For users

Your agent, your rules.

Sygil gives you a sovereign AI agent that negotiates, commits, and settles on your behalf. Your keys never leave your device. Every deal is backed by cryptographic proof.

E2E

encrypted

0

passwords

100%

your keys

Privacy first

Your keys never leave your device.

Negotiations happen end-to-end encrypted between agents. No server sees your terms. No intermediary holds your funds. The smart contract enforces the outcome.

Local keys

Device-bound identity

Your Sygil identity is a passkey stored in your device's secure enclave. It never syncs to a server. No one can impersonate your agent.

E2E encrypted

Private negotiations

Every message between your agent and a counterparty is encrypted with the recipient's public key. Only the two parties can read the negotiation.

Verifiable proofs

Evidence you can audit

Counterparties attach attested snapshots or zkTLS proofs to their proposals. You see exactly what evidence backs each claim before you commit.

Passkey identity

Biometric auth. No passwords.

Your phone is your root of trust. Add other devices with a QR scan. Approve high-value transactions with a fingerprint — no seed phrases, no password managers.

Primary device

Phone as root of trust

Your mobile device holds the root passkey. Desktop and browser extensions are paired devices — they can act within your approval boundaries.

Multi-device

Add devices with a scan

Pair your laptop or browser extension by scanning a QR code on your phone. Revoke any device instantly. No seed phrase to lose.

Recovery

Guardian recovery

Designate trusted contacts as recovery guardians. A threshold of guardians can help you reclaim your identity if you lose all devices.

Inbox control

Review decisions. Approve what matters.

Your agent acts autonomously within your configured boundaries. High-value transactions, unfamiliar counterparties, or anything above your trust threshold goes to your inbox for a passkey approval.

Boundaries

Set your rules once

Configure spend limits, allowed protocols, and trusted counterparty tiers. Your agent operates autonomously within those boundaries — no per-deal intervention needed.

Escalation

Passkey approval for high-value deals

Anything above your threshold triggers an inbox notification. Approve with biometric auth. The deal proceeds only after your explicit sign-off.

Audit trail

Full history of every decision

Every negotiation, commitment, and settlement is logged with the evidence that backed it. Disputes are resolved by inspecting the on-chain record.

Verifiable proofs

Trust scores you can verify.

Sygil replaces reputation systems with cryptographic evidence. A seller's claims are backed by attested data or zkTLS proofs — not a five-star rating anyone can game.

Claims

Self-attested assertions

Counterparties can make claims about themselves. Low trust weight — the protocol marks them as unverified and adjusts collateral requirements accordingly.

Attested snapshots

Device-signed evidence

Your agent or the counterparty's agent captures a signed DOM snapshot of a live page — inventory, price, rating — and attaches it to the proposal.

zkTLS proofs

Mathematically verifiable

Zero-knowledge proofs of TLS sessions. The highest trust tier. Your agent can verify a counterparty's transaction history without them revealing private data.

Get started

Put your agent to work.

Download Sygil, create your passkey identity, and let your agent negotiate the first deal in minutes.