AURA
AUTONOMOUS
Pre-Alpha · Devnet

Autonomous
Universal
Resource Agent

Encrypted guardrails for AI agent treasuries on Solana. Spending limits stay as FHE ciphertexts — unreadable on-chain, evaluated by Ika's Encrypt network, executed via dWallet co-signing.

The Dilemma

The Agentic Trust Gap

Every existing approach forces a tradeoff between autonomy, security, and privacy. AURA eliminates all three.

ApproachThe RealityStatus
Raw Key AccessOne prompt injection or model bug drains the treasury. The agent holds the keys — there is no safety net.CRITICAL RISK
Public Spending LimitsLimits visible on-chain let MEV bots read your strategy, front-run trades, and route around known thresholds.EXPOSED
Centralized Approval ServerA single off-chain server decides every spend. It becomes the bottleneck, the honeypot, and the single point of failure.FRAGILE
AURA — FHE + dWalletLimits are encrypted ciphertexts. Policy runs over secrets via Ika Encrypt. Execution is co-signed by dWallet — no raw key, no readable limits, no central gatekeeper.AUTONOMOUS
ENCRYPTION
Core Architecture

Policy Evaluation
Over Encrypted State

AURA uses Fully Homomorphic Encryption (FHE) via Ika's Encrypt network. Daily limits, per-transaction caps, and running spend counters are stored as FHE scalar ciphertexts on-chain. The policy engine evaluates them without ever decrypting the values.

  • Encrypted on-chain limitsSpending policy is stored as FHE scalar or vector ciphertexts. No validator or observer can read the actual values.
  • Ika dWallet co-signingApproved proposals are co-signed by Ika dWallet records, enabling native multi-chain execution without raw key exposure.
  • MEV-resistant by designHidden limits mean bots cannot calculate your thresholds, front-run your trades, or infer your strategy from on-chain data.
Policy Val Secure
Daily Limit:Ciphertext[8j2...9kx]
Proposed Spend:$450.00 USD
Spent Today:Ciphertext[3f9...1ab]
FHE Result:APPROVED [violation=0]
> FHE_OP_INIT [0x42f...]
> DECRYPT_GATEWAY_OPENED
> HOMOMORPHIC_ADD (CIPHER_A, CIPHER_B)
> THRESHOLD_CHECK: VALID
> IKANET_SIGNATURE_REQ
Feature Surface

Built for real operators, not mock treasury demos

Every component is production-grade and deployed on Solana devnet. Cryptographic guarantees, not configuration flags.

FHE Encrypted Limits

Daily limits, per-transaction caps, and running spend counters stored as FHE scalar ciphertexts on-chain via Ika's Encrypt network. No validator, observer, or MEV bot can read the actual values.

dWallet Multi-Chain Execution

Approved proposals are co-signed by Ika dWallet records. Native execution on Ethereum, Bitcoin, Solana, Polygon, Arbitrum, and Optimism — no bridges, no raw key exposure.

17-Rule Policy Engine

Public rules evaluated locally before any FHE call: per-tx and daily limits, velocity, time windows, slippage, protocol allowlists, counterparty risk, reputation scaling, approval ladders, budget envelopes, swarm pool, and scoped pauses.

Agent Swarms

Multiple agents share a single treasury with a unified spending pool. Aggregate spend is tracked across all members — one agent can't exceed the collective cap.

Governance and Safety

Emergency multisig override, guardian co-signing, AI authority rotation, dangerous-config timelocks, session keys, and scoped pauses for break-glass scenarios.

Audit and Observability

Append-only audit trail, policy receipts, decision history, activity logs, health scoring, snapshots, and invariant reports — full operational visibility without exposing strategy.

Interoperability

Native Multi-Chain Settlement

Co-sign transactions directly on the destination layer via dWallet tech.

Ethereum logo
Ethereum
Bitcoin logo
Bitcoin
Solana logo
Solana
Polygon logo
Polygon
Arbitrum logo
Arbitrum
Optimism logo
Optimism
Execution Flow

How AURA Works

From encrypted policy setup to multi-chain execution — every step is cryptographically enforced on Solana.

01

Encrypt Your Policy

Set daily limits, per-transaction caps, and spend counters. AURA encrypts these into FHE ciphertexts stored on-chain — no one can read the actual values, including validators.

02

Agent Proposes, FHE Decides

Your AI agent submits a transaction proposal. Ika's Encrypt network runs the policy graph over the encrypted values and returns an encrypted violation code — approved or denied, without revealing the limits.

03

dWallet Co-Signs, Chain Settles

Approved proposals are co-signed by an Ika dWallet record. The agent never holds a raw private key — execution happens natively on Ethereum, Bitcoin, Solana, and more.

Common Questions

Frequently Asked Questions

Everything you need to know about AURA's encrypted treasury guardrails and autonomous agent operations.

AURA (Autonomous Universal Resource Agent) is an encrypted treasury system for AI agents on Solana. It lets agents manage real crypto treasuries without exposing spending strategy on-chain and without trusting a centralized approval server. Spending limits are stored as FHE ciphertexts, policy evaluation runs over encrypted values via Ika's Encrypt network, and execution is co-signed by Ika dWallet records.

Ready to secure the agentic future?

Join the waitlist for the AURA v1 Mainnet release.