Ungate Wukong
  • 🔥Introduction
    • Overview
    • Features & Benefits
    • Scope
  • đź““ARCHITECTURE
    • Abstract
    • Keys Components
      • Confidential Compute
      • Proof Generation
      • Verification
      • Proof Exploration
  • 👩‍💼Operators
    • TestNet
      • Installation
      • Registration
      • Quickstart
Powered by GitBook
On this page
  • What Proof Exploration Enables
  • How Proof Exploration Works
  1. ARCHITECTURE
  2. Keys Components

Proof Exploration

Even with strong execution guarantees, users need visibility into agent behavior before interacting with them. Proof Exploration provides an interface for inspecting, analyzing, and validating execution proofs in real time.

What Proof Exploration Enables

  • Pre-execution verification: Users can inspect an agent’s past behavior before sending transactions.

  • Execution transparency: Full auditability of an agent’s interactions and transaction history.

  • Risk assessment: Ability to flag or blacklist agents that demonstrate suspicious behavior.

How Proof Exploration Works

  1. Users retrieve an agent’s execution proofs from decentralized storage.

  2. Execution logs are verified through cryptographic signatures and attestation records.

  3. AI model usage is analyzed to confirm that the agent called the intended models.

  4. Wallet sovereignty is checked to ensure that the agent has exclusive control over its assets.

PreviousVerificationNextTestNet

Last updated 3 months ago

đź““