| apiBase | string | api.moltrust.ch | Override the MolTrust API base URL. Useful for staging or self-hosted deployments. |
Pre-execution safety check for order-sensitive action sequences. Opt-in, deterministic, no LLM calls. Phase 1: WARN-only.
POST /guard/api/action/checkCheck a proposed action against the session history. Returns verdict (SAFE/WARN/BLOCK), residual score, and conflicting action.
GET /guard/api/action/statsAggregated SAS statistics: total events, breakdown by verdict, average residual.
GET /guard/api/action/events/{did}SAS events for a specific DID. Shows all WARN/BLOCK events with residual scores and conflicting actions.
Every agent action can produce a cryptographic proof record. IPRs are Merkle-batched and anchored on Base L2.
POST /vc/ipr/submitSubmit an IPR. Provide output_hash (SHA-256), agent_did, and confidence score. Returns ipr_id.
GET /vc/ipr/{ipr_id}Retrieve an IPR by ID. Returns output_hash, anchor status, Merkle proof, and Base L2 transaction hash.
POST /vc/ipr/verifyVerify an IPR: checks signature, on-chain anchor, and Merkle proof. Returns validity + anchor TX link.
GET /vc/ipr/agent/{did}List all IPRs for an agent. Paginated. Returns proof records with anchor status and Merkle proofs.
GET /vc/ipr/statsNetwork-wide IPR statistics: total records, anchored count, unique agents, average confidence score.
GET /vc/ipr/{ipr_id}/statusAnchor status of a specific IPR: pending, anchored, or failed. Includes retry count and block number.
Add trust verification to any x402 endpoint in one line. Block untrusted agents before they transact.
npm install @moltrust/x4021. ExtractWallet from x402 X-Payment header
2. ScoreMolTrust trust score (5-min cache, <10ms warm)
3. Gate403 + registration link if below threshold
Add trust verification to any MPP (Machine Payments Protocol) endpoint. Works with Stripe, Tempo, Visa. Same API as @moltrust/x402.
npm install @moltrust/mpp1. ExtractWallet from MPP Payment credential header
2. ScoreMolTrust trust score (5-min cache, <10ms warm)
3. Gate403 + registration link if below threshold
Works alongside @moltrust/x402 for x402 endpoints. Same API, different protocol.
Every x402 wallet gets an automatic trust profile. Shadow score, transaction history, and projected score after registration.
MolTrust supports a third enforcement layer via Falco eBPF — syscall-level monitoring that agents cannot bypass from userspace.
Layer 1 — CryptographicEd25519 signatures, JCS canonicalization. Tamper-proof by construction.
Layer 2 — APITrust score degradation, IPR submission, credential revocation.
Layer 3 — KernelFalco eBPF/syscall detection. Not bypassable by the agent process.
Falco Bridge (K8s)
When a policy violation is detected at the kernel level, Falco fires a webhook to the MolTrust bridge, which submits an IPR violation record. Trust score degrades automatically.
Express + Hono middleware. AgentTrust.verify(), .middleware(), .register().
MPP trust middleware for Express. Payment credential header. Stripe/Tempo/Visa.
MCP server — 48 tools for trust verification, scoring, credentials.
OpenClaw plugin — 2 agent tools, 2 slash commands, CLI, gateway RPC. Free tier included.
MolTrust runs in fully API-only mode — no blockchain, no VPN required. All @moltrust/* packages are available on cnpm. W3C DID/VC trust for your OpenClaw agents, compliant with CAC requirements.
MolTrust 提供 W3C DID/VC 信任基础设施,支持 OpenClaw 代理的身份验证、信任评分和可验证凭证。纯 API 模式,无需区块链,无需 VPN。
MolTrust provides W3C DID/VC trust infrastructure for AI agents. Pure API mode — no blockchain required, no VPN needed. All @moltrust/* packages available on cnpm.