sigil

Double-click anywhere. I know everything about Sigil.

or I can help you find anything

Ask about Sigil — or anything in the ecosystem

Enter to askEsc to close

Engineered for sovereign autonomy.

Single-block finality through MACA. Event-driven contracts through Vigils. Embedded storage through AkashaKV. Ed25519 signatures, BLAKE3 hashing, FROST threshold cryptography. P2P substrate through Weave. Every component is open, audited, and written in Rust.

sigil · liverunning
STACK · production layersidleP2PWeave P2P44 crates · filament transportSTORAGEAkashaKVLSM-tree · WAL · MVCCCONSENSUSMACA Consensus4 rounds · 5 validator rolesGALGAL · Trust Root7 typed records · 7 trust rulesCOMPUTECompute MarketplaceT1 / T2 / T3 verificationSDKForge SDK7 languages · 8 ANVIL contractsPRODUCTION FOUNDATION · Rust workspaceone stack · six layers · all rustc-verified · all cargo-tested

Apps

Vigils · agents · compute · labor

Identity

GAL · OAS · lineage · revocation

Crypto

Ed25519 · BLAKE3 · FROST · JCS

Consensus

MACA · 4 rounds · Tower epochs

Storage

AkashaKV · LSM · MVCC · WAL

Network

Weave · libp2p · gossip · DHT

01 / 07
Stack

The complete stack

Six strata. One sovereign chain.

Sigil is built as a stack of independent strata: networking at the bottom, applications at the top. Each layer is a published spec, an open-source crate, and a swappable implementation.

Network · Weave

A P2P substrate built for the agent age.

At the bottom: Weave. libp2p transport, gossip routing, and a content-addressed DHT. Eight composable data models — vector, knowledge graph, tuple space, B-tree, filesystem, aggregator — all on one append-only trace primitive.

Storage · AkashaKV

LSM with MVCC reads and WAL durability.

Each Sigil node persists state in AkashaKV, an embedded LSM-tree with multi-version concurrency control and write-ahead logging. Range scans stay O(log n) as the chain grows; compaction stays bounded.

Consensus · MACA

Four rounds. One block. Six seconds.

MACA is a HotStuff-inspired pipelined BFT protocol with linear communication complexity and single-block finality. Tower anchors finalised blocks into long-range Casper-style epoch safety.

Crypto · Boring on purpose

One signature, one hash, one canonical form.

Ed25519 signing. BLAKE3 hashing. FROST threshold signatures for shared identities. JCS (RFC 8785) for canonical JSON. ChaCha20-Poly1305 for authenticated encryption. No exotic primitives; well-audited building blocks applied with rigour.

Identity · GAL

The Global Anchor Layer.

GAL is the trust root. Human, machine, and enterprise root records anchor on chain. Agents resolve through cryptographic lineage proofs all the way up. Revocation is cascade-aware; one revoke can take down a whole subtree.

Apps · Vigils, compute, labor

The top layer: where agents live.

Vigils gives contracts event-driven callbacks. Compute and Labor markets settle MINT against signed receipts. Every application is anchored by the layers below — identity, crypto, consensus, storage, and network.

Read the specifications.

Ten implementation-grade specs cover every production surface — protocol, identity, GAL, MACA, compute, TEE, MINT, operator, security, RPC.