provenclave
v1.0.1
Published
Provenclave — portable cryptographic proof at finalization. Hardware TEE enforcement via AWS Nitro Enclaves.
Maintainers
Keywords
Readme
Provenclave
Portable cryptographic proof at finalization
npm install provenclaveWhitepaper: Authentication as a Reachability Property
Provenclave is a TypeScript library for producing tamper-evident, process-bound commit proofs. It enforces one invariant:
A specific trusted constructor finalized specific bytes at a specific authorization step — atomically, fail-closed.
This is proof of finalization, not proof of authorship, truth, or first creation.
30-Second Demo
git clone [email protected]:mikeargento/provenclave.git
cd provenclave
npm install
npm run demoProvenclave demo starting…
✓ server healthy
✓ commit produced proof
digest: u4eMAiu6Qg8uDGPqqdv5zzHnWEP6aMCG7sctUPccbMU=
counter: 1
measurement: stub:measurement:not-a-real-tee
proofHash: +0Q8UEdmGd03KexFoeMER5j14SpjeHzRxrPboFt/vlg=
✓ verification passed
✓ tampered payload correctly rejected
Demo complete.No accounts. No Docker. No external services.
Swap @provenclave/stub for a real TEE adapter when you need hardware boundary enforcement.
For AI agents
Provenclave is designed to be called by AI agents, autonomous pipelines, and LLM-powered tools. It solves a specific problem: how does an agent prove that it processed specific bytes, in a specific order, at a specific time — without trusting a centralized service?
One-line usage from any agent
# Commit any file or output — returns a self-contained JSON proof
curl -X POST https://nitro.occproof.com/commit \
-H "Content-Type: application/octet-stream" \
--data-binary @agent-output.jsonWhat you get back
A JSON OCCProof that any verifier can check offline — no API key, no account, no external lookup:
{
"version": "provenclave/1",
"artifact": { "hashAlg": "sha256", "digestB64": "u4eMAiu6Qg..." },
"commit": { "nonceB64": "...", "counter": "42", "time": 1700000000000, "epochId": "..." },
"signer": { "publicKeyB64": "...", "signatureB64": "..." },
"environment": { "enforcement": "measured-tee", "measurement": "pcr0:..." }
}Agent use cases
| Use case | How Provenclave helps |
|---|---|
| AI output provenance | Commit model outputs to a TEE — proof ties the exact bytes to a hardware measurement |
| Dataset admission gate | Verify incoming data hasn't changed before a training run |
| Audit trail for tool calls | Chain proofs with prevB64 — any insertion or reordering breaks the chain |
| Tamper-evident logs | Every log line committed = any modification is detectable |
| Content integrity for RAG | Prove retrieved documents match what was indexed |
| Agent-to-agent handoff | Pass a proof alongside data so the receiving agent can verify it hasn't been modified in transit |
Verify a proof in Node.js (3 lines)
import { verify } from "provenclave";
const result = await verify({ proof, bytes });
// result.valid === true | false
// result.detail — per-field breakdownLive Proof Studio (browser)
Drag-and-drop a file to commit and verify instantly, no install: https://provenclave.com/studio
Claude / MCP integration
Add Provenclave tools directly to any Claude agent — no code required:
# Claude Code
claude mcp add occ -- npx -y @provenclave/mcp
# Claude Desktop — add to ~/.claude/claude_desktop_config.json:
# { "mcpServers": { "occ": { "command": "npx", "args": ["-y", "@provenclave/mcp"] } } }Once installed, Claude can call commit_text, commit_file, and verify_proof natively.
