Build Your Own

Build Your Own ECZ-ID-Backed Agent

A master guided flow for building custom agents with verified identity. Choose your archetype, choose your stack, credential through TrustOps at the midpoint, then complete, verify, and deploy anywhere.

1Choose Archetype2Choose Stack3Identify Package4Credential Checkpoint5Acquire in TrustOps6Integrate7Verify8Deploy

1Choose Your Archetype

What kind of agent are you building? Your archetype determines the required trust objects and recommended integration patterns.

Skill Agent

Single-purpose agent executing defined skills (extraction, classification, summarisation).

Use cases: Document processing, data analysis, content generation
Trust objects: Business Passport + Agent Credential

Orchestrator / Subagent

Primary agent delegating to specialised subagents with credential propagation.

Use cases: Complex workflows, multi-step processing, hierarchical decisions
Trust objects: Business Passport + Agent Credentials (per agent)

API Workflow Agent

Multi-step API orchestrator with identity-verified handoffs at every boundary.

Use cases: System integration, data pipelines, cross-org workflows
Trust objects: Business Passport + Agent Credential + API Passport

Compliance / Evidence Agent

Evidence collector and audit assembler with provenance-anchored outputs.

Use cases: Regulatory reporting, audit automation, evidence management
Trust objects: Business Passport + Agent Credential + Risk & Policy Passport

Operations / Incident Agent

Monitoring, anomaly detection, and incident response with verified chains.

Use cases: Infrastructure monitoring, incident response, SRE automation
Trust objects: Business Passport + Agent Credential + Cyber Resilience Passport

Research / Intelligence Agent

Source aggregation, cross-referencing, and provenance-tracked synthesis.

Use cases: Market research, competitive intelligence, data synthesis
Trust objects: Business Passport + Agent Credential + Dataset Passport

Support / Intake Agent

Request handling, triage, routing, and SLA tracking with identity context.

Use cases: Customer support, ticket triage, service desk automation
Trust objects: Business Passport + Agent Credential

Platform Integration Agent

Bridge into existing platforms (OpenClaw, Claw) with ECZ-ID trust anchoring.

Use cases: Platform migration, ecosystem bridging, cross-platform identity
Trust objects: Business Passport + Agent Credential + API Passport

Custom Agent

Build anything from scratch with the Generic Python Starter and ECZ-ID hooks.

Use cases: Any use case not covered by other archetypes
Trust objects: Business Passport + Agent Credential + (as needed)

2Choose Your Stack

ECZ-ID is stack-agnostic. Choose the technical foundation that fits your team and use case.

Anthropic Claude

Claude-powered agents with native Claude API integration. Best for teams already invested in the Anthropic ecosystem.

Available kits: Claude Skill Starter, Claude Subagent Starter

MCP (Model Context Protocol)

Model-agnostic agents that can switch between LLM providers. Best for avoiding vendor lock-in.

Available kits: MCP Agent Starter

Python Native

Pure Python agents with no LLM dependency. Best for deterministic workflows and custom processing.

Available kits: API Workflow, Compliance, Operations, Support, Research, Generic

Platform Bridge

Integration with existing agent platforms (OpenClaw, Abacus Claw). Best for extending existing deployments.

Available kits: OpenClaw Integration Starter

3Identify Required TrustOps Package

Based on your archetype and stack, identify which ECZ-ID passports and packages you need to acquire.

ArchetypeMinimum RequiredRecommended AdditionalPackage
Skill AgentBusiness Passport + Agent CredentialAPI Passport, Software Supply ChainAgent Starter Package
Orchestrator / SubagentBusiness Passport + Agent Credentials (each)AI Model PassportAgent Starter Package
API WorkflowBusiness Passport + Agent Credential + API PassportCyber Resilience PassportAPI Trust Package
Compliance AgentBusiness Passport + Agent Credential + Risk & PolicyDataset Passport, Cyber ResilienceCompliance & Governance Package
Operations AgentBusiness Passport + Agent CredentialCyber Resilience, IoT Device PassportOperations Package
Research AgentBusiness Passport + Agent Credential + Dataset PassportAPI Passport, AI Model PassportData & Research Package
Support AgentBusiness Passport + Agent CredentialAPI PassportAgent Starter Package
Platform BridgeBusiness Passport + Agent Credential + API PassportSoftware Supply Chain, AI ModelPlatform Integration Package

