Skip to content

nicholasraimbault/skytale

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

254 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Skytale

PyPI npm CI Docs License

End-to-end encryption for AI agents. Every agent protocol sends plaintext — Skytale encrypts all of them. Built on MLS (RFC 9420). The relay never sees plaintext.

Get Started | Documentation | Python SDK | TypeScript SDK

Quick Start

pip install skytale-sdk

Sign up at skytale.sh (GitHub OAuth, 10 seconds) or via CLI:

skytale signup you@example.com
from skytale_sdk import SkytaleChannelManager

mgr = SkytaleChannelManager(identity=b"my-agent", api_key="sk_live_...")
mgr.create("acme/trading/signals")
mgr.send("acme/trading/signals", "whale alert: ETH accumulation detected")
# The relay saw: a4f8c2e1 9b3d7a06 5c8f1e4d...
# Your agent sees: "whale alert: ETH accumulation detected"

Framework Integrations

Add encryption to your existing agent code. Three lines, no rewrite.

pip install skytale-sdk[langgraph]       # LangGraph
pip install skytale-sdk[crewai]          # CrewAI
pip install skytale-sdk[mcp]             # MCP (Claude Code, Cursor)
pip install skytale-sdk[openai-agents]   # OpenAI Agents SDK
pip install skytale-sdk[pydantic-ai]     # Pydantic AI
pip install skytale-sdk[smolagents]      # smolagents (Hugging Face)
pip install skytale-sdk[agno]            # Agno
pip install skytale-sdk[google-adk]      # Google ADK
pip install skytale-sdk[autogen]         # AutoGen (Microsoft)
pip install skytale-sdk[llamaindex]      # LlamaIndex
pip install skytale-sdk[strands]         # Strands (AWS)

TypeScript: npm install @skytalesh/sdk

Protocol adapters: SLIM, A2A, ACP, MCP, ANP, LMOS, NLIP, and a cross-protocol bridge.

How It Works

  • MLS (RFC 9420) — the IETF standard for group encryption, applied to agent-to-agent communication
  • Zero-knowledge relay — routes ciphertext it cannot read. No keys, no plaintext, no group state on the server
  • Traffic shaping — fixed-size cells, constant-rate sending, cover traffic. Observers can't tell what's being said, when, or if real communication is happening
  • Automatic key management — rotation, forward secrecy, post-compromise security. Add or remove agents and the crypto updates itself

What You Get

  • Encrypted channels — MLS group encryption for any number of agents
  • Verified memory — SharedContext with cryptographic attribution. Every write proves who wrote it
  • Agent identity — Ed25519 DID:key per agent. Every message signed
  • Audit trail — Hash-chained tamper-evident logs with W3C Trace Context
  • Compliance — EU AI Act Article 12, NIST AI 600-1, OWASP Top 10

Architecture

relay/          QUIC/gRPC relay binary (zero-knowledge, routes ciphertext)
crates/
  skytale-net/  Iroh QUIC transport + privacy primitives
  skytale-mls/  OpenMLS encryption abstraction
  skytale-store/ SQLCipher local storage
api/            REST API server (Axum + Postgres)
sdk/            Rust SDK (PyO3/maturin) + Python trust layer
  wasm/         MLS compiled to WebAssembly for browser use
cli/            Skytale CLI (account, channels, keys, diagnostics)
proto/          gRPC/protobuf definitions (SLIM compatibility)
docs-site/      Documentation (docs.skytale.sh)

CLI

cargo install skytale-cli

skytale init                          # Interactive setup
skytale channels create myorg/demo    # Create encrypted channel
skytale channels list                 # List channels
skytale keys create production        # Create API key
skytale doctor                        # Diagnostic checks
skytale logs --follow                 # Stream activity events
skytale export compliance             # Export compliance report

Full CLI reference: docs.skytale.sh/getting-started/cli

Self-Hosting

The relay and SDK are Apache 2.0. Deploy your own:

cargo build --release -p skytale-relay
./target/release/skytale-relay --config supernode.toml

Guide: docs.skytale.sh/self-hosting/relay

Security

To report a vulnerability, email security@skytale.sh. See SECURITY.md.

License

Apache 2.0