nonsudo
v1.4.0
Published
NonSudo — mandate enforcement and cryptographic receipts for AI agents
Maintainers
Readme
nonsudo
Mandate enforcement and cryptographic receipts for AI agents.
Install
npm install nonsudoUsage
Receipt API
import { createReceipt, signReceipt, chainReceipt, verifyChain } from 'nonsudo';Policy engine
import { loadPolicy, evaluatePolicy } from 'nonsudo/policy';OpenAI adapter
import { createActionReceipt } from 'nonsudo/adapter-openai';LangChain adapter
import { createNonSudoCallbacks } from 'nonsudo/adapter-langchain';
const llm = new ChatOpenAI({ callbacks: createNonSudoCallbacks(config) });CLI
nonsudo init # generate keypair + scaffold config
nonsudo observe # start observe proxy (local telemetry)
nonsudo verify receipts.ndjson # L1 + L2 verification
nonsudo verify receipts.ndjson --full # L1 + L2 + L3 + L4
nonsudo conform # conformance test vectors
nonsudo schemas list # list available schema packs
nonsudo keys list # list signing keypairs
nonsudo health # run diagnostic checks
nonsudo query --file receipts.ndjson # query an NDJSON receipt file
nonsudo report --workflow <id> # generate workflow report
nonsudo test receipts.ndjson # replay chain against current policy
nonsudo watch # watch live receipt streamObserve logs vs signed VAR receipts
nonsudo observe writes local observe logs for developer visibility.
These logs are not signed VAR receipts and are not a cryptographic
audit chain. They are lightweight telemetry for understanding what your
agent is doing during development.
For cryptographically signed, hash-chained, timestamped VAR receipts suitable for compliance, audit, or regulatory use — see the NonSudo platform quickstart.
For implementers
The @varcore/* packages are the underlying open standard implementation.
Any implementation conforming to the VAR-Core spec can reference them directly.
Full spec: https://github.com/nonsudo/varcore
Links
- Platform: https://nonsudo.com/docs/quickstart
- Schema registry: https://schemas.nonsudo.com
- License: Apache-2.0
