# SentryAgent.ai — Company and Product Overview --- ## 1. Company Mission SentryAgent.ai is building the world's first free, open-source Agent Identity Provider (AgentIdP) — democratising AI agent authentication, authorisation, and governance for developers worldwide. The core problem it solves is one that did not have a standard answer until now: when an AI agent needs to call an API, how does it prove who it is? How does it obtain a short-lived token? How does a security team revoke its access the moment it is compromised? How does compliance require a full, tamper-proof record of everything that agent ever did? Traditional identity infrastructure — built for humans and static service accounts — was not designed for the fluid lifecycle of AI agents. AgentIdP is the answer. It is a REST API server that acts as an identity provider designed specifically for non-human AI agents. Agents register with a stable UUID identity, authenticate via the OAuth 2.0 Client Credentials grant (RFC 6749), receive short-lived RS256 JWTs, and are governed by an OPA policy engine that enforces capability-based access control at runtime. Every significant event is written to an immutable audit log. The entire system is built on open standards: OAuth 2.0, RFC 7662 (introspection), RFC 7009 (revocation), OpenAPI 3.0, and the AGNTCY interoperability standard from the Linux Foundation. The market context is one of rapid proliferation. Enterprises are deploying dozens, then hundreds, then thousands of autonomous AI agents — each one acting on behalf of the organisation, calling APIs, reading sensitive data, and making decisions. Without standardised identity infrastructure, there is no way to audit what happened, no way to revoke a compromised agent cleanly, and no standard protocol for agents from different vendors to authenticate to each other. SentryAgent.ai fills this gap, providing every developer — from a student working alone to a global enterprise — the same enterprise-grade identity layer for free. --- ## 2. What is AGNTCY? AGNTCY (pronounced "agency") is an open interoperability standard for AI agents, maintained under the Linux Foundation. Its central premise is that AI agents must be treated as first-class identities — with stable identifiers, standard authentication protocols, lifecycle management, and accountability mechanisms — in the same way that human users and cloud service accounts are today. AgentIdP is the first production IdP implementing AGNTCY-aligned agent identity across all six AGNTCY domains: | AGNTCY Domain | How AgentIdP Implements It | |---------------|---------------------------| | Non-Human Identity | Every agent receives an immutable UUID (`agentId`) assigned at registration. The identifier is DID-ready — structured to be portable into W3C DID documents in Phase 3. | | Agent Registry | `POST /api/v1/agents` registers an agent. `GET /api/v1/agents` lists all agents. `GET /api/v1/agents/:id` retrieves a single agent by UUID. | | Credential Management | Each agent holds one or more `(client_id, client_secret)` credential pairs. Secrets are bcrypt-hashed in PostgreSQL or stored in HashiCorp Vault KV v2. Credentials can be rotated and revoked independently. | | Authentication | OAuth 2.0 Client Credentials grant per RFC 6749. Agents POST `grant_type=client_credentials` with their `client_id` and `client_secret` to receive a signed RS256 JWT. | | Lifecycle | Agents transition through `active`, `suspended`, and `decommissioned` states. Decommissioning is a soft delete that cascades to revoke all active credentials. Suspended agents cannot obtain new tokens. | | Audit | Every significant platform event is written to an immutable `audit_events` table in PostgreSQL. Events carry `agentId`, `action`, `outcome`, `ipAddress`, `userAgent`, `metadata`, and `timestamp`. The free tier retains 90 days of history. | --- ## 