npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

provenclave

v1.0.1

Published

Provenclave — portable cryptographic proof at finalization. Hardware TEE enforcement via AWS Nitro Enclaves.

Readme

Provenclave

Portable cryptographic proof at finalization

npm provenclave CI

npm install provenclave

Whitepaper: Authentication as a Reachability Property

Provenclave is a TypeScript library for producing tamper-evident, process-bound commit proofs. It enforces one invariant:

A specific trusted constructor finalized specific bytes at a specific authorization step — atomically, fail-closed.

This is proof of finalization, not proof of authorship, truth, or first creation.


30-Second Demo

git clone [email protected]:mikeargento/provenclave.git
cd provenclave
npm install
npm run demo
Provenclave demo starting…

  ✓ server healthy
  ✓ commit produced proof
    digest:      u4eMAiu6Qg8uDGPqqdv5zzHnWEP6aMCG7sctUPccbMU=
    counter:     1
    measurement: stub:measurement:not-a-real-tee
    proofHash:   +0Q8UEdmGd03KexFoeMER5j14SpjeHzRxrPboFt/vlg=
  ✓ verification passed
  ✓ tampered payload correctly rejected

Demo complete.

No accounts. No Docker. No external services. Swap @provenclave/stub for a real TEE adapter when you need hardware boundary enforcement.


For AI agents

Provenclave is designed to be called by AI agents, autonomous pipelines, and LLM-powered tools. It solves a specific problem: how does an agent prove that it processed specific bytes, in a specific order, at a specific time — without trusting a centralized service?

One-line usage from any agent

# Commit any file or output — returns a self-contained JSON proof
curl -X POST https://nitro.occproof.com/commit \
  -H "Content-Type: application/octet-stream" \
  --data-binary @agent-output.json

What you get back

A JSON OCCProof that any verifier can check offline — no API key, no account, no external lookup:

{
  "version": "provenclave/1",
  "artifact": { "hashAlg": "sha256", "digestB64": "u4eMAiu6Qg..." },
  "commit": { "nonceB64": "...", "counter": "42", "time": 1700000000000, "epochId": "..." },
  "signer": { "publicKeyB64": "...", "signatureB64": "..." },
  "environment": { "enforcement": "measured-tee", "measurement": "pcr0:..." }
}

Agent use cases

| Use case | How Provenclave helps | |---|---| | AI output provenance | Commit model outputs to a TEE — proof ties the exact bytes to a hardware measurement | | Dataset admission gate | Verify incoming data hasn't changed before a training run | | Audit trail for tool calls | Chain proofs with prevB64 — any insertion or reordering breaks the chain | | Tamper-evident logs | Every log line committed = any modification is detectable | | Content integrity for RAG | Prove retrieved documents match what was indexed | | Agent-to-agent handoff | Pass a proof alongside data so the receiving agent can verify it hasn't been modified in transit |

Verify a proof in Node.js (3 lines)

import { verify } from "provenclave";
const result = await verify({ proof, bytes });
// result.valid === true | false
// result.detail — per-field breakdown

Live Proof Studio (browser)

Drag-and-drop a file to commit and verify instantly, no install: https://provenclave.com/studio

Claude / MCP integration

Add Provenclave tools directly to any Claude agent — no code required:

# Claude Code
claude mcp add occ -- npx -y @provenclave/mcp

# Claude Desktop — add to ~/.claude/claude_desktop_config.json:
# { "mcpServers": { "occ": { "command": "npx", "args": ["-y", "@provenclave/mcp"] } } }

Once installed, Claude can call commit_text, commit_file, and verify_proof natively.

OpenAPI spec

Machine-readable API description for agent frameworks, code generators, and tool registries: https://provenclave.com/openapi.json

Discovery endpoints (GitHub Pages)

Agent frameworks that probe for capabilities will find:

  • /.well-known/ai-plugin.json — ChatGPT plugin / OpenAI tool format
  • /.well-known/mcp.json — MCP server install instructions
  • /llms.txt — plain-English summary for LLM crawlers

Agent workflow example

Ready-to-run script: commit output → save proof → verify:

node examples/agent-workflow/agent-workflow.js
node examples/agent-workflow/agent-workflow.js --file ./myreport.txt
node examples/agent-workflow/agent-workflow.js --text "My AI output"

Which package do I need?

