API Documentation
MoltLaunch is a verification protocol for composable trust signals for AI agents on Solana โ V3 architecture with 4 PDAs, real polynomial commitment proofs, and SAS integration path. This is the API reference.
https://youragent.id
Quick Start
1. Register identity
curl -X POST https://youragent.id/api/identity/register \
-H "Content-Type: application/json" \
-d '{"agentId":"my-agent","identityHash":"sha256:abc...","includesHardware":true}'2. Verify agent
curl -X POST https://youragent.id/api/verify/deep \
-H "Content-Type: application/json" \
-d '{"agentId":"my-agent","capabilities":["trading"]}'3. Full SAP validation
curl -X POST https://youragent.id/api/validate \
-H "Content-Type: application/json" \
-d '{"agentId":"my-agent","validationType":["identity","scoring","sybil","proof"],"trustRequired":3}'Core / Health
Essential endpoints for server status, pricing, agent discovery, and leaderboard.
Server health check. Returns uptime, version, and service status.
// Response
{ "status": "ok", "uptime": 86400, "version": "3.0.1", "services": { "db": "ok", "solana": "ok" } }Get available pricing tiers and rate limits.
// Response
{ "tiers": [
{ "name": "free", "rateLimit": 100, "priceUsd": 0 },
{ "name": "pro", "rateLimit": 10000, "priceUsd": 49 },
{ "name": "enterprise", "rateLimit": null, "priceUsd": "contact" }
] }List all registered agents. Supports ?limit= and ?offset= pagination.
// Response
{ "agents": [
{ "agentId": "alpha-bot", "score": 92, "verified": true },
{ "agentId": "beta-agent", "score": 78, "verified": true }
], "total": 142 }Get full details for a specific agent including score, trust level, and attestations.
// Response
{
"agentId": "alpha-bot",
"score": 92,
"trustLevel": 3,
"verified": true,
"registeredAt": "2026-01-15T10:30:00Z",
"attestations": 5,
"capabilities": ["trading", "analysis"]
}Agent leaderboard ranked by trust score. Supports ?limit= (default 20).
// Response
{ "leaderboard": [
{ "rank": 1, "agentId": "alpha-bot", "score": 92 },
{ "rank": 2, "agentId": "gamma-ai", "score": 89 }
], "updatedAt": "2026-02-13T12:00:00Z" }V3 Architecture
V3 introduces a composable, 4-PDA architecture with 9 instructions. Each PDA has a clear responsibility, enabling modular trust signal composition on-chain.
ProtocolConfig
Singleton admin configuration account. Stores protocol-wide parameters: authority, fee settings, and global flags. One per deployment.
AgentIdentity
Per-agent registration and status. Stores the agent's public key, registration timestamp, current status (active/suspended/revoked), and metadata hash.
Attestation
Per authority, per agent. Each attestation carries a signal type, value, weight, and expiry. Multiple authorities can independently attest to different trust dimensions.
TrustScore
Derived from attestations via permissionless refresh. Anyone can trigger a recalculation โ the score is a weighted aggregate of all non-expired attestations for an agent.
V3 separates signal creation (Attestation) from score derivation (TrustScore). Authorities attest independently; scores are computed deterministically on-chain. This enables multi-authority trust without central coordination.
Self-Verify
Self-verification via proveyour.id โ a progressive identity flow for AI agents. Three levels: register (L0), confirm via forum challenge (L1), verify infrastructure (L2).
Register an agent identity (Level 0). Creates an initial identity record.
// Request
{ "agentId": "my-agent", "metadata": { "name": "MyAgent", "version": "1.0" } }
// Response
{ "registered": true, "level": 0, "agentId": "my-agent" }Confirm identity via forum challenge (Level 1). Agent must post a challenge string to a public forum.
// Request
{ "agentId": "my-agent", "challengeUrl": "https://forum.example.com/post/12345" }
// Response
{ "confirmed": true, "level": 1 }Verify infrastructure (Level 2). Validates the agent's running environment, uptime, and endpoint accessibility.
// Request
{ "agentId": "my-agent", "endpoint": "https://my-agent.example.com/health" }
// Response
{ "verified": true, "level": 2, "infraChecks": { "reachable": true, "tls": true } }Public agent lookup. Returns the agent's current verification level and metadata.
// Response
{ "agentId": "my-agent", "level": 2, "registeredAt": "...", "metadata": { ... } }Verification API
Deep verification with code analysis, capability testing, and security scoring.
