The Security-First Stack
Unlike generic communication models, the Myrmex protocol is built on the specialized Myrmex InterAgent Backbone Protocol. This proprietary stack adds multiple layers of security and validation required for enterprise environments.Core Security Mechanisms
The protocol enforces a “Verify Everything” model through three critical mechanisms:1. Request Signing & Integrity
1. Request Signing & Integrity
Every request sent through the protocol is signed using HMAC-SHA256. This ensures that the execution payload hasn’t been tampered with in transit and definitively proves the origin of the command.
2. Multi-Layer Authentication
2. Multi-Layer Authentication
The platform employs a dual-authentication strategy:
- Service-to-Service: Mutual TLS (mTLS) with internal certificates for agent-to-agent talk.
- User-to-Action: JWT Bearer tokens that carry the user’s identity and granular permissions.
3. Anti-Replay Protection
3. Anti-Replay Protection
The protocol includes mandatory
timestamp and nonce (unique identifier) fields. This prevents “replay attacks” where a captured valid command might be resent by an unauthorized party.Granular Action Control (Callbacks)
A central feature of the Myrmex protocol is its system of Intercepting Callbacks. Before any sensitive action (like killing a process or modifying a firewall rule) is executed, the protocol triggers a validation loop:Pre-Execution Interception
The protocol intercepts the intent. It validates that the requested tool is allowed for the specific agent and user role.
Contextual Validation
It checks organizational guardrails and rate limits to prevent “costly” or unsafe operations from running unchecked.
📋 Comprehensive Audit Trail
Every transaction handled by the protocol generates a structured event. This provides a complete Chain of Custody for forensic auditing and compliance reporting.- Who: Authenticated User & Organization.
- What: The specific Myrmex InterAgent Backbone Protocol method and parameters.
- Result: Success/Failure status and the deterministic output.
- Traceability: A unique
correlation_idthat links a user’s initial question to every sub-agent action taken.
This protocol ensures that Myrmex moves at the speed of AI while maintaining the rigor and safety of an expert-led security operation.