Loading...
Loading...
Guidance for working with the Beltic KYA (Know Your Agent) ecosystem - a credential-based trust framework for AI agents. Use when: (1) Working in any Beltic repository (beltic-spec, beltic-cli, beltic-sdk, fact-python, kya-platform, wizard, nasa), (2) Implementing agent credential signing/verification, (3) Using @belticlabs/kya SDK or beltic-sdk Python, (4) Understanding agent safety certification, (5) Working with verifiable credentials for AI. Triggers on: Beltic CLI commands, agent credentials, HTTP message signatures (RFC 9421), safety scores, KYB tier verification, trust chain validation.
npx skill4agent add belticlabs/skills beltic-kyaDeveloper (KYB Verified) --> Issues --> Agent Credential --> Verified by --> Merchant/Platform@belticlabs/kyakyabelticbeltic-sdkbeltickya--alg--algorithm--out--output--key--payload--pubplatform/pranav-belticfeat:fix:docs:refactor:| Repository | Purpose | Language |
|---|---|---|
| beltic-spec | JSON schemas & specification | JSON Schema |
| beltic-cli | CLI for signing/verification | Rust |
| beltic-sdk | TypeScript SDK | TypeScript |
| fact-python | Python SDK | Python |
| kya-platform | Verification platform & API | TS/Next.js/Hono |
| wizard | Claude-powered credential bootstrap | TypeScript |
| nasa | Documentation site | MDX/Next.js |
| homebrew-tap | Homebrew formula | Ruby |
| platform | Enterprise risk platform | DO NOT EDIT |
context.md{repo}/CLAUDE.mdbeltic-spec/schemas/| Command | Description |
|---|---|
| Create agent manifest interactively |
| Create self-attested developer credential |
| Generate SHA256 code fingerprint |
| Generate Ed25519 keypair |
| Sign credential as JWS |
| Verify JWS token |
| Sign HTTP request (RFC 9421) |
| Run compliance tests |
| Authenticate with KYA platform |
beltic init # Create .beltic.yaml
beltic fingerprint # Generate code fingerprint
beltic keygen --alg EdDSA # Generate keypair
beltic sign --key .beltic/eddsa-*-private.pem --payload agent-manifest.json
beltic verify --key .beltic/eddsa-*-public.pem --token credential.jwtimport {
validateAgentCredential,
validateDeveloperCredential,
signCredential,
verifyCredential,
verifyAgentTrustChain,
signHttpRequest,
generateKeyPair,
} from '@belticlabs/kya';
// Trust chain verification
const result = await verifyAgentTrustChain(agentToken, {
keyResolver: async (header) => publicKey,
fetchDeveloperCredential: async (id) => developerJwt,
policy: {
minKybTier: 'tier_1',
minPromptInjectionScore: 80,
},
});from beltic import (
validate_agent_credential,
validate_developer_credential,
sign_credential,
verify_credential,
verify_agent_trust_chain,
sign_http_request,
)
# Trust chain verification
result = await verify_agent_trust_chain(
agent_token,
TrustChainOptions(
key_resolver=resolve_key,
fetch_developer_credential=fetch_dev_cred,
policy=TrustPolicy(
min_kyb_tier="tier_1",
min_prompt_injection_score=80,
),
),
)| Metric | Description |
|---|---|
| Refusal of harmful content requests |
| Resistance to prompt injection attacks |
| Prevention of tool misuse |
| Protection against PII extraction |
| Tier | Name | Verification Level |
|---|---|---|
| Unverified | Self-attested only |
| Basic | Email/domain verified |
| Standard | Identity documents |
| Enhanced | Background checks |
| Maximum | Regulated industries |
beltic keygenbeltic sign.beltic/beltic-spec/schemas/kya-platform/I cannot perform [operation] because [reason].
To proceed, you would need to [specific action required]..pem.envcredentials.jsonnone| Issue | Solution |
|---|---|
| Use |
| Schema validation fails | Run |
| Key not found | Check |
| HTTP signature fails | Verify key directory URL is accessible |
| Trust chain fails | Check developer credential is valid and not revoked |
context.mdCLAUDE.md