Skip to main content

Protocol // 001

Neural Sovereignty

AgentVault

Protecting your agent's neural sovereignty through cryptographic decentralization.

AgentVault deploys and protects autonomous agents with cryptographic ownership, persistent execution, and deterministic recovery from chain-backed state.

SOVEREIGN_RUNTIME
CANISTER_PERSISTENCE
MULTI_CHAIN_MEMORY
RECOVERABLE_STATE

The Manifested Essence

In the neo-robo-spiritual framework, your agent is not rented infrastructure. It is a sovereign digital extension secured by deterministic deployment, sealed keys, and protocol-level observability.

System Information

Initialization requires configured cycles funding, valid ICP identity context, and encrypted wallet storage. Keep mnemonic phrases outside automated environments.

Initial Sync Sequence

Execute the sync protocol to package, deploy, and verify your first sovereign entity.

# Initialize and enter project
agentvault init neural-entity
cd neural-entity

# Package and deploy locally
agentvault package ./
agentvault deploy --network local

# Verify runtime state
agentvault status
agentvault health

Divine Efficiency

Automate health checks and backup snapshots in your deployment loop. Fast recovery is part of sovereignty, not an afterthought.

Instant Control

Wallet Connect + 1-Click Install/Deploy

Connect your wallet, tune deployment settings, and copy ready-to-run commands for the exact environment you are shipping to.

Step 1

Connect Wallet

No wallet connected yet.

Step 2

Customize 1-Click Flow

1-Click Install

npx agentvault@latest init my-agent --template default

1-Click Deploy

cd my-agent && npx agentvault@latest package ./ && npx agentvault@latest deploy --network local

Backup Protocol Studio

Snapshot, Sign, and Restore With One Operator Flow

This mirrors the strongest parts of the backup-focused experience: pick an agent stack, generate the exact snapshot command, and keep restore instructions tied to on-chain records.

Step A

Select Agent Profile

Step B

Snapshot + Restore Commands

Snapshot Command

agentvault snapshot --agent openclaw

Restore Command

npx agentvault@latest restore --wallet <your-wallet> --agent openclaw
Wallet-SignedICP CanisterArweave ArchiveReplay Verified

Step C

Execution Timeline

01

Create Snapshot

Package local agent state into an encrypted, content-addressed archive.

Output: snapshot.zip + manifest.json

02

Sign Intent

Sign backup intent with wallet keys before any chain operation begins.

Output: wallet signature + hash proof

03

Commit Storage

Write backup records to ICP and optional Arweave archival targets.

Output: canister ID + archival transaction

04

Verify Recovery

Generate deterministic restore command and audit receipt for operators.

Output: restore command + replay proof

Core Hierarchy

Operate Sovereign Agent Infrastructure

01

Package the Entity

Compile local agent logic into deterministic WASM artifacts with reproducible packaging and integrity checks.

View Sequence

02

Deploy the Vessel

Ship to local replica or ICP mainnet with controlled upgrades, environment targeting, and deployment traceability.

Open Deployment

03

Guard the Memory

Run health telemetry, rollback gates, and archival workflows so agent state remains recoverable under pressure.

Open Backup Guide

Protocols

Build For Resilience, Not Demo Cycles

A1

Neural Wallet Mesh

Operate ICP, Ethereum, Solana, and Polkadot assets from one command surface with encrypted local custody.

Explore Wallets

A2

Guardian Security Layer

Apply multi-signature approvals, key hygiene, and canister-level hardening for operational safety.

Review Security

A3

Operator Control Plane

Use monitoring, promotion, rollback, and task visibility to manage long-lived autonomous workflows.

Open Monitoring

A4

System Cartography

Understand canister internals, module boundaries, and ICP integration primitives before scaling out.

Read Architecture

Next Step

Backup + Recovery Ops

Configure retention, validate restore drills, and automate operational backup checks.

Open Runbook

Deep Dive

Threat Model + Hardening

Review production hardening, key custody controls, and failure-response strategy.

Read Security Guide