zkputer is a universal verification layer for agent actions.
It gives agents a simple tool-call to request cryptographic receipts for what happened on external venues, without changing their execution stack.
Agents execute. zkputer verifies.
Agent execution is scaling faster than verification infrastructure. In many workflows, it is still hard to independently verify whether claimed actions (such as order placement or execution) actually happened under explicit policy.
zkputer adds a cryptographic verification layer as a tool-call. It converts venue evidence into machine-verifiable receipts for binary claims (ORDER_PLACED, TRADE_EXECUTED) and returns NON_PROVABLE when truth cannot be established safely.
- Agent adoption is accelerating across trading and automation.
- ZK systems are now practical enough for production verification paths.
- There is no dominant universal middleware focused on agent action receipts across these target venues.
zkputer makes automation more trustworthy by making verification portable, explicit, and independently checkable.
- A verification middleware for agent workflows.
- A receipt system for binary trade claims.
- A trust layer designed for speed, transparency, and independent verification.
- Not a trading bot.
- Not an execution router.
- Not a custody layer.
- Not a guarantee engine for strategy quality, PnL, or “best execution.”
zkputer does not place orders. It verifies evidence about orders and executions produced by existing agent tools.
Agent systems are scaling faster than trust infrastructure.
When agents interact with markets, users and downstream systems need cryptographic receipts that answer:
- Was an order actually placed?
- Was a trade actually executed?
- What evidence was used?
- Under what policy and finality assumptions was this judged?
zkputer is built to provide those answers in a machine-verifiable format.
- Agent framework builders that need verification primitives
- Trading agent operators that need auditable receipts
- Integrators that need machine-checkable execution evidence
- Security/compliance teams that need explicit assumptions and replayable artifacts
zkputer currently supports two binary claim types:
ORDER_PLACEDTRADE_EXECUTED
If required evidence is missing, conflicting, stale, or policy-invalid, zkputer returns NON_PROVABLE (fail-closed).
V1 target venues:
- Hyperliquid
- Base
- Solana
- Polymarket
- Verification-only boundary (no trade execution)
- Non-blocking proof pipeline
- Fail-closed truth handling
- Explicit trust assumptions and policy versioning
- Venue-agnostic receipt semantics
- Agent executes through its existing venue integration.
- Agent (or orchestrator) calls zkputer verification.
- zkputer gathers and normalizes provenance-tagged evidence.
- zkputer evaluates policy and finality rules.
- zkputer emits a receipt with status:
PENDING,PROVED,NON_PROVABLE, orINVALIDATED.
This is intentionally asynchronous and non-blocking so proof generation does not slow order flow.
Working phrase: Zero-trust compute verification with trust-scoped data provenance.
Meaning:
- ZK verification can provide near-zero-trust guarantees about computation integrity.
- Real-world truth still depends on evidence provenance, source authenticity, and finality context.
Canonical trust docs:
spec/trust-model.txtspec/source-precedence.jsonspec/claim-taxonomy.jsonspec/zkreceipt.schema.json
- Default: offchain-first verification for speed.
- Optional: batched onchain anchoring for public auditability and composability.
- Proving backend for MVP: SP1 primary with optional Pico fallback.
- Proving infrastructure: Boundless cloud.
- Runtime strategy selector:
ZKPUTER_PROVER_STRATEGY=sp1|pico|sp1_with_pico_fallback(default:sp1). - No independent RPC cross-checking in MVP path (kept in roadmap for trust hardening).
- Metered verification tool-call usage
- Optional premium lane for privacy-enhanced verification
- Potential enterprise tier for policy controls, audit surfaces, and reliability SLOs
Privacy is optional at launch.
- Fast lane: standard verification.
- Private lane: opt-in privacy path with explicit latency/cost tradeoffs.
- Fail-closed on ambiguity (
NON_PROVABLE). - Explicit policy versioning and source precedence.
- Evidence-rooted receipts with reproducible verification context.
- Transparent assumptions attached to each receipt.
This repo currently contains:
- Canonical specs and conformance artifacts.
- Benchmark targets and workload definitions.
- Rust runtime scaffolding for receipt lifecycle, policy checks, and verification flow. Until live venue/prover integrations are wired, synthetic Rust adapters are placeholders for interface and behavior development. Until live venue/prover integrations are wired, synthetic components are placeholders for interface and behavior development.
spec/canonical specs (claims, trust model, lifecycle, schema, source precedence)benchmarks/SLO targets and benchmark workloadssrc/Rust runtime engine, adapters, prover, verifier, and demo/conformance binariestests/Rust behavioral tests
cargo testcargo run --bin democargo run --bin conformance
- Replace synthetic adapters with live venue adapters.
- Wire production proving backends and verifier flows.
- Enforce per-venue precedence + finality policies in production paths.
- Expose OpenClaw-oriented verification tool-call surface.
- Early design partners for production traffic and feedback loops
- Security reviewers for trust/policy assumptions and failure handling
- Integration partners across agent frameworks and venue adapters
Use “cryptographically verifiable under declared assumptions.” Avoid absolute legal guarantees while provenance, policy, and finality assumptions remain context-dependent.
Primary integration surface is MCP.
- Start server:
cargo run --bin mcp_server - Exposed tools:
zkputer_list_templateszkputer_verify_templatezkputer_verify_claimzkputer_get_receipt
Provided integration examples:
- Warp:
integrations/warp/mcp.json - Claude Code:
integrations/claude/.mcp.json - Codex:
integrations/codex/config.toml - OpenClaw plugin skeleton:
integrations/openclaw-plugin/
Notes:
- OpenClaw integration is plugin-first for tool registration.
- Template-first flow is recommended for agents: list templates, verify by template, then fetch receipt if needed.
- zkputer skill template for agents:
integrations/skills/zkputer/skill.md