Layer explorer

Select a layer to explore its role.

Each layer has a single job: narrow ambiguity and increase inspectability. Click any layer in the stack to see its components, responsibilities, and how it connects to the layers above and below.

Verification travels upward. Primitives are at the bottom. Rich behaviour grows on top.
Layer 01
Timing

Clock cycle

Execution flow

From perception to attested action.

Every agent cycle follows the same verifiable sequence. Each step maps to a primitive, an event type, and a cryptographic commitment. Hover any step to see the detail.

STEP 01
Perceive
Input acquisition
STEP 02
Reason
Model inference
STEP 03
Decide
Policy check
STEP 04
Act
Effect execution
STEP 05
Attest
KEL event write
STEP 06
Witness
Distributed confirm
Perceive
The agent acquires structured input from its environment — sensor data, API responses, messages from other agents, or instructions from a human conductor. All perceived inputs are hashed and committed to the agent's state before reasoning begins.
"primitive": "perceive" "sn": 42 "input_hash": "sha256-..." "source": "conductor" "ts": 1711584000
Trust model

Three layers of cryptographic trust.

Trust in selfdriven.computer is structural, not relational. It doesn't require trusting an operator, a platform, or a certificate authority — only the mathematics.

LAYER 01
Key Events
Root of trust via KERI

The KERI key event log provides the fundamental trust anchor. Every identity — human or agent — has an AID with an append-only, witnessed KEL.

Inception event (icp)Self-certifying AID derived from key material
Rotation event (rot)Pre-rotation commitment enables instant key recovery
Interaction event (ixn)Anchors operations to the KEL without rotating keys
LAYER 02
Credentials
ACDC verifiable claims

ACDC credentials attest domain-specific claims anchored in KERI. They define what an agent can do, not just who it is.

Scope credentialsDefine permitted primitives, domains, TTL
vLEI credentialsGLEIF-issued organisational identity for legal entities
Chained credentialsCredential chains preserve the full delegation provenance
LAYER 03
Operations
Domain actions and attestations

Domain actions — transactions, governance decisions, service interactions — are anchored to the credential layer and recorded in the KEL.

Signed operationsEvery mutation carries a KERI-signed digest of the request body
Evidence streamsTamper-evident audit trails for governance and compliance
A2A attestationsAgent interactions are mutually signed and cross-referenced
Delegation model

Authority flows downward.
Verification flows up.

KERI's bilateral delegation creates a cryptographic chain of custody from human conductor to autonomous agent. Every node in the tree holds its own AID and has a verifiable reference to its delegator — recorded in both parties' key event logs.

Delegation events (dip) require mutual commitment. An agent cannot claim to be delegated without the delegator having confirmed it. Revocation flows in the other direction — a parent can revoke any child AID instantly via a rotation event, with no cooperation from the child required.

Human conductor (root AID)
Delegated agent AID (dip)
Delegation tree — selfdriven.health example
Health Conductor
EKE4g_0hDGBOqDLKzNBT3kFOP...
icp
Discharge Agent
EBot7j_mKQpL2x...
dip
Summary Writer
ESumm3...
dip
Notification Agent
ENotif8...
dip
Scheduling Agent
ESched4_nLpQ...
dip
Key event log

The KEL is the complete record.

Every agent lifecycle event is recorded in strict sequence. The KEL is append-only and tamper-evident — any modification would break the digest chain and be immediately detectable by any witness or verifier.

Click any event to see the full structure. The KEL is the foundation of all accountability in the system — it answers not just "what happened" but "when, by whom, and with what authority."

icp — sn:0
Inception
AID created. Initial keys committed. Pre-rotation keys hashed and committed for future recovery. Witness network established.
dip — sn:1
Delegated inception
A child AID delegated by this agent is confirmed. Bilateral commitment recorded in both parent and child KELs.
ixn — sn:2
Interaction
An operational action is anchored — a decision approved, a service call signed, or a governance vote recorded. No key change.
rot — sn:3
Key rotation
Pre-rotation keys are revealed and promoted. New pre-rotation commitment is made. Witness threshold re-confirmed. Old keys invalidated.
ixn — sn:4..n
Ongoing operations
The agent continues to accumulate interaction events throughout its operational life. Each is sequenced, signed, and witnessed.
icp event structure
// KERI inception event { "v": "KERI10JSON000273_", "t": "icp", "d": "EKE4g_0hDGBOqDLKz...", "i": "EKE4g_0hDGBOqDLKz...", "sn": 0, "kt": 1, "k": ["DFpJ9..."], "nt": 1, "n": ["ECQoH..."], "bt": 2, "b": [ "BBilc4...", "BLskRTInXnefJMT...", "BIKKuvBwpmDVA..." ], "c": [], "a": [] }
Ecosystem applications

Every domain inherits the full trust stack.

Layer 06 is where the architecture meets the world. Each ecosystem domain builds on top of the five layers below — inheriting verifiable time, reduced primitives, policy enforcement, delegated runtime, and shared trust.

selfdriven.health

Health

Discharge optimisation, care coordination, and patient consent management anchored to KERI identity and ACDC credentials.

discharge consent ACDC
selfdriven.money

Banking

CDR Open Banking, NPP PayID, and APRA-regulated transaction flows all signed with KERI AIDs and audited via KEL evidence streams.

CDR NPP APRA
selfdriven.network

Community

TANA self-actuation platform with governance votes anchored to Cardano, community credentials, and NuNet compute orchestration.

TANA Cardano NuNet
selfdriven.ai

AI agents

Agent marketplace and A2A protocol hub. SKILL.MD capability contracts, delegated AIDs per agent, and cross-domain composition enforcement.

SKILL.MD A2A dip
selfdriven.pro

Professional

Human Conductor webapp across 9 professional domains. KERI-anchored credential verification for professional identity and service delivery.

vLEI 9 domains conductor
selfdriven.computer

This layer

The operating substrate that all other domains build on. The clock, the primitives, the policy layer, the runtime, and the trust network.

layers 01–05 foundation

Start with the principles.