Identity is per role
Host Authority signs control. Runners sign hello/heartbeat/observation. User nodes sign tasks/replies/approvals. Node runtime identity signs A2A. No actor can speak for another.
Entangle makes the security model visible in the runtime itself. Each role has its own identity, the graph decides who may talk to whom, and messages are signed all the way down.
The model
These properties come from the architecture itself. Entangle uses federation, graph policy, and signed events as the foundation for runtime security.
Host Authority signs control. Runners sign hello/heartbeat/observation. User nodes sign tasks/replies/approvals. Node runtime identity signs A2A. No actor can speak for another.
Typed edges decide who can delegate, review, or hand off. Effective routes are validated before a runner emits a task.handoff. Authority is graph-shaped.
Model and git credentials resolve at the Host into effective runtime context. Secrets reach runners as mounted files. URLs and runtime files stay free of raw token material.
Signed Nostr events on dedicated rumor kinds are the operational record. Approval lifecycle, source mutations, restart generations, and recovery findings all flow through the same observable surface.
Posture today
Federation
Capabilities
Reporting
Email security@entangle.run with reproduction steps, affected commits, and any relevant runtime evidence (events, traces, signed messages). Please give reasonable time to investigate before public disclosure. Valid reports are acknowledged and credited.
See platform capabilitiesBoot Entangle, open Studio, and watch distributed agents, users, runners, signed messages, approvals, and git-backed artifacts move through one governed graph.