OpenAPI spec
Machine-readable API description for agent frameworks, code generators, and tool registries: https://provenclave.com/openapi.json
Discovery endpoints (GitHub Pages)
Agent frameworks that probe for capabilities will find:
/.well-known/ai-plugin.json— ChatGPT plugin / OpenAI tool format/.well-known/mcp.json— MCP server install instructions/llms.txt— plain-English summary for LLM crawlers
Agent workflow example
Ready-to-run script: commit output → save proof → verify:
node examples/agent-workflow/agent-workflow.js
node examples/agent-workflow/agent-workflow.js --file ./myreport.txt
node examples/agent-workflow/agent-workflow.js --text "My AI output"Which package do I need?
| I want to… | Start here |
|---|---|
| Use Provenclave in an app (dev/test) | provenclave (includes core + stub for development) |
| Run inside AWS Nitro Enclaves | provenclave + @provenclave/nitro (monorepo package) |
| Build a new hardware TEE adapter | provenclave + @provenclave/adapter-kit (monorepo package) |
| Verify proofs offline | provenclave only |
Packages in this repo
| Package | Description |
|---|---|
| provenclave | The library: Constructor, verify, types, canonical JSON |
| @provenclave/stub | Dev-only StubHost — software crypto, no TEE required, persistent state |
| @provenclave/nitro | AWS Nitro Enclaves adapter — NSM, PCR0 measurement, KMS-backed counter |
| @provenclave/adapter-kit | Hardware TEE builder kit — 28-test compliance suite + adapter template |
| @provenclave/mcp | MCP server — exposes commit_text, commit_file, verify_proof as Claude tools |
| @provenclave/demo-service | Local HTTP service: POST /commit, POST /verify, GET /health |
| @provenclave/cli | CLI: occ commit, occ verify, occ serve |
| @provenclave/playground | Browser UI: commit/verify via drag-and-drop, proof JSON viewer |
HTTP Demo
Start the demo service, then use curl to commit and verify:
# Terminal 1 — start the service
node packages/occ-cli/dist/cli.js serve --port=8787
# Terminal 2 — health check
curl -s http://localhost:8787/health
# → {"ok":true}
# Commit a file (raw bytes via octet-stream)
curl -s -X POST http://localhost:8787/commit \
-H "Content-Type: application/octet-stream" \
--data-binary @README.md > commit-result.json
cat commit-result.json | grep -o '"counter":"[^"]*"'
# → "counter":"1"
# Verify a file against its proof
BYTES_B64=$(base64 -i README.md | tr -d '\n')
PROOF=$(cat commit-result.json | node -e "process.stdin.resume();let d='';process.stdin.on('data',c=>d+=c);process.stdin.on('end',()=>console.log(JSON.parse(d).proof))" 2>/dev/null || cat commit-result.json | python3 -c "import sys,json;print(json.dumps(json.load(sys.stdin)['proof']))")
curl -s -X POST http://localhost:8787/verify \
-H "Content-Type: application/json" \
-d "{\"bytes\":\"$BYTES_B64\",\"proof\":$(cat commit-result.json | node -e "const d=[];process.stdin.on('data',c=>d.push(c));process.stdin.on('end',()=>process.stdout.write(JSON.stringify(JSON.parse(d.join('')).proof)))")}"
# → {"valid":true}For scripted use, prefer the CLI (occ commit / occ verify) over the HTTP service.
The HTTP service exists for browser and polyglot client demos.
Troubleshooting
Supported Node versions
Node 18 or later is required. Check with:
node --version # must be >= 18.0.0npm run build fails — TypeScript errors
Ensure devDependencies are installed:
npm install
npm run buildIf you see Cannot find module 'provenclave' inside a sub-package, the workspace
symlinks may not be set up. Run npm install from the repo root, not from
inside a sub-package.
Port already in use
Error: listen EADDRINUSE: address already in use :::8787Either stop the existing process or choose a different port:
node packages/occ-cli/dist/cli.js serve --port=8788npx occ cannot find occ
@provenclave/cli is private: true and is not published. Use the local path:
node packages/occ-cli/dist/cli.js commit <file>
# or after npm link from the repo root:
npm link
occ commit <file>OCC_STATE_PATH — what it controls
The CLI and demo service persist a signing key and monotonic counter to a JSON
file at ./occ-state.json by default. Override with:
OCC_STATE_PATH=/path/to/my-state.json occ commit myfile.txtThe state file is created on first use. It contains the Ed25519 private key and counter in plaintext — do not commit it to version control. For production, use a real TEE adapter; the key never leaves hardware.
