π Currently building:
- Symbiont β βοΈ AI-native, privacy-first programming language and agent framework for autonomous, policy-aware software development.
- SchemaPin β π§· A cryptographic protocol that ensures tool schema integrity for AI agents. Prevents "MCP Rug Pull" attacks by enabling developers to sign schemas and clients to verify them.
- AgentPin β πͺͺ Domain-anchored cryptographic identity for AI agents. Verify who your agents really are.
- ToolClad β π‘οΈ Declarative
.clad.tomlmanifests for AI agent tools. Typed parameters, injection-safe command construction, and policy metadata. The LLM fills parameters β the executor validates and constructs commands. - AgentSniff β π AI Agent Network Scanner. Detect AI agents operating on your network through passive monitoring, active probing, protocol detection, and behavioral analysis.
- TrustVer β π¦ Provenance-aware versioning for AI-era software. Know how much effort an update requires, who or what wrote it, and what verification was applied.
- AgentNull β π³οΈ AI System Security Threat Catalog + Proof-of-Concepts. Collection of PoCs for using Agents, MCP, and RAG in bad ways.
- VectorSmuggle β 𧬠Covert channel research using vector embeddings to demonstrate data exfiltration within legitimate RAG operations. Built to help security teams detect and defend.
- HarmonyDagger β π Source repo for the HarmonyDagger system, including CLI, API, and deployment tooling. (Use it as a reference not in production)
π¬ Research @ ThirdKey
We're building next-generation AI systems for enterprise security and automation.
Our mission: enhance cybersecurity, streamline operations, and democratize AI-powered protection.




