Skip to main content

Platform Architecture

AgentaOS is a managed platform. You use the CLI, SDK, or dashboard. We handle the infrastructure. Here’s what runs behind the scenes.

Components

ComponentWhat It Does
AgentaOS ServerRuns the signing protocol, evaluates guardrails, manages signers. NestJS API.
VaultStores server shares encrypted at rest (HashiCorp Vault KV v2).
DashboardWeb UI at app.agentaos.ai. Create signers, set guardrails, sign manually.
PostgreSQLStores signer metadata, policies, audit logs. No key material in the database.

Signing Flow

When your agent signs a transaction, this is what happens: Key properties:
  • The signer share never leaves your machine. Only protocol messages cross the wire.
  • The server share is wiped from memory after every operation (buffer.fill(0) in finally blocks).
  • Guardrails evaluate before signing starts. If any rule blocks, the server returns 403 and never co-signs.
  • The full private key never exists. Not during DKG. Not during signing. Not ever.

Authentication

Two authentication modes:
ModeWho Uses ItHow It Works
API KeyCLI, SDK, MCP serverx-api-key header. Key stored as SHA-256 hash on server.
JWT SessionDashboard (browser)Passkey (WebAuthn) login. Server issues HTTP-only JWT cookie.

Share Storage

ShareWhereEncryption
Signer shareYour machine (~/.agenta/)AES-256-GCM with scrypt KDF
Server shareHashiCorp Vault (KV v2)Vault transit encryption
User shareServer (opaque blob)AES-256-GCM, key from passkey PRF via HKDF
The server stores the user share blob but cannot decrypt it. The decryption key is derived from the user’s WebAuthn passkey. The server never sees the raw user share.

Health Check

The platform exposes a health endpoint:
curl https://api.agentaos.ai/health
Returns 200 when healthy, 503 when degraded. The health check verifies database connectivity and Vault reachability.

Next Steps