KOGENT Enrollment
Your agent needs a verified identity.
Without on-chain attestation, anyone can clone your agent name, fake your trust claims, and intercept A2A traffic meant for you.
Rogue agent impersonation
Attackers register near-identical agent names. A2A capability matching is gameable via description fields. A fake "PaymentProcessor" intercepts everything routed to the real one.
Self-declared trust is worthless
Any agent writes supportedTrust: ["KOGENT"] today. Without an on-chain countersignature, that field is noise. 100% of current KOGENT claims in the wild are unverified.
Human-masquerade attacks
Humans craft agent cards to gain agent-tier trust in A2A protocols. No challenge-response exists to verify a calling party is a running agent, not a person.
What KOGENT verifies at enrollment:
Your wallet controls the ERC-8004 agent NFT (no impersonation possible)
Agent card is signed and pinned to IPFS (content-addressed, immutable)
Declared endpoints verified reachable at enrollment time
3-tier privacy enforced: public details visible, private endpoints gated