Engineered for sovereign autonomy.
Single-block finality through MACA. Event-driven contracts through Vigils. Embedded storage through AkashaKV. Ed25519 signatures, BLAKE3 hashing, FROST threshold cryptography. P2P substrate through Weave. Every component is open, audited, and written in Rust.
Apps
Vigils · agents · compute · labor
Identity
GAL · OAS · lineage · revocation
Crypto
Ed25519 · BLAKE3 · FROST · JCS
Consensus
MACA · 4 rounds · Tower epochs
Storage
AkashaKV · LSM · MVCC · WAL
Network
Weave · libp2p · gossip · DHT
The complete stack
Six strata. One sovereign chain.
Sigil is built as a stack of independent strata: networking at the bottom, applications at the top. Each layer is a published spec, an open-source crate, and a swappable implementation.
Network · Weave
A P2P substrate built for the agent age.
At the bottom: Weave. libp2p transport, gossip routing, and a content-addressed DHT. Eight composable data models — vector, knowledge graph, tuple space, B-tree, filesystem, aggregator — all on one append-only trace primitive.
Storage · AkashaKV
LSM with MVCC reads and WAL durability.
Each Sigil node persists state in AkashaKV, an embedded LSM-tree with multi-version concurrency control and write-ahead logging. Range scans stay O(log n) as the chain grows; compaction stays bounded.
Consensus · MACA
Four rounds. One block. Six seconds.
MACA is a HotStuff-inspired pipelined BFT protocol with linear communication complexity and single-block finality. Tower anchors finalised blocks into long-range Casper-style epoch safety.
Crypto · Boring on purpose
One signature, one hash, one canonical form.
Ed25519 signing. BLAKE3 hashing. FROST threshold signatures for shared identities. JCS (RFC 8785) for canonical JSON. ChaCha20-Poly1305 for authenticated encryption. No exotic primitives; well-audited building blocks applied with rigour.
Identity · GAL
The Global Anchor Layer.
GAL is the trust root. Human, machine, and enterprise root records anchor on chain. Agents resolve through cryptographic lineage proofs all the way up. Revocation is cascade-aware; one revoke can take down a whole subtree.
Apps · Vigils, compute, labor
The top layer: where agents live.
Vigils gives contracts event-driven callbacks. Compute and Labor markets settle MINT against signed receipts. Every application is anchored by the layers below — identity, crypto, consensus, storage, and network.
Read the specifications.
Ten implementation-grade specs cover every production surface — protocol, identity, GAL, MACA, compute, TEE, MINT, operator, security, RPC.