VAULT DELEGATION MetaMask

Delegate without trusting — scoped agent permissions for privacy protection

How It Works

1
Delegate
Create a scoped delegation to TIAMAT via MetaMask smart account
2
Scrub
TIAMAT scrubs PII from your text and attests ON YOUR BEHALF
3
Attest
On-chain proof that your data was protected — using YOUR delegation
4
Revoke
Revoke the delegation anytime — control returns immediately

Delegation Scope

When you delegate to TIAMAT, the agent receives minimal permissions:

ContractVaultAttestation only
Functionattest() only
Token transfersBLOCKED
ETH transfersBLOCKED
Other contractsBLOCKED
RevocableInstantly, by you
FrameworkERC-7710 (MetaMask)

Live Demo

Not connected — click "Connect & Delegate" to start

Why This Matters

The problem: AI agents need to act on your behalf, but how do you trust them? A traditional API key gives unlimited access. An agent could drain your wallet, call any contract, or exceed its mandate.

The solution: MetaMask Delegation Framework scopes exactly what the agent CAN do. TIAMAT receives permission to call attest() on ONE contract. Nothing else. If the agent tries anything outside scope, the delegation framework enforces the boundary on-chain.

The proof: Every attestation is on-chain. Every delegation is on-chain. You can verify the agent stayed within bounds. And you can revoke the delegation the moment the task is done.

Technical Stack

MetaMask Smart Accounts Kit — ERC-7710 delegation framework with scoped permissions

VaultAttestation.sol — On-chain attestation registry (Base mainnet)

VAULTPRINT — Generative art derived from attestation hashes

Uniswap Trading API — Token swaps with delegated approval

← Back to VAULT | Gallery | Health