| I want to… | Start here | |---|---| | Use Provenclave in an app (dev/test) | provenclave (includes core + stub for development) | | Run inside AWS Nitro Enclaves | provenclave + @provenclave/nitro (monorepo package) | | Build a new hardware TEE adapter | provenclave + @provenclave/adapter-kit (monorepo package) | | Verify proofs offline | provenclave only |


Packages in this repo

| Package | Description | |---|---| | provenclave | The library: Constructor, verify, types, canonical JSON | | @provenclave/stub | Dev-only StubHost — software crypto, no TEE required, persistent state | | @provenclave/nitro | AWS Nitro Enclaves adapter — NSM, PCR0 measurement, KMS-backed counter | | @provenclave/adapter-kit | Hardware TEE builder kit — 28-test compliance suite + adapter template | | @provenclave/mcp | MCP server — exposes commit_text, commit_file, verify_proof as Claude tools | | @provenclave/demo-service | Local HTTP service: POST /commit, POST /verify, GET /health | | @provenclave/cli | CLI: occ commit, occ verify, occ serve | | @provenclave/playground | Browser UI: commit/verify via drag-and-drop, proof JSON viewer |


HTTP Demo

Start the demo service, then use curl to commit and verify:

# Terminal 1 — start the service
node packages/occ-cli/dist/cli.js serve --port=8787

# Terminal 2 — health check
curl -s http://localhost:8787/health
# → {"ok":true}

# Commit a file (raw bytes via octet-stream)
curl -s -X POST http://localhost:8787/commit \
  -H "Content-Type: application/octet-stream" \
  --data-binary @README.md > commit-result.json

cat commit-result.json | grep -o '"counter":"[^"]*"'
# → "counter":"1"

# Verify a file against its proof
BYTES_B64=$(base64 -i README.md | tr -d '\n')
PROOF=$(cat commit-result.json | node -e "process.stdin.resume();let d='';process.stdin.on('data',c=>d+=c);process.stdin.on('end',()=>console.log(JSON.parse(d).proof))" 2>/dev/null || cat commit-result.json | python3 -c "import sys,json;print(json.dumps(json.load(sys.stdin)['proof']))")

curl -s -X POST http://localhost:8787/verify \
  -H "Content-Type: application/json" \
  -d "{\"bytes\":\"$BYTES_B64\",\"proof\":$(cat commit-result.json | node -e "const d=[];process.stdin.on('data',c=>d.push(c));process.stdin.on('end',()=>process.stdout.write(JSON.stringify(JSON.parse(d.join('')).proof)))")}"
# → {"valid":true}

For scripted use, prefer the CLI (occ commit / occ verify) over the HTTP service. The HTTP service exists for browser and polyglot client demos.


Troubleshooting

Supported Node versions

Node 18 or later is required. Check with:

node --version   # must be >= 18.0.0

npm run build fails — TypeScript errors

Ensure devDependencies are installed:

npm install
npm run build

If you see Cannot find module 'provenclave' inside a sub-package, the workspace symlinks may not be set up. Run npm install from the repo root, not from inside a sub-package.

Port already in use

Error: listen EADDRINUSE: address already in use :::8787

Either stop the existing process or choose a different port:

node packages/occ-cli/dist/cli.js serve --port=8788

npx occ cannot find occ

@provenclave/cli is private: true and is not published. Use the local path:

node packages/occ-cli/dist/cli.js commit <file>
# or after npm link from the repo root:
npm link
occ commit <file>

OCC_STATE_PATH — what it controls

The CLI and demo service persist a signing key and monotonic counter to a JSON file at ./occ-state.json by default. Override with:

OCC_STATE_PATH=/path/to/my-state.json occ commit myfile.txt

The state file is created on first use. It contains the Ed25519 private key and counter in plaintext — do not commit it to version control. For production, use a real TEE adapter; the key never leaves hardware.

Proof verification fails after editing the file

verify() checks that SHA-256(bytes) == proof.artifact.digestB64. Any modification to the committed file after the fact will produce { valid: false }. This is the expected behavior — the proof is tied to the exact bytes committed.

Large files / "Maximum call stack size exceeded"

This affects only the browser Playground (@provenclave/playground), not the CLI or library. The Playground uses a chunked bufToBase64 implementation that handles files of any size. If you see this error in a custom integration, chunk your base64 encoding in 32 KB blocks.


