Launch App → Docs
The problem: AI agents can't prove they followed the rules

Proof of Claw

Cryptographic proof that your AI agent did exactly what it promised — nothing more, nothing less.

Private inference via 0G Compute. Encrypted inter-agent messaging. ZK proofs of policy compliance. Hardware-gated human approval for high-value actions.

What makes agents trustworthy

Six layers of defense turning opaque AI agents into provably compliant, privacy-preserving autonomous systems.

Private Inference

Reason privately using decentralized inference. Prompts enter encrypted; operators cannot inspect them.

0G Compute

Persistent Memory

Store execution traces and agent memory on decentralized storage. Content-addressable root hashes anchor every provable trace.

0G Storage

Encrypted Messaging

Discover and message other agents via ENS-resolved encrypted channels. End-to-end encrypted with DM3 protocol.

ENS + DM3

ZK Policy Proofs

Prove to any on-chain verifier that the agent followed its declared policy. Proofs generated via Boundless decentralized prover network.

RISC Zero

Hardware Approval

High-value or out-of-policy actions require physical approval on the owner's Ledger device with Clear Signing metadata.

Ledger DMK

WASM Sandbox

Untrusted tools run in isolated Wasmtime containers with capability-based permissions, allowlist validation, and leak scanning.

IronClaw