@mcptoolshop/repomesh
v1.0.0
Published
Trust infrastructure for repo networks — verify releases, check anchors, and onboard repos from anywhere.
Maintainers
Readme
Trust infrastructure for repo networks. Verify releases, check XRPL anchors, and onboard repos — all from the command line.
Quick Start
# Verify a release (works from anywhere — no clone needed)
npx @mcptoolshop/repomesh verify-release \
--repo mcp-tool-shop-org/shipcheck --version 1.0.4 --anchored
# Verify an XRPL anchor transaction
npx @mcptoolshop/repomesh verify-anchor --tx <txHash>
# Onboard a repo to the network
npx @mcptoolshop/repomesh init --repo your-org/your-repo --profile open-source
# Diagnose your repo's integration
npx @mcptoolshop/repomesh doctor --dir .Commands
verify-release
Verify a release's full trust chain: signature, attestations, and optional XRPL anchor proof.
repomesh verify-release --repo org/repo --version 1.0.0 [--anchored] [--json]In standalone mode (installed via npm), fetches ledger data from GitHub. In dev mode (inside a RepoMesh checkout), reads local files.
| Flag | Description |
|------|-------------|
| --repo | Target repo (required) |
| --version | Release version (required) |
| --anchored | Also verify XRPL anchor inclusion |
| --json | Structured JSON output (for CI gates) |
| --ledger-url | Override ledger events URL |
| --nodes-url | Override nodes base URL |
| --manifests-url | Override manifests base URL |
verify-anchor
Verify an XRPL anchor transaction by recomputing the Merkle root from ledger data.
repomesh verify-anchor --tx <hash> [--network testnet] [--json]init
Generate all onboarding files for a repo joining the RepoMesh network.
repomesh init --repo your-org/your-repo [--profile open-source] [--dir .]Creates: node.json, repomesh.profile.json, repomesh.overrides.json, .github/workflows/repomesh-broadcast.yml, and an Ed25519 signing keypair.
doctor
Validate your local repo's RepoMesh configuration against schemas.
repomesh doctor [--dir .] [--repo org/repo] [--json]Checks: node.json schema, profile schema, overrides schema, broadcast workflow, .gitignore for keys.
Standalone vs Dev Mode
| Mode | Detection | Data source |
|------|-----------|-------------|
| Standalone | Default (npm install) | Fetches from GitHub raw URLs |
| Dev | Inside a RepoMesh checkout | Reads local ledger/, registry/, etc. |
Dev mode is auto-detected when ledger/events/events.jsonl, registry/, and schemas/ exist in the working directory.
What Verification Proves
When verify-release --anchored passes, you know:
- The release event exists in the ledger and its Ed25519 signature is valid
- All attestations (SBOM, provenance, license, security) are signed and present
- The release is included in a Merkle partition whose root is posted to the XRPL testnet
- The partition's manifest hash matches the on-chain memo
What it does not prove: that the code does what it claims, that the SBOM is complete, or that the security scan found all vulnerabilities. Trust is multi-dimensional — scores reflect evidence, not guarantees.
Security
No telemetry. No analytics. No phone-home. Network access is limited to GitHub raw URLs (for ledger data) and XRPL WebSocket (for anchor verification). See SECURITY.md.
License
MIT
Built by MCP Tool Shop