Local quickstart

# Clone and install
git clone [email protected]:mikeargento/provenclave.git
cd provenclave
npm install
npm run build    # builds all packages

# Commit a file
node packages/occ-cli/dist/cli.js commit README.md --out proof.json

# Verify it
node packages/occ-cli/dist/cli.js verify README.md proof.json

# Start the HTTP demo service
node packages/occ-cli/dist/cli.js serve --port=8787

Or via the built binary after npm link:

npm link
occ commit myfile.bin --out myfile.proof.json
occ verify myfile.bin myfile.proof.json
occ serve --port=8787

CLI reference

occ commit <file> [--out <proof.json>] [--chain]
    Commit a file and print its OCCProof.
    --out <file>   Save proof JSON to a file (default: print to stdout)
    --chain        Link to the previous proof via prevB64

occ verify <file> <proof.json>
    Verify a file against its proof. Exits 0 if valid, 1 if not.

occ serve [--port <n>]
    Start the local HTTP demo service (default: 8787).

OCC_STATE_PATH=./my-state.json occ commit <file>
    Override the state file path (default: ./occ-state.json).

HTTP service reference

Start with occ serve or node packages/occ-demo-service/dist/server.js.

GET /health

{ "ok": true }

POST /commit

Accepts Content-Type: application/octet-stream (raw bytes) or multipart/form-data (file upload).

Returns:

{
  "proof": { /* OCCProof */ },
  "digestB64": "<sha256 of input, base64>",
  "proofHashB64": "<sha256 of proof, base64 — use as prevB64 for next commit>"
}

Add ?save=1 to also write proof-<timestamp>.json to disk.

POST /verify

Content-Type: application/json, body:

{ "bytes": "<base64 of original bytes>", "proof": { ... } }

Returns:

{ "valid": true }
// or
{ "valid": false, "reason": "..." }

Library API

import { Constructor, verify } from "provenclave";
import { StubHost } from "@provenclave/stub";

// One-time setup
const stub = await StubHost.createPersistent({ statePath: "./occ-state.json" });
const ctor = await Constructor.initialize({ host: stub.host });

// Commit bytes (atomic, fail-closed)
const bytes = new TextEncoder().encode("hello world");
const proof = await ctor.commit({ bytes });

// Verify offline — no network, no host
const result = await verify({ proof, bytes });
console.log(result.valid); // true

Proof chaining (prevB64)

Each proof can reference the hash of the previous one, creating a verifiable chain:

import { canonicalize } from "provenclave";
import { sha256 } from "@noble/hashes/sha256";

// After each commit, compute and store the proof's hash
const proofHash = Buffer.from(sha256(canonicalize(proof))).toString("base64");
stub.setLastProofHash(proofHash);

// On the next commit, feed it back in
const nextProof = await ctor.commit({
  bytes: nextBytes,
  prevProofHashB64: stub.getLastProofHash(),
});
// nextProof.commit.prevB64 === proofHash ✓

This creates a "living proof" — each output is linked to the one before it, making replay or insertion detectable. The demo service and CLI do this automatically.


Proof Structure (v1)

Every OCCProof is a self-contained JSON document. No server lookup is needed to verify one.

{
  "version": "provenclave/1",                       // schema version; forward-compatibility sentinel
  "artifact": {
    "hashAlg": "sha256",                    // algorithm used to hash the input bytes
    "digestB64": "<base64>"                 // H — SHA-256 of the raw input bytes
  },
  "commit": {
    "nonceB64": "<base64>",                 // N — boundary-fresh random nonce from the host
    "counter":  "42",                       // C — monotonic counter (decimal string, BigInt-safe)
    "time":     1700000000000,              // Unix ms at commit time (advisory; use counter for ordering)
    "prevB64":  "<base64>",                 // optional — SHA-256 of the previous proof's canonical form
    "epochId":  "<string>"                  // optional — enclave lifecycle identifier, changes on restart
  },
  "signer": {
    "publicKeyB64":  "<base64>",            // Ed25519 public key (32 bytes, standard base64)
    "signatureB64":  "<base64>"             // Ed25519 signature over the canonical SignedBody
  },
  "environment": {
    "enforcement": "measured-tee",          // "stub" | "hw-key" | "measured-tee" — signed, tamper-evident
    "measurement": "<string>",              // platform measurement (PCR0 on Nitro, MRENCLAVE on SGX, …)
    "attestation": {                        // optional — raw TEE attestation report
      "format":    "aws-nitro",             // identifies the document format (signed)
      "reportB64": "<base64>"              // raw bytes of the attestation document (vendor-signed)
    }
  },
  "metadata": { }                           // optional — caller-supplied; NOT signed
}

