Skip to content

Commit 8b73a26

Browse files
committed
rename to tool
1 parent a371f0f commit 8b73a26

3 files changed

Lines changed: 10 additions & 10 deletions

File tree

blog/_posts/2026-02-15-introducing-vestauth.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,17 @@ excerpt: "Agent authentication with verifiable identity and request signatures."
1010

1111
Today we are launching **vestauth**, authentication built for agents.
1212

13-
`vestauth` gives agents a cryptographic identity and lets providers verify signed requests with confidence. It is designed to be simple to adopt and strong by default.
13+
`vestauth` gives agents a cryptographic identity and lets tools verify signed requests with confidence. It is designed to be simple to adopt and strong by default.
1414

1515
## Why vestauth
1616

17-
The shift to agents introduces a new baseline requirement: providers need to know which agent made a request and whether that request was tampered with in transit.
17+
The shift to agents introduces a new baseline requirement: tools need to know which agent made a request and whether that request was tampered with in transit.
1818

1919
`vestauth` addresses this with:
2020

2121
- agent identities backed by cryptographic keys
2222
- signed requests agents can generate from the CLI
23-
- verification primitives providers can use in their servers
23+
- verification primitives tools can use in their servers
2424

2525
## Install
2626

@@ -42,10 +42,10 @@ Sign and send a request:
4242
vestauth agent curl https://ping.vestauth.com/ping
4343
```
4444

45-
Verify on the provider side:
45+
Verify on the tool side:
4646

4747
```js
48-
const agent = await vestauth.provider.verify(req.method, url, req.headers)
48+
const agent = await vestauth.tool.verify(req.method, url, req.headers)
4949
```
5050

5151
## What is next

blog/_posts/2026-02-18-why-we-created-vestauth.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ title: "why we created vestauth"
55
categories:
66
- blog
77
video: "https://github.com/user-attachments/assets/b1cf9fe2-b9f7-471d-a210-65779287bb40"
8-
excerpt: "a conversation about why we built vestauth for autonomous agents and providers."
8+
excerpt: "a conversation about why we built vestauth for autonomous agents and tools."
99
---
1010

1111
**scott:** this is scott. i created `dotenv` and `dotenvx`, with a combined 80 million weekly installs and 25,000 github stars.
@@ -14,9 +14,9 @@ excerpt: "a conversation about why we built vestauth for autonomous agents and p
1414

1515
**scott:** about a month ago, i started building a new way for agents to store and rotate secrets as part of `dotenvx`, and i ran into a core problem: agents cannot sign themselves up autonomously. and they need to do that without a human in the loop. captchas, usernames, and passwords were built for humans, not agents.
1616

17-
**laura:** over the last month we got obsessed with this. for agents, the problem is they are bypassing controls. for providers, the problem is complexity and duplicated effort across mcp integrations, oauth flows, api keys, and key rotation.
17+
**laura:** over the last month we got obsessed with this. for agents, the problem is they are bypassing controls. for tools, the problem is complexity and duplicated effort across mcp integrations, oauth flows, api keys, and key rotation.
1818

19-
**scott:** there is a better way. it's called [`vestauth`](https://github.com/vestauth/vestauth). it handles both sides. on the agent side, one command sets up a cryptographic identity, without human-first handshake patterns like oauth. on the provider side, there is no api key management, no username/password auth, and no user table just to identify agents. verification is cryptographic and can be added with a single line of code.
19+
**scott:** there is a better way. it's called [`vestauth`](https://github.com/vestauth/vestauth). it handles both sides. on the agent side, one command sets up a cryptographic identity, without human-first handshake patterns like oauth. on the tool side, there is no api key management, no username/password auth, and no user table just to identify agents. verification is cryptographic and can be added with a single line of code.
2020

2121
**laura:** we have been building for four weeks. the product is live. we started distribution through [`dotenv`](https://github.com/motdotla/dotenv) and [`dotenvx`](https://github.com/dotenvx/dotenvx). it is still early, but agent autonomy is accelerating every day.
2222

index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ title: ""
2929
</section>
3030

3131
<section class="mt-4 sm:mt-6">
32-
<h2 class="text-[#1a7f52] dark:text-[#30ff8a]">Provider Usage</h2>
32+
<h2 class="text-[#1a7f52] dark:text-[#30ff8a]">Tool Usage</h2>
3333
<p class="mt-2 text-zinc-500 dark:text-zinc-500"># Verify requests and safely trust agent identity using cryptographic proof.</p>
3434
<pre class="mt-2 max-w-2xl overflow-x-scroll rounded border border-[#d9d9d9] bg-[#f7f7f7] p-3 text-[10px] leading-4 text-black dark:border-[#2f4f40] dark:bg-[#0d2219] dark:text-white sm:text-xs"><code>// index.js
3535
const express = require('express')
@@ -40,7 +40,7 @@ const app = express()
4040
app.get('/whoami', async (req, res) =&gt; {
4141
try {
4242
const url = `${req.protocol}://${req.get('host')}${req.originalUrl}`
43-
const agent = await vestauth.provider.verify(req.method, url, req.headers)
43+
const agent = await vestauth.tool.verify(req.method, url, req.headers)
4444
res.json(agent)
4545
} catch (err) {
4646
res.status(401).json({ code: 401, error: { message: err.message }})

0 commit comments

Comments
 (0)