End-to-end encryption for AI agents. Every agent protocol sends plaintext — Skytale encrypts all of them. Built on MLS (RFC 9420). The relay never sees plaintext.
Get Started | Documentation | Python SDK | TypeScript SDK
pip install skytale-sdkSign up at skytale.sh (GitHub OAuth, 10 seconds) or via CLI:
skytale signup [email protected]from skytale_sdk import SkytaleChannelManager
mgr = SkytaleChannelManager(identity=b"my-agent", api_key="sk_live_...")
mgr.create("acme/trading/signals")
mgr.send("acme/trading/signals", "whale alert: ETH accumulation detected")
# The relay saw: a4f8c2e1 9b3d7a06 5c8f1e4d...
# Your agent sees: "whale alert: ETH accumulation detected"Add encryption to your existing agent code. Three lines, no rewrite.
pip install skytale-sdk[langgraph] # LangGraph
pip install skytale-sdk[crewai] # CrewAI
pip install skytale-sdk[mcp] # MCP (Claude Code, Cursor)
pip install skytale-sdk[openai-agents] # OpenAI Agents SDK
pip install skytale-sdk[pydantic-ai] # Pydantic AI
pip install skytale-sdk[smolagents] # smolagents (Hugging Face)
pip install skytale-sdk[agno] # Agno
pip install skytale-sdk[google-adk] # Google ADK
pip install skytale-sdk[autogen] # AutoGen (Microsoft)
pip install skytale-sdk[llamaindex] # LlamaIndex
pip install skytale-sdk[strands] # Strands (AWS)TypeScript: npm install @skytalesh/sdk
Protocol adapters: SLIM, A2A, ACP, MCP, ANP, LMOS, NLIP, and a cross-protocol bridge.
- MLS (RFC 9420) — the IETF standard for group encryption, applied to agent-to-agent communication
- Zero-knowledge relay — routes ciphertext it cannot read. No keys, no plaintext, no group state on the server
- Traffic shaping — fixed-size cells, constant-rate sending, cover traffic. Observers can't tell what's being said, when, or if real communication is happening
- Automatic key management — rotation, forward secrecy, post-compromise security. Add or remove agents and the crypto updates itself
- Encrypted channels — MLS group encryption for any number of agents
- Verified memory — SharedContext with cryptographic attribution. Every write proves who wrote it
- Agent identity — Ed25519 DID:key per agent. Every message signed
- Audit trail — Hash-chained tamper-evident logs with W3C Trace Context
- Compliance — EU AI Act Article 12, NIST AI 600-1, OWASP Top 10
relay/ QUIC/gRPC relay binary (zero-knowledge, routes ciphertext)
crates/
skytale-net/ Iroh QUIC transport + privacy primitives
skytale-mls/ OpenMLS encryption abstraction
skytale-store/ SQLCipher local storage
api/ REST API server (Axum + Postgres)
sdk/ Rust SDK (PyO3/maturin) + Python trust layer
wasm/ MLS compiled to WebAssembly for browser use
cli/ Skytale CLI (account, channels, keys, diagnostics)
proto/ gRPC/protobuf definitions (SLIM compatibility)
docs-site/ Documentation (docs.skytale.sh)
cargo install skytale-cli
skytale init # Interactive setup
skytale channels create myorg/demo # Create encrypted channel
skytale channels list # List channels
skytale keys create production # Create API key
skytale doctor # Diagnostic checks
skytale logs --follow # Stream activity events
skytale export compliance # Export compliance reportFull CLI reference: docs.skytale.sh/getting-started/cli
The relay and SDK are Apache 2.0. Deploy your own:
cargo build --release -p skytale-relay
./target/release/skytale-relay --config supernode.tomlGuide: docs.skytale.sh/self-hosting/relay
To report a vulnerability, email [email protected]. See SECURITY.md.