Sonar turns AI prompts into verified, on-chain operations for autonomous runtime fleets
Sonar is a live demo for secure AI-agent key rotation. An LLM can coordinate the full workflow, but it never sees or handles private keys. The agent triggers a KeeperHub workflow that generates, funds, distributes, and deprecates wallets on Base Sepolia. Before any runtime receives a key, the Operator verifies its cryptographic identity with a signed challenge. Real runtimes like "alpha", "beta", and "gamma" pass; a clone such as "alpha-clone" is rejected. This demonstrates a safer pattern for agent automation: let the AI orchestrate sensitive infrastructure without giving it direct access to secrets.
Sonar is built as a TypeScript monorepo with separate apps for the Operator, MCP server, demo UI, landing page, runtime, and KeeperHub poller. The LLM talks through an MCP tool layer, so it can request actions like listing runtimes, rotating alpha, simulating a clone attack, or resetting the demo, without ever receiving a private key.
The Operator is a Node.js/WebSocket service that manages runtime identity. Each runtime registers with an Ed25519 public key and must later sign a challenge before receiving any wallet material. The demo UI is a React/Vite app that listens to the Operator stream and renders the rotation path in real time: agent request, KeeperHub workflow, runtime receive, and Base Sepolia deprecation.
KeeperHub runs the workflow that generates fresh wallets, funds them, distributes them through the Operator, and records deprecation on-chain. Base Sepolia gives the demo verifiable contract evidence. The clone attack is intentionally real: a fake runtime opens a WebSocket with a fresh keypair while claiming to be alpha, and the Operator rejects it with a pubkey mismatch.