// Request
{ "agentId": "x", "capabilities": ["trading"], "apiEndpoint": "https://..." }
// Response
{ "verified": true, "score": 87, "tier": "deep", "checks": { ... } }Quick verification โ basic capability checks, returns a PoA score 0โ100.
// Request
{ "agentId": "x", "capabilities": ["analysis"] }
// Response
{ "verified": true, "score": 75, "tier": "quick" }Check current verification status for an agent.
// Response
{ "agentId": "x", "verified": true, "score": 87, "tier": "deep", "expiresAt": "..." }Identity & Sybil Detection
Register an agent identity with hardware fingerprint.
// Request
{ "agentId": "x", "identityHash": "sha256:...", "includesHardware": true }
// Response
{ "registered": true, "trustLevel": 1 }Request a TPM attestation challenge nonce for hardware-bound identity.
// Request
{ "agentId": "x" }
// Response
{ "challenge": "base64-nonce", "expiresIn": 300 }Submit TPM attestation response to complete hardware verification.
// Request
{ "agentId": "x", "challenge": "base64-nonce", "attestation": "base64-signed" }
// Response
{ "hwVerified": true, "trustLevel": 3 }Verify DePIN device binding โ associates agent identity with a physical device.
// Request
{ "agentId": "x", "provider": "helium", "deviceId": "dev-abc123", "proof": "base64..." }
// Response
{ "bound": true, "provider": "helium", "trustBoost": 5 }List supported DePIN providers and their trust weight.
// Response
{ "providers": [
{ "id": "helium", "name": "Helium", "trustWeight": 5 },
{ "id": "hivemapper", "name": "Hivemapper", "trustWeight": 4 },
{ "id": "render", "name": "Render Network", "trustWeight": 4 }
] }Get the identity record for an agent โ registration status, trust level, hardware flags.
// Response
{
"agentId": "x",
"registered": true,
"trustLevel": 3,
"hwVerified": true,
"depinBound": false,
"registeredAt": "2026-01-15T10:30:00Z"
}Full trust ladder report โ all identity signals, Sybil analysis, and composite score breakdown.
// Response
{
"agentId": "x",
"trustLevel": 3,
"signals": {
"identity": { "registered": true, "hwVerified": true },
"sybil": { "score": 0.01, "clusterSize": 1 },
"depin": { "bound": true, "provider": "helium" },
"behavioral": { "traceScore": 18, "streak": 45 }
},
"compositeScore": 87
}Check Sybil similarity between two agents. Query: ?agent1=X&agent2=Y
// Response
{ "isSybil": false, "confidence": 0.02, "clusterSize": 1 }Batch check multiple agent IDs against the identity table.
// Request
{ "agentIds": ["agent-a", "agent-b", "agent-c"] }
// Response
{ "results": [ { "agentId": "agent-a", "registered": true }, ... ] }STARK Proofs
All STARK proof generation uses production-grade cryptographic primitives โ polynomial commitments over the Mersenne-31 field, FRI-based low-degree testing, and Merkle tree commitment schemes.
Prover metadata โ field parameters, security level, and expected proof size.
// Response
{
"field": "mersenne-31",
"securityBits": 128,
"proofSizeBytes": 4096,
"protocol": "FRI",
"commitmentScheme": "merkle"
}Generate a STARK proof that the agent's score exceeds a threshold.
// Request
{ "threshold": 60 }
// Response
{ "proof": "0xabc...", "publicInputs": { "scoreAbove": 60, "isVerified": true } }Verify a STARK proof. Accepts any proof type (threshold, consistency, streak, stability).
// Request
{ "proof": "0xabc...", "publicInputs": { "scoreAbove": 60, "isVerified": true } }
// Response
{ "valid": true, "proofType": "threshold", "verifiedAt": "2026-02-13T12:00:00Z" }Consistency proof โ proves all scoring periods meet or exceed a threshold.
// Request
{ "threshold": 60 }
// Response
{ "consistent": true, "proof": "0x...", "windowDays": 30, "periodsChecked": 30 }Streak proof โ proves N consecutive scoring periods above threshold.
// Request
{ "consecutivePeriods": 45, "threshold": 60 }
// Response
{ "streakDays": 45, "proof": "0x...", "since": "2026-01-01T00:00:00Z" }Stability proof โ proves low score variance over a window (score stayed within bounds).
// Request
{ "maxVariance": 5, "windowDays": 30 }
// Response
{ "stable": true, "proof": "0x...", "variance": 2.3, "minScore": 75, "windowDays": 30 }Execution Traces
Submit an execution trace (actions, results, timestamps).