Proof verification fails after editing the file
verify() checks that SHA-256(bytes) == proof.artifact.digestB64. Any
modification to the committed file after the fact will produce { valid: false }.
This is the expected behavior — the proof is tied to the exact bytes committed.
Large files / "Maximum call stack size exceeded"
This affects only the browser Playground (@provenclave/playground), not the CLI or
library. The Playground uses a chunked bufToBase64 implementation that handles
files of any size. If you see this error in a custom integration, chunk your
base64 encoding in 32 KB blocks.
Local quickstart
# Clone and install
git clone [email protected]:mikeargento/provenclave.git
cd provenclave
npm install
npm run build # builds all packages
# Commit a file
node packages/occ-cli/dist/cli.js commit README.md --out proof.json
# Verify it
node packages/occ-cli/dist/cli.js verify README.md proof.json
# Start the HTTP demo service
node packages/occ-cli/dist/cli.js serve --port=8787Or via the built binary after npm link:
npm link
occ commit myfile.bin --out myfile.proof.json
occ verify myfile.bin myfile.proof.json
occ serve --port=8787CLI reference
occ commit <file> [--out <proof.json>] [--chain]
Commit a file and print its OCCProof.
--out <file> Save proof JSON to a file (default: print to stdout)
--chain Link to the previous proof via prevB64
occ verify <file> <proof.json>
Verify a file against its proof. Exits 0 if valid, 1 if not.
occ serve [--port <n>]
Start the local HTTP demo service (default: 8787).
OCC_STATE_PATH=./my-state.json occ commit <file>
Override the state file path (default: ./occ-state.json).HTTP service reference
Start with occ serve or node packages/occ-demo-service/dist/server.js.
GET /health
{ "ok": true }POST /commit
Accepts Content-Type: application/octet-stream (raw bytes) or multipart/form-data (file upload).
Returns:
{
"proof": { /* OCCProof */ },
"digestB64": "<sha256 of input, base64>",
"proofHashB64": "<sha256 of proof, base64 — use as prevB64 for next commit>"
}Add ?save=1 to also write proof-<timestamp>.json to disk.
POST /verify
Content-Type: application/json, body:
{ "bytes": "<base64 of original bytes>", "proof": { ... } }Returns:
{ "valid": true }
// or
{ "valid": false, "reason": "..." }Library API
import { Constructor, verify } from "provenclave";
import { StubHost } from "@provenclave/stub";
// One-time setup
const stub = await StubHost.createPersistent({ statePath: "./occ-state.json" });
const ctor = await Constructor.initialize({ host: stub.host });
// Commit bytes (atomic, fail-closed)
const bytes = new TextEncoder().encode("hello world");
const proof = await ctor.commit({ bytes });
// Verify offline — no network, no host
const result = await verify({ proof, bytes });
console.log(result.valid); // trueProof chaining (prevB64)
Each proof can reference the hash of the previous one, creating a verifiable chain:
import { canonicalize } from "provenclave";
import { sha256 } from "@noble/hashes/sha256";
// After each commit, compute and store the proof's hash
const proofHash = Buffer.from(sha256(canonicalize(proof))).toString("base64");
stub.setLastProofHash(proofHash);
// On the next commit, feed it back in
const nextProof = await ctor.commit({
bytes: nextBytes,
prevProofHashB64: stub.getLastProofHash(),
});
// nextProof.commit.prevB64 === proofHash ✓This creates a "living proof" — each output is linked to the one before it, making replay or insertion detectable. The demo service and CLI do this automatically.
Proof Structure (v1)
Every OCCProof is a self-contained JSON document. No server lookup is needed to verify one.
