Ungate Wukong
  • 🔥Introduction
    • Overview
    • Features & Benefits
    • Scope
  • 📓ARCHITECTURE
    • Abstract
    • Keys Components
      • Confidential Compute
      • Proof Generation
      • Verification
      • Proof Exploration
  • 👩‍💼Operators
    • TestNet
      • Installation
      • Registration
      • Quickstart
Powered by GitBook
On this page
  1. ARCHITECTURE

Abstract

PreviousScopeNextKeys Components

Last updated 3 months ago

Ungate Wukong leverages EigenLayer’s decentralized security infrastructure to establish a trust-minimized framework for Verifiable Agents. Here’s how:

Why EigenLayer?

EigenLayer's economic security and validation infrastructure enables agent developers to act in an accountable manner, ensuring that their AI-driven operations can be transparently verified by multiple parties. This multi-party verification mechanism fosters significant trust among end-users, providing them with confidence in the integrity and autonomy of deployed agents.

The Verification Process

  1. Agent Deployment → Developers launch agents inside Ungate Wukong’s verifiable cloud.

  2. Execution & Proof Generation → Each action is logged, signed, and stored.

  3. Decentralized Verification → Validators on EigenLayer verify execution proofs.

  4. On-Chain Auditing → Users can audit and track agent behavior transparently.

Security & Trust Model

  • TEE Isolation – Prevents tampering by separating execution from external control.

  • Slashing Mechanisms – Malicious actors lose their stake for misbehavior.

  • Validator Incentives – Validators earn rewards for securing agent execution integrity.

📓
Wukong Flow