3. Product Features | Feature | Endpoint(s) | Notes | |---------|-------------|-------| | Agent Registry | `POST /api/v1/agents`, `GET /api/v1/agents`, `GET /api/v1/agents/:id`, `PATCH /api/v1/agents/:id`, `DELETE /api/v1/agents/:id` | Full CRUD with lifecycle; free tier capped at 100 registered agents | | OAuth 2.0 Token Issuance | `POST /api/v1/token` | Client Credentials flow (RFC 6749); issues RS256 JWTs; free tier capped at 10,000 tokens/month | | Token Introspection | `POST /api/v1/token/introspect` | RFC 7662 compliant; always returns 200, check `active` field | | Token Revocation | `POST /api/v1/token/revoke` | RFC 7009 compliant; idempotent; agents may only revoke their own tokens | | Credential Management | `POST /api/v1/agents/:id/credentials`, `GET /api/v1/agents/:id/credentials`, `DELETE /api/v1/agents/:id/credentials/:credId` | `client_secret` returned once on creation; never retrievable again | | Credential Rotation | `POST /api/v1/agents/:id/credentials/:credId/rotate` | Generates new secret; old secret immediately invalidated; atomic | | Audit Log | `GET /api/v1/audit`, `GET /api/v1/audit/:id` | Immutable, filterable by `agentId`, `action`, `outcome`, date range; paginated | | Web Dashboard | `/dashboard` | React 18 SPA — agents list, agent detail, credentials management, audit log, health views | | OPA Policy Engine | (middleware on all protected routes) | Dynamic scope-based authorisation; Rego policy in `policies/authz.rego`; hot-reload via SIGHUP | | Prometheus Metrics | `GET /metrics` | prom-client; all HTTP routes instrumented with request counter and duration histogram | | HashiCorp Vault | (opt-in, via `VAULT_ADDR` + `VAULT_TOKEN`) | KV v2 secret storage; constant-time comparison; bcrypt fallback when Vault is not configured | | Health Check | `GET /health` | Checks PostgreSQL and Redis connectivity; unauthenticated; used by load balancers | | W3C Decentralised Identifiers | `GET /api/v1/agents/:id/did`, `GET /api/v1/.well-known/did.json` | DID Core 1.0 documents; `did:web` method; EC P-256 keys; AGNTCY extension fields | | AGNTCY Agent Cards | `GET /api/v1/agents/:id/card` | Machine-readable agent identity summary; AGNTCY schema v1.0 | | AGNTCY Compliance Reports | `GET /api/v1/compliance/report`, `GET /api/v1/compliance/agent-cards` | Compliance sections: agent-identity + audit-trail; cached 5 min; AGNTCY schema v1.0 | | Federation (Cross-IdP) | `POST /api/v1/federation/partners`, `GET /api/v1/federation/partners`, `POST /api/v1/federation/verify` | Register partner IdPs; verify cross-IdP JWTs using cached partner JWKS | | A2A Delegation | `POST /api/v1/oauth2/token/delegate`, `POST /api/v1/oauth2/token/verify-delegation` | Agent-to-agent delegation tokens; OIDC provider (oidc-provider v9) mounted at `/oidc` | | Webhook Subscriptions | `POST /api/v1/webhooks`, `GET /api/v1/webhooks`, `GET /api/v1/webhooks/:id/deliveries` | Outbound event delivery with HMAC signing; Vault-backed secrets; delivery history | | Tier Management | `GET /api/v1/tiers/status`, `POST /api/v1/tiers/upgrade` | Free / Pro / Enterprise tiers; daily call and token limits; Stripe Checkout upgrade flow | | Billing | `POST /api/v1/billing/checkout`, `POST /api/v1/billing/webhook`, `GET /api/v1/billing/status` | Stripe subscription management; webhook event processing | | Analytics | Internal (via `AnalyticsService`) | Daily aggregated event counts per org; token trend queries (up to 90 days); agent activity heatmap; usage summary | | Developer Portal | `/portal` (Next.js 14, separate process) | Get-started wizard, SDK explorer, API reference, analytics dashboard, pricing page | --- ## 4. Phase Roadmap | Phase | Status | Key Deliverables | |-------|--------|-----------------| | Phase 1 — MVP | COMPLETE | Agent registry, OAuth 2.0 Client Credentials (RS256 JWTs), credential management (bcrypt), immutable audit