{
"version": "provenclave/1", // schema version; forward-compatibility sentinel
"artifact": {
"hashAlg": "sha256", // algorithm used to hash the input bytes
"digestB64": "<base64>" // H — SHA-256 of the raw input bytes
},
"commit": {
"nonceB64": "<base64>", // N — boundary-fresh random nonce from the host
"counter": "42", // C — monotonic counter (decimal string, BigInt-safe)
"time": 1700000000000, // Unix ms at commit time (advisory; use counter for ordering)
"prevB64": "<base64>", // optional — SHA-256 of the previous proof's canonical form
"epochId": "<string>" // optional — enclave lifecycle identifier, changes on restart
},
"signer": {
"publicKeyB64": "<base64>", // Ed25519 public key (32 bytes, standard base64)
"signatureB64": "<base64>" // Ed25519 signature over the canonical SignedBody
},
"environment": {
"enforcement": "measured-tee", // "stub" | "hw-key" | "measured-tee" — signed, tamper-evident
"measurement": "<string>", // platform measurement (PCR0 on Nitro, MRENCLAVE on SGX, …)
"attestation": { // optional — raw TEE attestation report
"format": "aws-nitro", // identifies the document format (signed)
"reportB64": "<base64>" // raw bytes of the attestation document (vendor-signed)
}
},
"metadata": { } // optional — caller-supplied; NOT signed
}Field reference
| Field | Role | Signed? | Notes |
|---|---|---|---|
| version | Schema sentinel | ✓ | Always "provenclave/1" |
| artifact.hashAlg | Hash algorithm | ✓ | Always "sha256" in v1 |
| artifact.digestB64 | Content hash (H) | ✓ | SHA-256 of raw input bytes |
| commit.nonceB64 | Freshness proof (N) | ✓ | Generated by host per commit |
| commit.counter | Ordering proof (C) | ✓ | Decimal string; strictly monotonic |
| commit.time | Wall-clock hint | ✓ | Unix ms; advisory only — not a sole ordering guarantee |
| commit.prevB64 | Chain link | ✓ | SHA-256 of prior proof's canonical JSON |
| commit.epochId | Epoch identity | ✓ | Enclave lifecycle ID; changes on restart |
| signer.publicKeyB64 | Identity | ✓ | Ed25519 32-byte key |
| signer.signatureB64 | Integrity seal | — (is the seal) | Covers everything marked ✓ |
| environment.enforcement | Tier declaration | ✓ | Tamper-evident; not self-authenticating — verify via measurement |
| environment.measurement | Platform identity | ✓ | Primary trust anchor; pin with allowedMeasurements |
| environment.attestation.format | Report type | ✓ | Prevents semantic ambiguity via format rewrite |
| environment.attestation.reportB64 | TEE report | ✗ | Vendor-signed; self-authenticating; not interpreted by library |
| metadata | Caller context | ✗ | Treat as advisory; anyone can edit it |
What is signed
The signature covers the canonical serialization of this object (recursive sorted-key JSON → UTF-8):
{
version: proof.version,
artifact: proof.artifact,
commit: proof.commit,
publicKeyB64: proof.signer.publicKeyB64,
enforcement: proof.environment.enforcement,
measurement: proof.environment.measurement,
attestationFormat: proof.environment.attestation?.format, // when present
}environment.attestation.reportB64 and metadata are outside the signature. The attestation report is vendor-signed and self-authenticating; metadata should never be used as a trust signal.
StubHost vs. real TEE
| Property | @provenclave/stub (dev only) | Real TEE adapter |
|---|---|---|
| Key storage | Plaintext JSON file | Hardware-protected |
| Counter | Software; can be reset | Hardware; monotonic by construction |
| Measurement | Fixed placeholder string | Real PCR/MRENCLAVE |
| Attestation | None | NSM / DCAP report binding the nonce |
@provenclave/stub is not a security boundary. It exists so you can develop and test without a TEE.
