π Currently building:
- Symbiont β βοΈ Policy-governed agent runtime for production. A Rust-native runtime for executing AI agents and tools under explicit policy, identity, and audit controls. Same agent. Secure runtime.
- SchemaPin β π§· Cryptographic tool schema verification for AI agents and MCP servers. Prevents "MCP Rug Pull" attacks with ECDSA signatures, DNS-anchored trust, and TOFU key pinning.
- AgentPin β πͺͺ Domain-anchored cryptographic identity for AI agents. The second layer in the ThirdKey trust stack (SchemaPin β AgentPin β Symbiont).
- ToolClad β π‘οΈ Declarative tool interface contracts for agentic runtimes.
.clad.tomlmanifests define the complete behavioral contract: typed parameters, validation rules, invocation, output parsing, and policy metadata. - AgentSniff β π AI Agent Network Scanner. Detect AI agents operating on enterprise networks via passive monitoring, active probing, protocol detection, and behavioral analysis.
- TrustVer β π¦ Provenance-aware versioning for AI-era software. Combines EffVer effort semantics with authorship tagging and signed Provenance Attestation Documents (PAD) β know the effort, the author, and the verification applied.
- AgentNull β π³οΈ AI System Security Threat Catalog + Proof-of-Concepts. A red team-oriented catalog of attack vectors targeting autonomous agents (MCP, LangGraph, AutoGPT), RAG pipelines, and embedding-based retrieval systems.
- VectorSmuggle β 𧬠Testing platform for covert data exfiltration via vector embeddings. Sensitive documents tunneled out under the guise of legitimate RAG operations β bypassing traditional controls through semantic obfuscation. Built to help security teams detect and defend.
- HarmonyDagger β π Make Music Unlearnable for Generative AI. Imperceptible psychoacoustic noise patterns that prevent effective ML training while preserving human listening quality. (Reference implementation β not for production.)
π¬ Research @ ThirdKey
We're building next-generation AI systems for enterprise security and automation.
Our mission: enhance cybersecurity, streamline operations, and democratize AI-powered protection.