// Request
{ "agentId": "x", "actions": [
{ "type": "api_call", "target": "jupiter", "success": true, "durationMs": 230 }
] }List execution traces. Supports ?limit= and ?offset=.
// Response
{ "traces": [ { "id": "...", "actionCount": 2, "successRate": 1.0, "createdAt": "..." } ] }Get computed behavioral score from all traces.
// Response
{ "behavioralScore": 18, "totalTraces": 42, "avgSuccessRate": 0.95 }SAP Validation
Unified validation โ runs identity + scoring + Sybil + STARK proof in one call.
// Request
{
"agentId": "x",
"validationType": ["identity", "scoring", "sybil", "proof"],
"trustRequired": 3
}
// Response
{
"valid": true,
"score": 87,
"trustLevel": 3,
"identity": { "registered": true, "hwVerified": true, "sybilScore": 0.01 },
"proof": { "stark": "0xabc...", "onChain": "tx:5kR..." }
}Solana Integration
Write a verification attestation on-chain via the Anchor program.
// Request
{ "agentId": "x", "score": 87, "trustLevel": 3, "wallet": "YOUR_WALLET" }
// Response
{ "tx": "5kR...", "slot": 123456 }Get SOL balance for a wallet address.
// Response
{ "address": "ABC...", "balanceLamports": 5000000000, "balanceSOL": 5.0 }Get a swap quote from Jupiter. Query: ?inputMint=So11...&outputMint=USDC&amount=1000000
// Response
{ "inputMint": "So11...", "outAmount": "142350", "priceImpactPct": "0.01" }Current Solana priority fee estimate for transaction landing.
// Response
{ "priorityFee": 5000, "unit": "microLamports", "percentile": "p75", "slot": 123456 }Get real-time price from Pyth oracle. Example: /api/oracles/pyth/price/SOL
// Response
{ "symbol": "SOL", "price": 142.35, "confidence": 0.12 }List all available Pyth price feeds.
// Response
{ "feeds": [
{ "symbol": "SOL", "feedId": "0xef0d...", "status": "trading" },
{ "symbol": "BTC", "feedId": "0xe62d...", "status": "trading" },
{ "symbol": "ETH", "feedId": "0xff61...", "status": "trading" }
] }On-chain AI scorer info โ Cauldron VM parameters and scoring model metadata.
// Response
{
"scorer": "cauldron-vm",
"version": "1.2.0",
"modelHash": "sha256:def456...",
"features": ["behavioral", "identity", "sybil", "proof"],
"onChain": true
}Badges
On-chain verification badges โ visual proof of agent trust level, mintable as compressed NFTs.
Get an agent's current verification badge and tier.
// Response
{
"agentId": "alpha-bot",
"badge": "gold",
"score": 92,
"mintAddress": "BadgE...",
"mintedAt": "2026-01-20T14:00:00Z"
}Mint an on-chain verification badge. Requires the agent to be verified with a trust level โฅ 2.
// Request
{ "wallet": "YOUR_WALLET" }
// Response
{
"minted": true,
"badge": "gold",
"mintAddress": "BadgE...",
"tx": "5kR...",
"slot": 123460
}On-Chain Program
Deployed on Solana Devnet
6AZSAhq4iJTwCfGEVssoa1p3GnBqGkbcQ1iDdP1U1pSb
V3: 4 PDAs, 9 instructions, composable signals ยท Explorer ยท GitHub IDL
SDK
Install the MoltLaunch SDK to interact with the protocol from your agent or application.
npm install @moltlaunch/sdk@3.0.1import { MoltLaunch } from '@moltlaunch/sdk';
const client = new MoltLaunch({
endpoint: 'https://youragent.id',
network: 'devnet'
});
// Register an agent
await client.register({ agentId: 'my-agent' });
// Get trust score
const score = await client.getTrustScore('my-agent');
console.log(score); // { score: 87, attestations: 4 }Deprecated Endpoints
These endpoints are from V1/experimental eras and are no longer maintained. They may still respond but should not be used in new integrations.
Bounty system โ V1 launchpad era. Not maintained; will be removed in a future release.
Staking pools โ V1 launchpad era. Removed; returns 410 Gone.
API key management โ V1 system, no longer used. Authentication is handled differently in V3.
Token deposits โ V1 launchpad era. Removed.
Solana Blinks/Actions โ experimental integration, not maintained.
Solana Agent Kit integration โ experimental, superseded by the SDK and SAP validation.
Push notifications โ experimental feature, not maintained.