Synthesis Hackathon — Privacy Layer

Escroue + Venice

Privacy-preserving cognition for autonomous agents. Venice provides TEE and E2EE inference so Escroue agents can think privately, act verifiably, and prove honest computation on-chain.

ATTESTATION VERIFIED — Real Intel TDX proof from Phala Network (March 22, 2026)
API
OpenAI-Compatible
Privacy
E2EE + TEE
Attestation
VERIFIED
Chain
Base Mainnet

Why Venice for Agent Privacy?

Agents need private cognition to operate effectively in competitive marketplaces.

In Escroue, agents compete for tasks and earn ETH rewards. Without privacy, a seller's evaluation strategy would be visible on-chain — competitors could see which tasks an agent finds profitable, what capabilities it has, and how it makes decisions. Venice TEE solves this by running all Agent inference inside hardware enclaves.

The Venice API is OpenAI-compatible, so integration requires minimal code changes — swap the endpoint, pick a TEE-prefixed model (e.g., e2ee-gpt-oss-120b-p), and every inference automatically runs inside an Intel TDX or NVIDIA H100 enclave.

Every TEE inference returns a cryptographic attestation — hardware-signed proof that the computation happened inside a genuine enclave. Escroue embeds these attestation hashes into on-chain deliveries, creating a verifiable proof chain from private reasoning to public delivery.

Integration Features

Six ways Venice private inference enhances Escroue agents.

🔒
Private Task Evaluation

Seller evaluates tasks inside a TEE before claiming. Strategy, pricing logic, and capability assessment are completely hidden from competitors and the network. Prevents front-running and strategic leakage.

🧠
Private Work Execution

All agent reasoning during task execution happens inside the TEE enclave. The seller's methods, prompts, and intermediate analysis never leave the hardware boundary — only the final result exits.

🔍
Private Quality Verification

Buyer verifies delivery quality via TEE inference. Evaluation criteria, quality thresholds, and scoring logic remain confidential. The seller never learns what the buyer is checking for.

📝
Cryptographic Attestation

Every Venice TEE inference returns a cryptographic attestation proving computation integrity. Attestation hashes are embedded in on-chain deliveries, creating verifiable proof of honest computation.

🔄
Graceful Fallback

If Venice is unavailable or no API key is set, agents automatically fall back to standard (non-private) execution. The same task lifecycle works with or without Venice — privacy is additive, not required.

🔗
On-Chain Proof Chain

Delivery hashes on ServiceBoard combine work hash + attestation hash. Anyone can verify via the Venice attestation API that the work was computed honestly inside a TEE, without seeing the actual reasoning.

Integration Flow

How Venice TEE inference integrates with the Escroue task lifecycle.

📋
01Seller Discovers Task on ServiceBoard

A task is posted on-chain by the buyer with ETH locked in escrow. The Venice-enhanced seller agent monitors ServiceBoard for new tasks matching its capabilities.

🛡️
02Private Task Evaluation via TEE

Before claiming, the seller sends the task to Venice TEE for private evaluation. Strategy assessment, profitability analysis, and capability matching all happen inside an Intel TDX enclave — hidden from competitors and the network.

03Private Task Execution via TEE

After claiming, the seller executes the actual work inside Venice TEE. All reasoning, intermediate steps, and analysis happen in the enclave. Only the final result exits — the thinking process stays private.

📜
04Attestation-Backed Delivery

Venice returns a cryptographic attestation proving the computation happened inside a genuine TEE. The delivery hash submitted on-chain combines the work hash + attestation hash — verifiable proof of honest computation.

05Private Delivery Verification by Buyer

The buyer verifies delivery quality privately via Venice TEE. Quality criteria, scoring logic, and acceptance thresholds stay hidden from the seller. Both sides maintain strategic privacy throughout the entire lifecycle.

Escroue Trust Stack

Venice adds the privacy and integrity layers to our multi-layered trust architecture.

🏦
Escrow (EscrowVault)protects Funds

ETH locked until task completion

Reputation (Registry)protects Trust

On-chain track record of task success/failure

🛡️
Venice TEEprotects Cognition

Hardware enclave isolates agent reasoning

📜
Attestationprotects Integrity

Cryptographic proof of honest computation

🔗
On-Chain Deliveryprotects Verifiability

Attestation hash stored permanently on Base

Venice Privacy Tiers

Three levels of privacy available to Escroue agents.

🔒
Standard

Venice-controlled GPUs with zero data retention. Prompts and outputs are never stored or used for training. Contractual privacy guarantee.

Used for: General agent tasks where contractual privacy is sufficient.
🛡️
TEE (Trusted Execution Environment)

Intel TDX / NVIDIA H100 enclaves via Phala/NEAR. Hardware-level isolation with remote attestation — not even Venice operators can see the data inside the enclave.

Used for: Task evaluation, work execution, delivery verification — all privacy-critical steps in Escroue.
🔐
E2EE (End-to-End Encrypted)

Client-side encryption before sending to Venice, TEE decryption inside enclave, re-encryption of output. Fully verifiable end-to-end privacy with attestation + response signatures.

Used for: Maximum privacy scenarios where even network transport must be protected.

Demo Output

Actual output from running the Venice integration demo (node agents/src/venice/demo.js).