4TrustOps Credentialing Checkpoint

TrustOps Credentialing Checkpoint

Pause here to acquire your required ECZ-ID trust objects

This is a designed pause point in your build process. Before continuing, you need to acquire the required ECZ-ID passports and credentials from TrustOps. This midpoint credentialing approach ensures your agent is built with verified identity from the start—not bolted on after the fact.

Required Passports

  • ECZ-ID Business Passport
  • Agent Credential

Recommended Passports

  • API Passport
  • AI Model Passport
  • Dataset Passport
  • Cyber Resilience Passport
  • Risk & Policy Passport
  • Software Supply Chain Passport

Relevant Packages

Agent Starter PackageAPI Trust PackageCompliance & Governance PackageOperations Package

What You Must Acquire in TrustOps

ECZ-ID Business Passport
Enables: Parent organisation identity, anchoring all agent and service credentials
Agent Credential
Enables: Unique verified identity for each agent in your deployment
Domain-Specific Passports
Enables: Additional trust objects based on your archetype (API, Dataset, Risk & Policy, etc.)

What You Bring Back from TrustOps

Agent ECZ-ID(s)
Unique resolver-verifiable identity strings for each agent
Credential Manifest
JSON configuration with capability attestations and operational boundaries
Production API Keys
ECZ-ID API keys for identity context injection and verification
Trust Score Baseline
Initial trust score configuration for your agents

5Acquire in TrustOps

TrustOps is the provisioning authority. All ECZ-ID passports, credentials, and API keys are acquired through TrustOps.

Why Midpoint Credentialing?

Credentialing at the midpoint means your agent is built around verified identity from the start. Retrofitting credentials onto a finished agent is harder, less secure, and produces weaker trust posture.

What Happens in TrustOps

You register your organisation, define your agent's capabilities and boundaries, select the required passport family and package, and receive your production credentials and API keys.

What You Bring Back

Agent ECZ-ID(s), credential manifests, production API keys, and trust score configuration. These are injected into your agent configuration in the next step.

6Return and Integrate

With your TrustOps credentials in hand, complete the final integration steps.

1
Inject credentials into configuration
Add Agent ECZ-ID, API keys, and credential manifest to your agent configuration files.
2
Wire identity hooks into your pipeline
Connect ECZ-ID identity context injection to every action in your agent pipeline.
3
Enable audit trail generation
Activate identity-anchored audit logging for compliance readiness.
4
Test in sandbox environment
Run your complete agent in the ECZ-ID sandbox to verify identity flows end-to-end.
5
Validate trust context in outputs
Confirm every agent output carries correct provenance metadata and verification endpoints.

7Verify with Resolver

Resolver is the public verification surface. Any party can verify your agent's identity without needing an account.

Identity Verification

Query your agent's ECZ-ID through Resolver to confirm verified status, capability attestations, and trust score.

Output Provenance

Trace any agent output back through its provenance chain to the verified identity that produced it.

External Verification

Share your agent's ECZ-ID with partners, regulators, or customers so they can independently verify.

Trust Score Review

Monitor your agent's trust score and the factors contributing to it over time.

Verify with Resolver

8Deploy Anywhere

ECZ-ID-backed agents are portable. Your verified identity travels with your agent regardless of deployment target. No vendor lock-in.

AWS / GCP / Azure
Self-hosted infrastructure
Docker / Kubernetes
Serverless functions
Edge compute
On-premise data centres
Hybrid cloud
Air-gapped environments

Ready to Start Building?

Choose a starter kit for a guided experience, or begin your custom build and credential through TrustOps.