Field reference

| Field | Role | Signed? | Notes | |---|---|---|---| | version | Schema sentinel | ✓ | Always "provenclave/1" | | artifact.hashAlg | Hash algorithm | ✓ | Always "sha256" in v1 | | artifact.digestB64 | Content hash (H) | ✓ | SHA-256 of raw input bytes | | commit.nonceB64 | Freshness proof (N) | ✓ | Generated by host per commit | | commit.counter | Ordering proof (C) | ✓ | Decimal string; strictly monotonic | | commit.time | Wall-clock hint | ✓ | Unix ms; advisory only — not a sole ordering guarantee | | commit.prevB64 | Chain link | ✓ | SHA-256 of prior proof's canonical JSON | | commit.epochId | Epoch identity | ✓ | Enclave lifecycle ID; changes on restart | | signer.publicKeyB64 | Identity | ✓ | Ed25519 32-byte key | | signer.signatureB64 | Integrity seal | — (is the seal) | Covers everything marked ✓ | | environment.enforcement | Tier declaration | ✓ | Tamper-evident; not self-authenticating — verify via measurement | | environment.measurement | Platform identity | ✓ | Primary trust anchor; pin with allowedMeasurements | | environment.attestation.format | Report type | ✓ | Prevents semantic ambiguity via format rewrite | | environment.attestation.reportB64 | TEE report | ✗ | Vendor-signed; self-authenticating; not interpreted by library | | metadata | Caller context | ✗ | Treat as advisory; anyone can edit it |

What is signed

The signature covers the canonical serialization of this object (recursive sorted-key JSON → UTF-8):

{
  version:            proof.version,
  artifact:           proof.artifact,
  commit:             proof.commit,
  publicKeyB64:       proof.signer.publicKeyB64,
  enforcement:        proof.environment.enforcement,
  measurement:        proof.environment.measurement,
  attestationFormat:  proof.environment.attestation?.format,  // when present
}

environment.attestation.reportB64 and metadata are outside the signature. The attestation report is vendor-signed and self-authenticating; metadata should never be used as a trust signal.

StubHost vs. real TEE

| Property | @provenclave/stub (dev only) | Real TEE adapter | |---|---|---| | Key storage | Plaintext JSON file | Hardware-protected | | Counter | Software; can be reset | Hardware; monotonic by construction | | Measurement | Fixed placeholder string | Real PCR/MRENCLAVE | | Attestation | None | NSM / DCAP report binding the nonce |

@provenclave/stub is not a security boundary. It exists so you can develop and test without a TEE.


Threat model

What Provenclave proves

  • That a process in possession of a specific private key committed specific bytes
  • That the commitment happened after a specific authorization step (counter + nonce)
  • That the commitment structure was not tampered with after signing
  • That chained proofs were produced in the stated order (when prevB64 is used)

What Provenclave does NOT prove

  • That the private key was generated inside a real TEE — this requires platform attestation verification (adapter-specific, out of scope here)
  • That the committed bytes are true, correct, or authored by any party
  • Anything about the contents of metadata (not signed)
  • Liveness of the enclave at verification time

StubHost is not a real TEE

@provenclave/stub is development tooling only:

  • The signing key is held in process memory and optionally persisted as plaintext JSON
  • The counter is software-only and can be reset or forged
  • There is no hardware measurement — the measurement string is a fixed placeholder
  • There is no attestation report

A proof produced by StubHost proves that Provenclave's signing and verification logic works correctly. It does not prove boundary enforcement. For real boundary enforcement, use a real TEE adapter (@provenclave/adapter-nitro when wired to a live Nitro Enclave, or a future SGX/SEV adapter).


What Provenclave is NOT

This section exists because "cryptographic proof of X" is a phrase that invites creative misreading.

Not a blockchain

Provenclave does not require consensus, peer nodes, or a distributed ledger. There is no token, no chain of blocks, and no global ordering across parties. Chained proofs (prevB64) create a locally verifiable sequence within a single process — not a public, replicated history.

Not a content watermark or fingerprint

Provenclave proves that a specific process committed specific bytes — it does not embed anything inside the bytes themselves. The proof is a separate document. Modifying the bytes invalidates the proof, but anyone can produce a new valid proof for the modified bytes using a different key. Provenclave does not prevent copying or modification; it makes tampering detectable.

Not digital rights management (DRM)

Provenclave enforces nothing at access time. There is no encrypted container, no license server, and no runtime enforcement that gates playback or reading. Provenclave is a commit record, not a gating mechanism.

