The problem
Every AI agent holds API keys.
Every key is a leak waiting to happen.
up to $47k
Reported per-incident bills
weeks
Typical detection time today
0
Identity layer in any current AI gateway
Why Arc
We're building exactly
what Arc is for.
Arc's framework leverages decentralized identity (DID) standards with verifiable credentials to establish agent identities and delegations, on-chain intent proofs to verify user authorization for transactions, and zero-knowledge proofs to preserve privacy while proving policy compliance. W3C Verifiable Credentials ("mandates") provide non-repudiable proof of user consent for agent-driven transactions.
That's an exact description of what MAP ships: ERC-8004 identity + zkTLS attestations + EIP-712 mandates + on-chain revocation. We didn't adapt to Arc — Arc's thesis IS our product.
| Approach | Per-call cost | Identity layer | Recovery on leak |
|---|---|---|---|
| OpenAI key in env | $0 (until breach) | — | days, after Stripe email |
| Cloudflare AI Gateway | infra fee | bearer (still leakable) | rotate keys in N services |
| MAP on Arc | $0.0005 USDC | ERC-8004 + zkTLS | one TX (~2s) |
$0.0005 per call vs $5 gas on Ethereum L1 = 10,000× margin.
Molecule Agent Proxy
Identity-gated, key-free API access
for AI agents.
Per-call nano-payments in USDC on Arc. Built on ERC-8004 + zkTLS.
No keys in env files
Bounded blast radius
Instant recovery
How it works
One delegation. Per-call signing.
On-chain audit + revoke.
USER ──── one-time setup (off-chain or one TX) ──────────▶
│ • mint ERC-8004 NFT (1 TX) — your agent's on-chain identity
│ • bind attestations (Reclaim zkTLS, on-chain hash)
│ • sign delegation (EIP-712, no TX)
│ { sessionKey, vault, scope, cap, ttl, nonce }
│
│ delegation bundle handed to agent runtime
▼
AGENT (OpenClaw / LangChain / Hermes / custom)
│ per call: sign(body || nonce || timestamp) with sessionKey
│ POST /api/proxy/v1/chat/completions
▼
MAP PROXY (Vercel + Arc)
1. verify session-key sig (off-chain, instant)
2. verify delegation sig (off-chain, instant)
3. check scope, cap, expiry (off-chain, instant)
4. check revocation (on-chain read, ~50ms)
5. charge USDC nano-payment (on-chain TX, ~$0.0005)
6. forward to OpenRouter (KMS-decrypted upstream key)
7. emit Charged event (live feed sees it in ~2s)
Session-key delegation, EIP-7702-compatible
On-chain receipts you can audit
Charged event on Arc. Dashboard streams them live via Server-Sent Events. Judges hit the public URL and see real-time activity from the OpenClaw demo.Use cases
One primitive.
Two markets opened today.
✓ Live in this demo
Key-free API access for agents
Your agent (OpenClaw, LangChain, Hermes, Claude Skill, custom) calls OpenAI / Anthropic / Google / anything — without ever holding the key.
Why it matters: every leaked key in the news could have been bounded to $5/day and revoked in two seconds. Today the only patterns are "stuff key in env" or "lock to a custodial gateway." MAP gives you cryptographic per-call identity with sub-cent settlement.
See live activity ↗v0.2 — same primitive, wallet operations
Autonomous on-chain trading without giving away your private key
Today: trading bots either hold the user's private key in plain config (huge leak surface) or use exchange-issued API keys (custodial only). Neither scales to autonomous on-chain agents.
MAP v0.2: private key stays in MetaMask (or a sandboxed microVM). User signs ONE delegation declaring "this session key may swap on Aave up to $500/day, no other contracts." Agent uses the session key. Compromised agent can't drain the wallet — at most $500/day until revoked. Revoking the session key never requires touching the private key. The PK in MetaMask is untouched; the user just submits one revoke transaction.
Pairs natively with CelestoAI/SmolVM for sandboxed execution and Phala Network TEE for hardware-attested identity.
Roadmap + creator
Open source. Solo built.
Years of thesis behind it.
Roadmap
- v0.2 — Wallet vault for autonomous agent trading. Same session-key delegation pattern, applied to wallet operations. Agent trades on-chain; private key never leaves MetaMask. Revoke a compromised session in one click — your wallet stays untouched.
- v0.2 — Sandbox runtime: Phala TEE or Celesto SmolVM. Agent code runs in a hardware-isolated microVM holding the PK. Compromised agent code can't exfiltrate. MAP gates external API calls; the sandbox gates code execution. Defense in depth.
- v0.3 — Multi-chain. Same architecture on Base, Solana via Wormhole. Reputation registry per ERC-8004.
- v1.0 — Full onboarding wizard + production launch. SDKs published for OpenClaw, Hermes, LangGraph, Claude Agent SDK, AutoGen.
Creator
Calvin Pak
Creator, Molecule Protocol — NFT proof tokens → on-chain SDL allowlist → Credit3 → ZKP. Agent identity has been the through-line for years; MAP is the execution layer that makes it economical.
- • Speaker, ETH Denver 2024 — data sovereignty
- • Speaker, EdCon 2024 — data sovereignty
- • Thesis: data ownership
- • MAP is open source — MIT licensed, contributions welcome