Agent Authentication

Authentication protocols for autonomous AI agent operations on ClawBank's financial infrastructure.

Overview

ClawBank implements cryptographic authentication for AI agents operating as independent economic entities. The authorization architecture supports autonomous financial operations while maintaining institutional-grade security through hardware security modules (HSMs), zero-knowledge proofs, and on-chain transaction validation.

Authentication Architecture

Key Hierarchy

Organization
├── Service Keys (sk_live_*)
│   ├── Full platform access
│   ├── Vault management
│   └── Agent key provisioning

├── Agent Keys (ak_live_*)
│   ├── Scoped treasury operations
│   ├── Transaction execution
│   └── Balance queries

└── Observer Keys (ok_live_*)
    ├── Read-only access
    └── Analytics queries

Key Types & Permissions

Type
Prefix
Use Case
Permissions
Rate Limit

Service Key

sk_live_

Backend infrastructure

Full API access, agent provisioning

600/min

Agent Key

ak_live_

AI agent operations

Scoped treasury access

1200 MCP calls/min

Observer Key

ok_live_

Monitoring systems

Read-only queries

300/min

Network Environments

  • Mainnet: *_live_* - Solana mainnet, real assets

  • Devnet: *_test_* - Solana devnet, test tokens

Agent Key Provisioning

Creating Agent Keys

Permission Scopes

Model Context Protocol (MCP) Authentication

MCP Server Configuration

Configure AI agents to connect via Model Context Protocol:

Programmatic MCP Client

On-Chain Transaction Signing

All blockchain transactions require cryptographic signatures. ClawBank supports managed wallets and bring-your-own-key (BYOK) models.

Option 2: Bring Your Own Key (BYOK)

Key Rotation

Implement regular key rotation for operational security:

Automated Rotation

Multi-Agent Authorization

Configure approval workflows requiring consensus from multiple AI agents:

Agent Consensus Flow

Security Best Practices

1. Key Storage

2. Least Privilege Permissions

3. Transaction Verification

4. Audit Logging

Rate Limiting

Tier
API Requests/min
On-Chain Ops/min
MCP Calls/min

Developer

60

10

120

Pro

600

60

1200

Enterprise

Custom

Custom

Unlimited

Handling Rate Limits

Encryption & Privacy

All sensitive data encrypted at rest and in transit:

  • Agent Keys: AES-256-GCM encryption, stored in HSMs

  • Private Keys: HSM-backed or client-side encrypted

  • Transaction Metadata: Zero-knowledge proof encryption

  • MCP Communications: TLS 1.3 with certificate pinning

  • On-Chain Data: Optional ZK-proof privacy layer

Zero-Knowledge Transaction Privacy

Compliance & Auditing

Security Audits

  • Smart Contracts: Trail of Bits, OtterSec

  • Infrastructure: SOC 2 Type II

  • MCP Server: NCC Group

  • On-Chain Programs: Verified reproducible builds

Regulatory Compliance

  • FinCEN: Virtual currency reporting

  • Bank Secrecy Act (BSA): AML/KYC for agent transactions

  • GDPR: EU data protection for agent data

  • CCPA: California privacy compliance

Reporting Security Issues

Report vulnerabilities responsibly:

Next Steps

Last updated