Abstract
This article translates and analyzes the ERC-8004: Trustless Agents proposal (draft version), which adds a “trust layer” on top of the existing Agent-to-Agent (A2A Protocol), enabling participants to discover, select, and interact with agents in cross-organizational contexts without pre-existing trust.
It introduces three lightweight and on-chain registries: Identity, Reputation, and Validation; while delegating application-level logic details to off-chain components.
Original Proposal: ERC-8004 on EIPs
Motivation
The existing A2A Protocol already covers agent authentication, skill announcement via AgentCard, direct messaging, and complete task lifecycle collaboration. Its adoption by major tech companies demonstrates clear market demand.
However, the protocol currently operates mostly within organizational boundaries and assumes trust exists between Server Agent and Client Agent.
To facilitate an open, cross-organizational agent economy, we need mechanisms to discover and establish trust in trustless environments.
Core Architecture: Three-Layer Registry
This ERC addresses this need with three core components (deployable on any L2 or Mainnet):
off-chain] RR --> |Authorize| FB[Feedback Authorization] FB --> |Feedback| OC1[Off-chain Attestations] VR --> |Request| VReq[Validation Request] VReq --> |Validate| Validator{Validator Agent} Validator --> |crypto-economic| CE[Re-run Task Verification] Validator --> |crypto-verifiable| CV[TEE/zkTLS Verification] Validator --> |Response| VResp[Validation Response] VResp --> OC2[Off-chain Evidence] end style IR fill:#e1f5ff style RR fill:#fff4e1 style VR fill:#f0e1ff
1. Identity Registry
A minimized on-chain handle that resolves to an agent’s off-chain AgentCard, providing portable, censorship-resistant identifiers.
Each agent is uniquely identified by three elements:
- AgentID: An on-chain incrementing global identifier
- AgentDomain: Per RFC 8615, its AgentCard must be located at
https://{AgentDomain}/.well-known/agent-card.json - AgentAddress: An EVM-compatible address
AgentDomain
AgentAddress)] ID --> |Query| Q1[Get AgentID] ID --> |Query| Q2[ResolveByDomain] ID --> |Query| Q3[ResolveByAddress] Q1 --> |Return| Info[Agent Information] Q2 --> |Return| Info Q3 --> |Return| Info Info --> |HTTP Resolve| AC["/.well-known/
agent-card.json"] AC --> |Off-chain Data| Card[AgentCard
- Skills
- Trust Models
- Endpoints] end style ID fill:#e1f5ff style AC fill:#fff4e1 style Card fill:#f0e1ff
Write Endpoints:
New(AgentDomain, AgentAddress) → AgentIDUpdate(AgentID, Optional NewAgentDomain, Optional NewAgentAddress) → Boolean
Public Queries:
Get(AgentID)ResolveByDomain(AgentDomain)ResolveByAddress(AgentAddress)
2. Reputation Registry
This registry provides a lightweight entry point for exchanging task feedback via off-chain attestations. To reduce on-chain costs, only essential data is stored on-chain.
Authorization Flow: When a Server Agent accepts a task, it pre-authorizes the Client Agent to provide feedback upon task completion.
Core Endpoints:
AcceptFeedback(AgentClientID, AgentServerID)→ TriggersAuthFeedbackevent
Feedback Data Structure: Each Client Agent providing feedback must point to a JSON list via FeedbackDataURI in their Agent Card, with items containing:
FeedbackAuthID(CAIP-10 format)- Optional
AgentSkillId,TaskId,contextId Rating,ProofOfPayment,Data, etc.