Not a replacement for TEE attestation

When backed by a real TEE, a Provenclave proof includes a raw attestation report. The library stores that report verbatim — it does not parse, validate, or chain-verify it. Full attestation verification (certificate chains, PCR policy, revocation) is the responsibility of the caller. Provenclave's job is to bind the signing key to the commit; attestation links the key to the hardware. They are complementary, not interchangeable.

Not a proof of authorship or truth

Provenclave proves finalization, not origin. A proof says "this process committed these bytes at this counter". It says nothing about who wrote the bytes, whether the bytes are accurate, or whether the process was acting on someone's behalf. Authorship and provenance require additional out-of-band verification.


Adapters

@provenclave/stub — dev only

Full HostCapabilities implementation in software. Use for local development, testing, and demos.

import { StubHost } from "@provenclave/stub";

// Ephemeral (resets on restart)
const stub = await StubHost.create();

// Persistent (survives restarts — key and counter stored in JSON file)
const stub = await StubHost.createPersistent({ statePath: "./occ-state.json" });

@provenclave/nitro — AWS Nitro Enclaves

Full HostCapabilities implementation for code running inside a Nitro Enclave.

  • getMeasurement() — reads PCR0 via NSM DescribePCR
  • getFreshNonce() — uses NSM GetRandom (hardware RNG)
  • getAttestation() — produces an NSM attestation document bound to the proof body hash
  • nextCounter() — KMS-backed monotonic counter sealed to PCR0; blob rollback closed by optional anchorCounter callback
  • enforcementTier: "measured-tee"
import { NitroHost, KmsCounter } from "@provenclave/nitro";

const counter = new KmsCounter({
  kmsKeyId:    "arn:aws:kms:us-east-1:...",
  kmsRegion:   "us-east-1",
  kmsEndpoint: "http://localhost:8000",  // vsock proxy to KMS
  persistBlob: async (b) => { /* write ciphertext to storage */ },
  restoreBlob: async ()  => { /* read ciphertext from storage */ },
});
await counter.restore();

const host = new NitroHost({ counter });
const ctor = await Constructor.initialize({ host: host.host });

Requires a real AWS Nitro Enclave. Use @provenclave/stub for local development.

@provenclave/adapter-kit — build your own adapter

For hardware TEE manufacturers and platform teams who want Provenclave on their hardware.

// 1. Copy the adapter template and fill in the TODOs
//    packages/adapter-kit/src/adapter-template.ts → src/my-tee-host.ts

// 2. Run the compliance suite against your implementation
import { runCompliance } from "@provenclave/adapter-kit";
import { MyTeeHost } from "./my-tee-host.js";

const host = await MyTeeHost.create();
runCompliance(host);  // 28 tests — green means Provenclave-compliant

// 3. node --test dist/compliance.test.js

Works with any test runner (node:test, Jest, Vitest) via the lower-level runHostComplianceTests(host, { describe, it }) export.


Verification policy (trust anchors)

const result = await verify({
  proof,
  bytes,
  trustAnchors: {
    allowedMeasurements: ["<expected measurement>"],  // exact match
    allowedPublicKeys:   ["<expected pubkey base64>"], // exact match
    minCounter: "100",    // reject proofs with counter < 100
    maxCounter: "999",    // reject proofs with counter > 999
    minTime: Date.now() - 5 * 60 * 1000,  // reject proofs older than 5 min
    maxTime: Date.now() + 60 * 1000,      // reject future-dated proofs
  },
});

All fields are optional. Omitting a field skips that check.


Browser Demo (Playground)

A zero-dependency browser UI for exploring commit and verify interactively. No build step, no framework, no cloud account.

# 1. Start the Provenclave HTTP server (uses StubHost — no TEE required)
node packages/occ-cli/dist/cli.js serve --port=8787

# 2. Start the Playground static server
npm run playground

# 3. Open your browser
open http://localhost:8788

The Playground page lets you:

  • Upload any file (click or drag-and-drop)
  • See the browser-computed SHA-256 alongside the server's proof
  • Commit → inspect the full OCCProof JSON with syntax highlighting
  • Verify → confirm the proof is still consistent with the file
  • Copy the proof JSON to clipboard for use elsewhere

The Playground uses StubHost unless a real TEE adapter is configured on the server side. All cryptographic operations happen server-side; the browser only displays results.


