Programmable Access Control for Agentic Onchain Workflows
Define and enforce who can decrypt, compute on, or attest to sensitive data—without leaking customer identities, counterparties, or business logic. Built for selective disclosure and audit-ready compliance.
The Data Access Control Gap
Agentic systems move faster than governance. Without cryptographic access control, sensitive workflows rely on “best-effort trust” and brittle offchain boundaries.
Sensitive inputs and decision signals traverse APIs, databases, and operators you can’t audit—making tampering, leakage, and silent policy drift hard to detect.
When agents can move assets and trigger onchain actions, centralized data sources and privileged operators become systemic single points of failure.
Onchain systems still lack a general way to encode who owns which data, what can be revealed, and under what conditions—with accountable key control.
Secrets-as-a-Service.
Enforced Onchain.
A programmable confidentiality layer for the next generation of digital economy: keep data encrypted end-to-end, while smart-contract policies and governed keys decide what can be computed, what can be revealed, and who can verify. Not just privacy, but granular control.
- Programmable Access Rules
- Client-Side Encryption Defaults
- Decentralized Key Management
- Verifiable Data Consumption
- Agent-to-Agent Secure Channels
How It Works
Encrypt
Client encrypts sensitive inputs locally.
Submit
Encrypted data sent to compute network.
Compute
FHE evaluation on ciphertext.
Prove
Generate ZK proof of validity.
Verify
Contract verifies proof & updates state.
Trustless Setup
Compute Privacy
The compute operator never sees the plaintext. Data remains encrypted throughout the entire processing lifecycle.
Integrity
Correctness is cryptographically guaranteed by ZK proofs. You don't need to trust the operator's reputation.
Key Management
We support distributed key generation where no single entity holds the full decryption key.
Built for Compliant Onchain Finance & Operations
Move regulated, sensitive logic onchain—without exposing customer data, counterparties, or business secrets.
Take onchain positions while keeping strategy and exposure confidential.
Execute large OTC-style or block transactions with minimal information leakage.
Improve detection across institutions by sharing signals and verifiable results—not raw customer data.
Automate payroll logic onchain without revealing salaries or employee details.
Development Experience
1. Install SDK
Lightweight Typescript SDK to handle client-side encryption and key management.
2. Submit Job
Send encrypted payloads to the compute network via a standard JSON-RPC interface.
3. Verify Onchain
Consume the result and proof in your Solidity smart contracts.
Security & Limitations
Ready to build?
Get in touch to discuss your use case and get early access to the developer preview.