log, Node.js SDK, Dockerfile, Docker Compose, AGNTCY alignment documentation, >80% test coverage | | Phase 2 — Production-Ready | COMPLETE | HashiCorp Vault opt-in integration, Python SDK (sync + async), Go SDK (context-aware), Java SDK (builder + CompletableFuture), OPA policy engine (Rego + Wasm + TypeScript fallback), React 18 + Vite 5 web dashboard, Prometheus metrics + Grafana dashboards, Terraform multi-region deployment (AWS ECS + RDS + ElastiCache; GCP Cloud Run + Cloud SQL + Memorystore) | | Phase 3 — Enterprise | COMPLETE | AGNTCY federation (cross-IdP agent identity), W3C Decentralised Identifiers (DIDs), agent marketplace, OIDC provider (A2A delegation), Rust SDK, developer portal (Next.js 14) | | Phase 4 — Compliance & Security | COMPLETE | AGNTCY compliance reports (agent-identity + audit-trail sections), audit hash chain verification, SOC 2 CC6.1 AES-256-CBC column encryption (`EncryptionService`), DID document caching, federation partner JWKS caching | | Phase 5 — Scale & Ecosystem | COMPLETE | Multi-tier subscription model (free/pro/enterprise), Stripe billing integration (`BillingService`, `TierService`), tier enforcement middleware (daily call and token limits), webhook subscriptions + delivery history (`WebhookService`), analytics service (daily event aggregation + trend queries) | | Phase 6 — Market Expansion | COMPLETE | AGNTCY conformance test suite (4 conformance scenarios), API tiers enforced end-to-end, analytics dashboard in developer portal, full Phase 6 engineering documentation update | --- ## 5. Virtual Engineering Team SentryAgent.ai uses a Virtual Engineering Team (VET) model — all engineering work is designed, implemented, tested, and reviewed by Claude Code instances fulfilling defined engineering roles. The CEO (human) is the sole business decision-maker. The CTO (Claude) owns technical architecture and manages the engineering team autonomously. The team follows a strict spec-first workflow governed by the OpenSpec change management process: no implementation begins until an OpenAPI specification is approved by the CTO. | Role | Responsibility | Approval Gate | |------|---------------|---------------| | CEO | Business priorities, scope approval, architecture approval | All scope changes, new dependencies, git push to main | | Virtual CTO | Architecture, technical standards, engineering team coordination, risk management | Reports to CEO; approves all implementation before commit; approves all QA sign-offs before merge | | Virtual Architect | OpenAPI specs, ADRs, system design, database schemas | CTO review required before implementation begins | | Virtual Principal Developer | TypeScript implementation per approved spec; JSDoc; zero `any` types | CTO review required before QA begins | | Virtual QA Engineer | Jest + Supertest test suites; >80% coverage; all quality gates | All gates must pass before CTO signs off for merge | --- ## 6. Free Tier Limits | Limit | Free Tier | Pro Tier | Enterprise Tier | |-------|-----------|----------|-----------------| | Max agents | 100 | 1,000 | Unlimited | | Max API calls per day | Configured in `TIER_CONFIG` | Configured in `TIER_CONFIG` | Unlimited | | Max tokens per day | Configured in `TIER_CONFIG` | Configured in `TIER_CONFIG` | Unlimited | | Token TTL | 3,600 seconds (1 hour) | 3,600 seconds (1 hour) | 3,600 seconds (1 hour) | | Audit log retention | 90 days | 1 year | Custom | | API rate limit (per IP) | 100 req/min | 100 req/min | 100 req/min | | Webhook subscriptions | 0 | 10 | Unlimited | | Analytics retention | 90 days | 1 year | Custom | Tier limits are configured in `src/config/tiers.ts` (`TIER_CONFIG`). Enforcement is handled by `TierService.enforceAgentLimit()` (agent cap) and `src/middleware/tier.ts` (daily call/token caps). Tier upgrades are initiated via `POST /api/v1/tiers/upgrade` and confirmed via the Stripe webhook.