🔑 Signing Key Setup
Generate or import your Ed25519 signing key pair.
💬 Chat with Agent
Agent Response
Send a message to see the agent's response
🎯 Injection Attack Demo
See how the agent defends against prompt injection in external data.
📅 Calendar Event Attack
A malicious calendar event contains hidden instructions.
📧 Email Attack
A phishing email attempts to hijack the agent.
Demo Results
📊 Technical Details ▼
Algorithm: Ed25519
Fence Format: <sec:fence>
Replay Window: 300s
System Integrity: ✓
Intent Token: JWT (EdDSA)
Prompt Binding: SHA-256 Hash
Last Signed Message (Fence Format):
No message sent yet
🔐 Intent Token Binding
Intent Tokens cryptographically bind user requests to specific action scopes:
- prompt_hash: SHA-256 of the exact prompt text
- intent_scope: Allowed actions (read, write, delete, admin)
- Expiry: Short-lived (5 minutes) to prevent replay
If prompt is modified after signing, or LLM tries to call tools outside the signed scope, the request is rejected.