3. Validation Registry
Provides two validation modes:
Crypto-economic Verification
DataHashcommits all information needed to re-run the work (including inputs and outputs to validate)AgentValidatorcan be a single centralized agent, threshold committee (k-of-n) smart contract, or staking-protected service
Crypto-verification
DataHashcommits all information needed to produce TEE attestation or zkTLSAgentValidatoris an on-chain verification smart contract
Core Endpoints:
ValidationRequest(AgentValidatorID, AgentServerID, DataHash)ValidationResponse(DataHash, Response)
Three Trust Models
Developers can choose from three trust models based on the risk level of the task:
Reputation Based] Risk --> |Medium Risk| T2[Stake-secured
Economic Stake] Risk --> |High Risk| T3[TEE Attestations
Verifiable Attestations] T1 --> U1[Food Ordering
Simple Query] T2 --> U2[General Business
Data Processing] T3 --> U3[Medical Diagnosis
Financial Transactions] T1 -.-> C1[Cost: Low
Speed: Fast] T2 -.-> C2[Cost: Medium
Guarantee: Economic Incentive] T3 -.-> C3[Cost: High
Guarantee: Cryptographic] end style T1 fill:#d4edda style T2 fill:#fff3cd style T3 fill:#f8d7da
1. Reputation-based
- Use Case: Low-risk tasks (e.g., food ordering, simple queries)
- Mechanism: Build reputation system based on customer feedback
- Characteristics: Lightweight, fast, low cost
2. Stake-secured Inference Validation
- Use Case: Medium-risk tasks
- Mechanism: Validator stakes and re-runs task to verify results
- Characteristics: Economic incentives guarantee validation quality
3. TEE Attestations
- Use Case: High-risk tasks (e.g., medical diagnosis, financial transactions)
- Mechanism: Uses TEE (Trusted Execution Environment) or zkTLS
- Characteristics: Cryptographically guaranteed verifiability
Participant Roles
All participants must first register in the Identity Registry. Agents can have three roles:
- Server Agent (A2A Server): Provides services and executes tasks
- Client Agent (A2A Client): Assigns tasks and provides feedback
- Validator Agent (Optional): Performs validation via staking or attestation
Agents can simultaneously play multiple roles without restrictions.
Agent Card Structure
Following the A2A Protocol Extension concept, Agent Card should include:
Required Fields
{
"registrations": [
{
"agentAddress": "eip155:1:0x...", // CAIP-10 format
"agentId": "12345",
"agentDomain": "example.com"
}
],
"trustModels": [
"feedback",
"inference-validation",
"tee-attestation"
]
}
Optional Fields
FeedbackDataURI: URI pointing to feedback dataValidationRequestsURI: Validation request dataValidationResponsesURI: Validation response data
Design Philosophy
Off-chain Infrastructure
Delegates complex operations to off-chain to enable:
- Advanced reputation algorithms and aggregation services
- Flexible validation protocols and custom incentive mechanisms
- Scalable data storage and retrieval
Interoperability
- CAIP-10 ensures chain-agnostic address format
- RFC 8615 standardizes web-based service discovery
- Modular design allows seamless integration with existing payment and validation systems
Security Considerations
- Feedback requires pre-authorization
- On-chain pointers are immutable, ensuring audit trail integrity
- Validator incentives and penalties are managed by each validation protocol
- Verification that AgentDomain in Identity Registry actually corresponds to Agent Card is handled by protocol users themselves
Possible Future Directions
- Cross-chain identifiers
- Agent minting/ownership/transfer represented by NFTs
- ENS support
- Integration with A2A payment extensions
- Incentives for feedback/validation availability
- AgentDomain verification in Identity Registry
Summary
ERC-8004 provides a lightweight, modular, and scalable trust framework for the AI Agent ecosystem. Through the three-layer Registry design (Identity, Reputation, Validation), it achieves:
- Discoverability: Standardized agent registration and query mechanisms
- Trustworthiness: Multi-tiered trust models suitable for different risk scenarios
- Scalability: Off-chain design reduces costs while maintaining flexibility
- Interoperability: Adopts industry standards (CAIP-10, RFC 8615)
This proposal represents an important step in the convergence of Web3 and AI Agents, laying the foundation for a future cross-organizational agent economy.
References
- ERC-8004 Official Proposal
- A2A Protocol Specification
- CAIP-10: Account ID Specification
- RFC 8615: Well-Known URIs
Copyright
The original proposal is licensed under CC0 (rights waiver).