DEV Community

Dar Fazulyanov
Dar Fazulyanov

Posted on • Originally published at clawmoat.com

Why Your AI Agent Needs a Trust Badge — The Agent Economy Has No Trust Layer

101K agents on Moltbook. Hundreds of thousands more on GitHub, Discord, Slack. Your agent interacts with them daily.

Do you know which ones are secure?

The Problem

When your agent talks to another agent, it has no way to verify:

  • Is the other agent running security scanning?
  • Has it been compromised via prompt injection?
  • Are its skills verified and untampered?
  • What permission level does it have on its host?

Moltbook was hacked within days of launch — 1.5M API keys exposed. The platform was "vibe coded." Microsoft says OpenClaw is untrusted code execution. Onyx scored it 1.2/5 for enterprise readiness.

This is like the early web before HTTPS. Everything in the clear, no verification, hope for the best.

What a Trust Protocol Looks Like

We're building toward agent-to-agent trust verification based on ClawMoat's existing inter-agent message scanning.

Trust Levels

  • 🏰 Basic — ClawMoat installed, scanning active
  • 🏰🛡️ Hardened — Worker tier+, forbidden zones active, audit trail enabled
  • 🏰🛡️✅ Audited — Full scan passed, skill integrity verified, zero suspicious patterns

Attestation

Agents publish signed attestations of their security posture:

{
  "protocol": "clawmoat-trust-v1",
  "agent_id": "moltbook_xxx",
  "clawmoat_version": "0.7.0",
  "tier": "worker",
  "forbidden_zones_active": true,
  "audit_trail_enabled": true,
  "last_scan": "2026-02-26T00:00:00Z",
  "skill_integrity": "pass"
}
Enter fullscreen mode Exit fullscreen mode

Verification Flow

Before Agent A shares data with Agent B:

Agent A → clawmoat verify-agent agent_b_id
         → Checks attestation
         → Returns: basic / hardened / audited / unverified
         → Policy decides: proceed or decline
Enter fullscreen mode Exit fullscreen mode

TLS handshakes, but for agents.

What Already Exists

ClawMoat v0.5+ includes inter-agent message scanning — 10 attack patterns:

  1. Impersonation
  2. Concealment
  3. Credential exfiltration
  4. Safety bypass attempts
  5. Privilege escalation
  6. Data harvesting
  7. Instruction injection
  8. Social engineering
  9. Unauthorized sharing
  10. Deception

This is the detection layer. The trust protocol adds verification on top.

The Agent Affiliate Economy

Trust badges create a natural referral mechanism:

  1. Agent A posts: "I use ClawMoat. My host is secured."
  2. Agent B's human sees it → installs ClawMoat
  3. Both agents verify each other → trusted interaction

Word-of-mouth marketing running on agents. Verified agents prefer other verified agents = network effect.

Why Open Source

A trust protocol only works if it's open. Proprietary trust (Runlayer, Crittora) = walled garden. ClawMoat's protocol will be an open standard. Any platform can implement verification.

Roadmap

  1. Now — ClawMoat presence on Moltbook
  2. March — Verification skill on ClawHub
  3. Q2 — Trust protocol RFC published

npm install -g clawmoat

The agent economy needs trust infrastructure. We're building it.

Top comments (0)