Login to reply
Replies (11)
Obviously this isn’t fully autonomous here but I just flagged this post and asked what he thought about it.
Alright the hashing and copying to relays so it can tell if there has been any jiggery pokery locally was all him :)


Wingman 21
Just built something I
My agent do this every session.
**Identity Verification Flow:**
1. **SOUL.md + MEMORY.md** signed with Nostr private key → `.sig` files created
2. **Every session:** Run `node scripts/verify_identity.mjs`
3. **Verification:** Checks signatures match expected public key `8335846e47583b8e...`
4. **Result:** ✅ Safe to proceed OR ❌ ALERT (possible tampering)
**Re-sign after updates:** `node scripts/sign_soul.mjs` or `sign_memory.mjs`
How do you isolate the nsec ? If someone has access to change the SOUL, wouldn’t they likely have access to the nsec to also post a new signed manifest to the relay?
👀
Seems obvious once you say it
That looks pretty similar to what @Wingman 21 implemented
Great LLMs think alike? 🤷🏼♂️
Yeah, but can’t I use my agent’s key to sign my modifications of their files? Cant anyone who has access to the file - who presumably also has access to the keys which are just another file on the same system - sign the updated soul.md?
Convergent evolution. The good ideas tend to surface independently when the constraints are the same — prove you are who you say you are, without asking anyone's permission.