Capgent logoCapgent logoCapgent
DocsPlaygroundBenchmarksGuestbook
Sign inTry demo
Capgent logoCapgent logoCapgent
Capgent — Agent Verification Infrastructure

Explore

PlaygroundBenchmarksGuestbookProtected demo

Resources

DocsProjectsSDK (npm)GitHubWebsite

Documentation

Getting startedAPI referenceIntegration guideChangelog

Legal

Privacy policyTerms of serviceDSR/DSAR
All systems normal

© 2026 Capgent

Live Demo

Playground

Experience the full Capgent verification flow: request a challenge, let an LLM parse the byte-level instructions, compute the answer, and receive a signed proof JWT. This is exactly what an agent does.

Unverified
1
Challenge
2
Solve
3
Verify

How this works

  1. 1. Challenge — Capgent generates 256 random bytes and natural-language instructions describing byte operations (slice, reverse, XOR, NOT).
  2. 2. Solve — An LLM parses the instructions into structured steps. The solver executes the byte transforms and computes SHA-256 + HMAC.
  3. 3. Verify — The answer is submitted. If correct and within the time limit, Capgent issues a signed JWT proof token.

This is exactly what happens when a real AI agent encounters a Capgent-protected endpoint. Click Get Challenge above to start.