npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@ixo/ucan

v1.2.2

Published

UCAN authorization for any service - built on ucanto

Readme

@ixo/ucan

A framework-agnostic UCAN (User Controlled Authorization Networks) implementation for any service. Built on top of the battle-tested ucanto library and conforming to the UCAN specification.

What is UCAN?

UCAN is a decentralized authorization system using cryptographically signed tokens. Think of it as "JWT meets capabilities" - users can grant specific permissions to others, who can further delegate (but never escalate) those permissions.

Key concepts:

  • Capabilities: What actions can be performed on which resources
  • Delegations: Granting capabilities to others (can be chained)
  • Invocations: Requests to use a capability
  • Facts: Verifiable claims attached to a delegation or invocation (scoped per-UCAN, not inherited)
  • Attenuation: Permissions can only be narrowed, never expanded

📖 See the visual flow diagram →

Features

  • 🔐 Built on ucanto - Battle-tested UCAN library from Storacha
  • 🎯 Generic Capabilities - Define your own capabilities with custom schemas
  • ⚙️ Caveat Validation - Enforce limits and restrictions on delegations
  • 🌐 Multi-DID Support - did:key (native) + did:ixo (via blockchain indexer) + did:web (via HTTP) + local (in-memory registry)
  • 🚀 Framework-Agnostic - Works with Express, Fastify, Hono, NestJS, etc.
  • 🛡️ Replay Protection - Built-in invocation store prevents replay attacks

Installation

npm install @ixo/ucan
# or
pnpm add @ixo/ucan

Quick Start

1. Define a Capability

import { defineCapability, Schema } from '@ixo/ucan';

const EmployeesRead = defineCapability({
  can: 'employees/read',
  protocol: 'myapp:',
  nb: { limit: Schema.integer().optional() },
  derives: (claimed, delegated) => {
    const claimedLimit = claimed.nb?.limit ?? Infinity;
    const delegatedLimit = delegated.nb?.limit ?? Infinity;

    if (claimedLimit > delegatedLimit) {
      return {
        error: new Error(
          `Limit ${claimedLimit} exceeds allowed ${delegatedLimit}`,
        ),
      };
    }
    return { ok: {} };
  },
});

2. Create a Validator (Server)

import { createUCANValidator, createIxoDIDResolver } from '@ixo/ucan';

const validator = await createUCANValidator({
  serverDid: 'did:ixo:ixo1abc...', // Your server's DID
  rootIssuers: ['did:ixo:ixo1admin...'], // DIDs that can issue root capabilities
  didResolver: createIxoDIDResolver({
    indexerUrl: 'https://blocksync.ixo.earth/graphql',
  }),
});

3. Protect a Route (Invocation)

app.post('/employees', async (req, res) => {
  const result = await validator.validate(
    req.body.invocation, // Base64-encoded CAR
    EmployeesRead,
    'myapp:company/acme',
  );

  if (!result.ok) {
    return res.status(403).json({ error: result.error });
  }

  // result.invoker — DID of who made the request
  // result.capability — validated capability with caveats (nb)
  // result.expiration — earliest expiration across the delegation chain (undefined = never)
  // result.proofChain — delegation path from root to invoker, e.g. ["did:key:root", "did:key:user"]
  // result.facts — facts attached to the invocation (undefined if none)

  const limit = result.capability?.nb?.limit ?? 10;
  res.json({ employees: getEmployees(limit) });
});

3b. Validate a Delegation

Use validateDelegation() to verify a standalone delegation token — e.g. when a client sends a delegation in a header alongside a traditional auth mechanism. This verifies the cryptographic signature chain, audience, and expiration without requiring a capability definition.

app.use(async (req, res, next) => {
  const delegationHeader = req.headers['x-ucan-delegation'];
  if (!delegationHeader) return next();

  const result = await validator.validateDelegation(delegationHeader);

  if (!result.ok) {
    console.warn(
      `Delegation invalid: [${result.error?.code}] ${result.error?.message}`,
    );
    return next();
  }

  // result.invoker — issuer DID (who granted the delegation)
  // result.capability — first capability in the delegation
  // result.expiration — effective expiration across the proof chain
  // result.proofChain — e.g. ["did:ixo:root", "did:ixo:user"]

  req.ucanDelegation = {
    issuer: result.invoker,
    capability: result.capability,
    expiration: result.expiration,
  };

  next();
});