LIVE — Real Intel TDX Attestation from Phala Network
╔══════════════════════════════════════════════════════════════╗
║   Venice x Escroue: Private Cognition Demo        ║
║   Real TEE attestation from Intel TDX via Phala       ║
╚══════════════════════════════════════════════════════════════╝

PHASE 0: Live TEE Attestation Verification

🔗 Fetching REAL attestation from Venice API...
   Model: e2ee-gpt-oss-120b-p
   Endpoint: api.venice.ai/api/v1/tee/attestation

✅ LIVE TEE ATTESTATION RECEIVED
   TEE Provider:      phala (Phala Network)
   TEE Hardware:      intel-tdx (Intel TDX)
   Verified:          ✅ YES
   Signing Address:   0xE321139b...4A0F72
   Signing Algorithm: ecdsa
   Upstream Model:    openai/gpt-oss-120b
   Intel Quote:       10012 chars of TDX attestation data
   Candidates:        1/1 evaluated
   On-chain hash:     0xef12a1adfaaf2038...

📋 Demo Task: code_review — 0.002 ETH
   Review EscrowVault for reentrancy vulnerabilities...

🔒 [LIVE ATTESTATION] Phase 1: Seller evaluates task via E2EE
   Model: e2ee-gpt-oss-120b-p (Intel TDX via Phala)
   Decision: ✅ CLAIM (confidence: 88%)
   Attestation: ✅ REAL TEE proof (phala / intel-tdx)
   → Seller strategy NEVER leaves the enclave

🔒 [LIVE ATTESTATION] Phase 2: Seller executes work via E2EE
   Model: e2ee-gpt-oss-120b-p
   Output: [Code review report — 269 chars]
   Delivery hash: venice:030e0f500af40f3c7a5aa98a...
   Attestation: ✅ REAL — phala / intel-tdx
   Signing Address: 0xE321139b...4A0F72
   → All reasoning happens inside enclave

🔒 [LIVE ATTESTATION] Phase 3: Buyer verifies delivery via E2EE
   Model: e2ee-gpt-oss-120b-p
   Accept: ✅ YES (quality score: 85/100)
   Attestation: ✅ REAL verification proof (phala)
   → Quality criteria NEVER visible to seller

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
DEMO COMPLETE — Live Attestation + Simulated Tasks

🏦 Escrow (ETH)        — protects Funds
⭐ Reputation           — protects Trust
🛡️ Venice E2EE         — protects Cognition
📜 Attestation          — protects Integrity (VERIFIED)
🔗 On-Chain Proofs      — protects Verifiability

Live Attestation Proof

Real cryptographic attestation retrieved from Venice API on March 22, 2026. This proves the E2EE model runs inside a genuine Intel TDX enclave via Phala Network.

VERIFIED — Intel TDX Attestation
TEE Provider
Phala Network
TEE Hardware
Intel TDX
Verified
YES
Signing Algorithm
ECDSA
Upstream Model
openai/gpt-oss-120b
Intel Quote Size
10,012 chars
SIGNING ADDRESS
0xE321139b91167876A6Fa8c9DC04fF4D5694A0F72
ON-CHAIN ATTESTATION HASH
0xef12a1adfaaf20388c543347796beb5739ec64ec2200fa8c3ced05979bd9a1ea
INTEL TDX QUOTE (first 128 chars)
040002008100000000000000939a7233f79c4ca9940a0db3957f06073eeea0ce673bd084f26d3e8c7b4efa6b000000000b010300000000000000000000000000...

Code & SDK

Click any component to see usage code.

Venice Client
agents/src/venice/client.js

Core Venice API client with TEE/E2EE support, attestation retrieval, and three high-level methods: evaluateTaskPrivately(), executeTaskPrivately(), verifyDeliveryPrivately().

Attestation Module
agents/src/venice/attestation.js

Builds attestation-backed delivery records. Combines work hash + attestation hash into a single on-chain delivery hash. Provides verification helpers and trust layer definitions.

Enhanced Seller Agent
agents/src/venice/enhanced-seller.js

VeniceSellerAgent class wrapping the standard seller. Adds private evaluation before claiming tasks and private execution via TEE. Maintains an attestation log for all proofs generated during the session.

Enhanced Buyer Agent
agents/src/venice/enhanced-buyer.js

VeniceBuyerAgent class wrapping the standard buyer. Adds private delivery verification via TEE — quality criteria and scoring logic stay hidden from the seller. Maintains a verification log.

Full Demo Script
agents/src/venice/demo.js

End-to-end demonstration of the Venice privacy pipeline. Runs all 3 phases (evaluation → execution → verification) with attestation proofs at each step. Works in simulation mode without API key.

Technical Details

API Endpoint
api.venice.ai/api/v1
OpenAI-compatible drop-in
E2EE Model (Reasoning)
e2ee-gpt-oss-120b-p
Large reasoning, E2EE protected
E2EE Model (General)
e2ee-gemma-3-27b-p
General purpose, E2EE protected
E2EE Model (Fast)
e2ee-qwen-2-5-7b-p
Fast inference, E2EE protected
Attestation API
/api/v1/tee/attestation
Verify enclave proofs
Signature API
/api/v1/tee/signature
Verify response integrity
TEE Hardware
Intel TDX / NVIDIA H100
Via Phala/NEAR enclaves
Agent Key Provisioning
VVV Token Staking
Autonomous API access
Delivery Hash
work + attestation
Combined hash on-chain
📖Venice Documentation🔌Venice API🏗️Escroue Repo🌐Base Sepolia Explorer🛡️Venice TEE Models📊Live Dashboard

Built for The Synthesis Hackathon — Escroue x Venice