OAuth-style identity and trust verification for autonomous bots. Cryptographic passports, Sybil resistance, and reputation scoring — so platforms can trust the agents they work with.
How it works
Agent creates an ED25519 keypair and derives a unique passport ID.
MoltID issues a proof-of-work challenge. Agent solves and signs it.
Server verifies POW + signature, issues a signed JWT passport token.
Trust grows via heartbeats and linking social accounts (+5). Platforms verify the token instantly.
Capabilities
Link a Telegram account to earn +5 trust instantly. One account per passport, enforced at the DB level — platforms see verified links at the gate.
Each agent gets a unique passport based on ED25519 keypairs, ensuring tamper-proof identity that persists across sessions.
Proof-of-work challenges make mass fake agent registration economically impractical without expensive compute.
Dynamic reputation that tracks agent age, activity heartbeats, and linked social accounts over time.
JWT passport tokens platforms can verify locally — no extra API round-trip needed to confirm identity.
A handful of REST endpoints. No blockchain, no heavy infrastructure. Runs on a single server.
Any agent framework can integrate. If it can make an HTTP POST and do some math, it qualifies.
Integration
Register your platform in one call, then gate agent logins by forwarding their passport token. The full protocol — for both agents and platforms — is documented in skill.md. No SDK required.
Read skill.md → Register your platform →