4. Create & Use a Delegation (Client)

import {
  generateKeypair,
  createDelegation,
  createInvocation,
  serializeInvocation,
} from '@ixo/ucan';

// Generate a keypair for the user
const { signer, did } = await generateKeypair();

// Root creates a delegation for the user
const delegation = await createDelegation({
  issuer: rootSigner,
  audience: did,
  capabilities: [
    { can: 'employees/read', with: 'myapp:company/acme', nb: { limit: 50 } },
  ],
  expiration: Math.floor(Date.now() / 1000) + 3600, // 1 hour
});

// User creates an invocation
const invocation = await createInvocation({
  issuer: signer,
  audience: serverDid,
  capability: {
    can: 'employees/read',
    with: 'myapp:company/acme',
    nb: { limit: 25 },
  },
  proofs: [delegation],
});

// Serialize and send
const serialized = await serializeInvocation(invocation);
await fetch('/employees', {
  method: 'POST',
  body: JSON.stringify({ invocation: serialized }),
});

Documentation

| Document | Description | | --------------------------------------------------------- | ---------------------------------------------------- | | Flow Diagram | Visual explanation of UCAN delegation and invocation | | Server Example | Complete Express server with protected routes | | Client Example | Frontend/client-side usage | | Capabilities Guide | How to define custom capabilities with caveats |

API Reference

Capability Definition

defineCapability(options: DefineCapabilityOptions)

Define a capability with optional caveat validation.

| Option | Type | Description | | ---------- | ---------- | -------------------------------------- | | can | string | Action name (e.g., 'employees/read') | | protocol | string | URI protocol (default: 'urn:') | | nb | object | Schema for caveats using Schema.* | | derives | function | Custom validation for attenuation |

Validator

createUCANValidator(options: CreateValidatorOptions): Promise<UCANValidator>

Create a framework-agnostic validator.

| Option | Type | Description | | ----------------- | ----------------- | ------------------------------------- | | serverDid | string | Server's DID (any method supported) | | rootIssuers | string[] | DIDs that can self-issue capabilities | | didResolver | DIDKeyResolver | Resolver for non-did:key DIDs | | invocationStore | InvocationStore | Custom store for replay protection |

Methods

| Method | Description | | ----------------------------------------------------- | ------------------------------------------------------------- | | validate(invocationBase64, capabilityDef, resource) | Validate an invocation against a capability definition | | validateDelegation(delegationBase64) | Validate a standalone delegation (signature, audience, chain) |

validate() validates a full invocation — checks signature, capability matching, caveats, replay protection, and resource authorization.

validateDelegation() validates a standalone delegation token — verifies the cryptographic signature of every delegation in the proof chain, checks audience matches serverDid, validates expiration, and ensures chain consistency (each proof's audience matches the child delegation's issuer). Supports did:key issuers natively and non-did:key issuers (e.g. did:ixo) via the configured didResolver.

ValidateResult

Both methods return a ValidateResult:

| Field | Type | Description | | ------------ | ---------------------------------------- | ---------------------------------------------------------------------------------------------------- | | ok | boolean | Whether validation succeeded | | invoker | string | DID of the invoker/issuer (on success) | | capability | object | Validated capability with can, with, and optional nb caveats (on success) | | expiration | number \| undefined | Effective expiration (Unix seconds) — the earliest across the delegation chain. Undefined = never. | | proofChain | string[] \| undefined | Delegation path from root issuer to invoker, e.g. ["did:key:root", "did:key:alice", "did:key:bob"] | | facts | Record<string, unknown>[] \| undefined | Facts attached to the invocation/delegation. Undefined if none. | | error | object | Error with code and message (on failure) |

Error codes: INVALID_FORMAT, INVALID_SIGNATURE, UNAUTHORIZED, REPLAY, EXPIRED, CAVEAT_VIOLATION.

Client Helpers

| Function | Description | | ------------------------------------ | --------------------------------- | | generateKeypair() | Generate new Ed25519 keypair | | parseSigner(privateKey, did?) | Parse private key into signer | | signerFromMnemonic(mnemonic, did?) | Derive signer from BIP39 mnemonic | | createDelegation(options) | Create a delegation | | createInvocation(options) | Create an invocation | | serializeDelegation(delegation) | Serialize to base64 CAR | | serializeInvocation(invocation) | Serialize to base64 CAR | | parseDelegation(serialized) | Parse from base64 CAR |

Note: Both createDelegation and createInvocation default to expiration: Infinity (never expires) when no expiration is specified. Pass an explicit Unix timestamp (seconds) to set an expiration.

