Platform capabilities

ENI6MA exposes three surfaces that work together: the Registry (public API), the Ledger (nonce lifecycle and replay prevention), and the circuit binary (CLI). Developers integrate with three API calls: challenge, ceremony, validate. Below is an overview of all major CLI commands and where each capability lives; deep-dives are linked for each area.

Full CLI command list and implications

The circuit binary supports the following command groups. Commands can be run locally (binary on your machine) or via the Registry POST .../cli/{command}. Developers should understand: what each command does, whether it is used locally or via the Registry proxy, and implications for replay, rate limits, audit, and revocation.

CLI command categories: Proof/session, Ledger, Message/blockchain, Verifier/client, Hybrid A2A, with commands and implications.
CategoryCommandsWhat to document / implications
Proof / sessionpool, challenge, validate-response, validate-proof, validate-proof-payload, interactive, nonce-interactive, synthesize, simulatorPurpose, when used (local vs Registry proxy), implication for integration (replay, rate limit).
Ledgerledger/status, ledger/tx, ledger/mine, ledger-serviceRead/append ledger; implication for audit and sovereign mode.
Message / blockchainenigma-hash, sign-msg, verify-msg, opret-encrypt, opret-decrypt, ethereum-address, sign-ethereum-tx, verify-ethereum-txEnigma-ECDSA bridge; implications for custody and APIs.
Verifier / clientverifier, clientRoles in proof flows (challenge generation vs proof submission).
Hybrid (A2A)respond-interactive, agent init, discover, respond, oscillateAgent-to-agent and sovereign; when to use hybrid vs standard.

Capability deep-dives

Registry

Public HTTP API: discovery, proof flow, CLI proxy, binaries, health and docs.

Registry

Ledger

Nonce lifecycle: reserve, burn, status, events; burn-before-validate, TTL, audit without PII.

Ledger

Circuit

CLI command set: proof, ledger, signing, OP_RETURN, Ethereum, verifier/client, hybrid A2A.

Circuit

Circuit creation

How identity is created: secrets, mapping, entropy seeding, configuration.

Circuit creation

Circuit compilation

Ephemeral build, deliver-and-destroy, SHA256, isolated compiler.

Circuit compilation

Security guarantees

Cipher types and design measures: non-replay, non-informative transcript, post-quantum.

Security guarantees