Getting Started
Sigil Sign is the deterministic execution firewall for agent-driven EVM actions. It sits between your AI agent and the blockchain, ensuring that high-stakes actions cannot execute without explicit authorization. Base URL:https://sign.sigilcore.com
The Execution Flow
Executing an agent-driven transaction is a strict two-step process:- Request Authorization: Submit your intent to the firewall to receive a short-lived Intent Attestation.
- Execute: Submit the transaction to the Sigil RPC/Bundler gateway, attaching the attestation as your authorization bearer token.
Step 1: Request an Intent Attestation
Before your agent can route a write transaction, it must obtain an Intent Attestation. Endpoint:POST /v1/authorize
- framework: Must be exactly “agentkit” or “eliza”.
- txCommit: Must be a lowercase 64-character hex SHA-256 string. Do not include a 0x prefix.
- Supported Chains: 1, 10, 56, 137, 999, 8453, 42161
Step 2: Route the Transaction Once you hold a valid Intent Attestation, you have exactly 60 seconds to execute the transaction. Read operations are public. Write operations require your Intent Attestation. Endpoints:
- Standard EVM: POST /rpc/:chainId
- Account Abstraction: POST /bundler/:chainId
Authorization: Bearer <jwt> or Sigil-Receipt: <jwt>.
Verifying Attestations Locally You do not need to trust the firewall blindly. You can verify Intent Attestations locally using Sigil’s published JWK set. Endpoint: GET /.well-known/jwks.json Verification rules are strictly defined in our canonical specification: sigil-attestations.