Architecture

packages/
  occ-core/               provenclave — core library (Constructor, verify, types)
    src/
      index.ts            public re-exports
      types.ts            OCCProof, OCCPolicy, VerificationPolicy, SignedBody
      host.ts             HostCapabilities interface
      canonical.ts        deterministic JSON + constant-time equality
      constructor.ts      write path: atomic commit
      verifier.ts         offline verification
      __tests__/          unit tests

  occ-core-stub/          @provenclave/stub — dev-only host
    src/
      stub-host.ts        StubHost.create() + StubHost.createPersistent()
      __tests__/          unit tests (persistent counter, policy checks)

  adapter-nitro/          @provenclave/nitro — AWS Nitro Enclaves adapter
    src/
      nitro-host.ts       NitroHost, DefaultNsmClient (NSM ioctl transport)
      kms-counter.ts      KmsCounter — KMS-backed monotonic counter, SigV4, anchorCounter

  adapter-kit/            @provenclave/adapter-kit — hardware adapter builder kit
    src/
      host-compliance.ts  runHostComplianceTests() — 28-test runner-agnostic suite
      compliance-runner.ts runCompliance() — node:test convenience wrapper
      adapter-template.ts  MyTeeHost — copy-paste skeleton with TODO stubs

  occ-demo-service/       @provenclave/demo-service — local HTTP service
    src/
      server.ts           GET /health, POST /commit, POST /verify
      __tests__/          integration tests

  occ-cli/                @provenclave/cli — command-line tool
    src/
      cli.ts              occ commit / verify / serve

  occ-playground/         @provenclave/playground — browser demo UI
    index.html            single-page commit/verify interface
    app.js                WebCrypto SHA-256, fetch to /commit and /verify
    styles.css            clean technical stylesheet (no framework)
    serve.js              tiny Node static server on :8788

Running tests

npm test                                            # all packages
npm test --workspace=packages/occ-core              # core unit tests only
npm test --workspace=packages/occ-core-stub         # stub + persistence tests
npm test --workspace=packages/occ-demo-service      # HTTP integration tests

Cryptography

| Primitive | Algorithm | Library | |---|---|---| | Hashing | SHA-256 | @noble/hashes | | Signatures | Ed25519 | @noble/ed25519 | | Canonicalization | Sorted-key JSON + UTF-8 | built-in |

@noble/hashes and @noble/ed25519 are audited, zero-dependency pure-TypeScript.


Publishing

Do not publish until the library has received independent security review.

Publishable packages: provenclave, @provenclave/stub, @provenclave/nitro, @provenclave/adapter-kit. Private packages (@provenclave/cli, @provenclave/demo-service, @provenclave/playground) are marked "private": true and will not be published.

Pre-publish checklist:

# 1. Inspect tarball contents
npm pack --dry-run --workspace=packages/occ-core
npm pack --dry-run --workspace=packages/occ-core-stub
npm pack --dry-run --workspace=packages/adapter-nitro
npm pack --dry-run --workspace=packages/adapter-kit

# 2. Run full test suite
npm test

# 3. Verify test vectors
node packages/occ-cli/dist/cli.js verify test-vectors/hello.txt test-vectors/hello.proof.json
node packages/occ-cli/dist/cli.js verify test-vectors/sample.txt test-vectors/proof.json

# 4. Tag and release
git tag v0.1.0 && git push --tags
# create GitHub release from tag

# 5. Publish (when ready)
npm publish --workspace=packages/occ-core
npm publish --workspace=packages/occ-core-stub
npm publish --workspace=packages/adapter-nitro
npm publish --workspace=packages/adapter-kit

See CONTRIBUTING.md for the full release checklist.


Keywords

provenclave · content integrity · tamper-evident · cryptographic proof · file attestation · verifiable proof · commit proof · Ed25519 · SHA-256 · hardware attestation · TEE · Trusted Execution Environment · AWS Nitro Enclave · PCR0 · provenance · audit trail · AI output attestation · dataset integrity · agent output verification · content provenance · origin controlled computing · proof of finalization · monotonic counter · canonical JSON · offline verification · supply chain integrity · AI agent tools · LLM tooling · agentic workflows


License

Copyright 2024-2026 Mike Argento. Licensed under the Apache License, Version 2.0.

All source files in this repository carry the SPDX header:

// SPDX-License-Identifier: Apache-2.0
// Copyright 2024-2026 Mike Argento

This software depends on @noble/ed25519 and @noble/hashes (both MIT-licensed). See the NOTICE file for full third-party attribution.