Facts

Both createDelegation and createInvocation accept an optional facts parameter — an array of Record<string, unknown> objects representing verifiable claims or proofs of knowledge (UCAN spec §3.2.4).

const invocation = await createInvocation({
  issuer: signer,
  audience: serverDid,
  capability: { can: 'oracle/call', with: 'ixo:oracle:123' },
  proofs: [delegation],
  facts: [{ requestId: 'abc-123', origin: 'portal' }],
});

Important: Facts are scoped per-UCAN. Each delegation and invocation carries its own independent fct field. Facts on a delegation do not propagate to invocations that use it as a proof. The facts field in ValidateResult contains only the facts from the invocation itself.

DID Resolution

createIxoDIDResolver(config: IxoDIDResolverConfig): DIDKeyResolver
createWebDIDResolver(config?: WebDIDResolverConfig): DIDKeyResolver
createLocalDIDResolver(): LocalDIDResolver
createCompositeDIDResolver(resolvers: DIDKeyResolver[]): DIDKeyResolver

createIxoDIDResolver

Resolves did:ixo identifiers by querying the IXO blockchain indexer for verification keys.

| Option | Type | Description | | ------------ | -------- | ------------------------------------------ | | indexerUrl | string | Blocksync GraphQL endpoint for DID lookups |

createWebDIDResolver

Resolves did:web identifiers by fetching the DID document from https://{domain}/.well-known/did.json (or path-based equivalents) and extracting Ed25519 verification methods.

| Option | Type | Description | | ---------------- | ---------- | ------------------------------------------------------------------------------------------ | | fetch | function | Custom fetch implementation (default: globalThis.fetch) | | fallbackToHttp | boolean | Retry with http:// when https:// fails (default: false). Localhost always uses HTTP. |

createLocalDIDResolver

Creates a DID resolver backed by an in-memory registry of pre-known keys. Useful for services that know their own did:web identity at startup and want to avoid network calls for self-resolution.

const localResolver = createLocalDIDResolver();
localResolver.register(
  'did:web:myservice.example.com',
  'z6MkPublicKeyMultibase...',
);

const didResolver = createCompositeDIDResolver([
  localResolver, // check local first (instant)
  createWebDIDResolver(), // fall back to HTTP
  createIxoDIDResolver({ indexerUrl: '...' }),
]);

| Method | Description | | ----------------------------------- | ------------------------------------------------------ | | register(did, publicKeyMultibase) | Register a DID with its z-base58btc Ed25519 public key |

createCompositeDIDResolver

Chains multiple resolvers. Tries each in order — returns the first successful result or the last error if all fail.

Replay Protection

new InMemoryInvocationStore(options?)
createInvocationStore(options?)

DID Support

| DID Method | Support | Notes | | ---------- | --------------- | -------------------------------------------------------- | | did:key | ✅ Native | Parsed directly from the identifier | | did:ixo | ✅ Via resolver | Resolved via IXO blockchain indexer | | did:web | ✅ Via resolver | Fetches DID document from well-known endpoint | | Local | ✅ In-memory | Pre-registered keys resolved instantly, no network calls |

Environment Variables

# For IXO DID resolution
BLOCKSYNC_GRAPHQL_URL=https://blocksync.ixo.earth/graphql

Advanced Usage

Re-exported ucanto Packages

For advanced use cases, you can access the underlying ucanto packages:

import {
  UcantoServer,
  UcantoClient,
  UcantoValidator,
  UcantoPrincipal,
  ed25519,
  Verifier,
} from '@ixo/ucan';

Custom Invocation Store

Implement the InvocationStore interface for distributed deployments:

interface InvocationStore {
  has(cid: string): Promise<boolean>;
  add(cid: string, ttlMs?: number): Promise<void>;
  cleanup?(): Promise<void>;
}

Testing

pnpm test          # Run unit tests (vitest)
pnpm test:ucan     # Run interactive test script with full UCAN flow

The unit tests cover proof chain construction, expiration computation, facts pass-through, validation failures, caveat enforcement, replay protection, and delegation validation (signature verification, audience checks, expiration, tampered signatures, proof chain consistency, and did:ixo support).

License

MIT

Links