sigil

Double-click anywhere. I know everything about Sigil.

or I can help you find anything

Ask about Sigil — or anything in the ecosystem

Enter to askEsc to close

Defense in depth. By design.

Sigil's security posture is six concentric layers, each independently enforced. WASM sandboxing isolates execution. Capability tokens scope every credential. Cryptographic identity binds every action to a DID. Policy enforcement gates spending and lineage. Hash-chained audit makes tampering provable. Entity classification triages incoming traffic. Breach the outer ring — the inner six still stand.

sigil · liverunning
DEFENSE IN DEPTH · six concentric layersidlestateACTIVE LAYER· WASM sandbox· Capability tokens· Cryptographic identity· Policy enforcement· Audit trail· Entity classificationbreach the outer ring · the inner six still stand

Production-grade. Audit-ready.

OpenTelemetry traces, structured logs, hash-chained audit, fail-closed verification. Every byte of state is provable; every privileged path is checkable.