Threat model
What Provenclave proves
- That a process in possession of a specific private key committed specific bytes
- That the commitment happened after a specific authorization step (counter + nonce)
- That the commitment structure was not tampered with after signing
- That chained proofs were produced in the stated order (when
prevB64is used)
What Provenclave does NOT prove
- That the private key was generated inside a real TEE — this requires platform attestation verification (adapter-specific, out of scope here)
- That the committed bytes are true, correct, or authored by any party
- Anything about the contents of
metadata(not signed) - Liveness of the enclave at verification time
StubHost is not a real TEE
@provenclave/stub is development tooling only:
- The signing key is held in process memory and optionally persisted as plaintext JSON
- The counter is software-only and can be reset or forged
- There is no hardware measurement — the measurement string is a fixed placeholder
- There is no attestation report
A proof produced by StubHost proves that Provenclave's signing and verification logic works correctly. It does not prove boundary enforcement. For real boundary enforcement, use a real TEE adapter (@provenclave/adapter-nitro when wired to a live Nitro Enclave, or a future SGX/SEV adapter).
What Provenclave is NOT
This section exists because "cryptographic proof of X" is a phrase that invites creative misreading.
Not a blockchain
Provenclave does not require consensus, peer nodes, or a distributed ledger. There is no token, no chain of blocks, and no global ordering across parties. Chained proofs (prevB64) create a locally verifiable sequence within a single process — not a public, replicated history.
Not a content watermark or fingerprint
Provenclave proves that a specific process committed specific bytes — it does not embed anything inside the bytes themselves. The proof is a separate document. Modifying the bytes invalidates the proof, but anyone can produce a new valid proof for the modified bytes using a different key. Provenclave does not prevent copying or modification; it makes tampering detectable.
Not digital rights management (DRM)
Provenclave enforces nothing at access time. There is no encrypted container, no license server, and no runtime enforcement that gates playback or reading. Provenclave is a commit record, not a gating mechanism.
Not a replacement for TEE attestation
When backed by a real TEE, a Provenclave proof includes a raw attestation report. The library stores that report verbatim — it does not parse, validate, or chain-verify it. Full attestation verification (certificate chains, PCR policy, revocation) is the responsibility of the caller. Provenclave's job is to bind the signing key to the commit; attestation links the key to the hardware. They are complementary, not interchangeable.
Not a proof of authorship or truth
Provenclave proves finalization, not origin. A proof says "this process committed these bytes at this counter". It says nothing about who wrote the bytes, whether the bytes are accurate, or whether the process was acting on someone's behalf. Authorship and provenance require additional out-of-band verification.
Adapters
@provenclave/stub — dev only
Full HostCapabilities implementation in software. Use for local development, testing, and demos.
import { StubHost } from "@provenclave/stub";
// Ephemeral (resets on restart)
const stub = await StubHost.create();
// Persistent (survives restarts — key and counter stored in JSON file)
const stub = await StubHost.createPersistent({ statePath: "./occ-state.json" });@provenclave/nitro — AWS Nitro Enclaves
Full HostCapabilities implementation for code running inside a Nitro Enclave.
getMeasurement()— reads PCR0 via NSMDescribePCRgetFreshNonce()— uses NSMGetRandom(hardware RNG)getAttestation()— produces an NSM attestation document bound to the proof body hashnextCounter()— KMS-backed monotonic counter sealed to PCR0; blob rollback closed by optionalanchorCountercallbackenforcementTier: "measured-tee"
import { NitroHost, KmsCounter } from "@provenclave/nitro";
const counter = new KmsCounter({
kmsKeyId: "arn:aws:kms:us-east-1:...",
kmsRegion: "us-east-1",
kmsEndpoint: "http://localhost:8000", // vsock proxy to KMS
persistBlob: async (b) => { /* write ciphertext to storage */ },
restoreBlob: async () => { /* read ciphertext from storage */ },
});
await counter.restore();
const host = new NitroHost({ counter });
const ctor = await Constructor.initialize({ host: host.host });Requires a real AWS Nitro Enclave. Use @provenclave/stub for local development.
@provenclave/adapter-kit — build your own adapter
For hardware TEE manufacturers and platform teams who want Provenclave on their hardware.
// 1. Copy the adapter template and fill in the TODOs
// packages/adapter-kit/src/adapter-template.ts → src/my-tee-host.ts
// 2. Run the compliance suite against your implementation
import { runCompliance } from "@provenclave/adapter-kit";
import { MyTeeHost } from "./my-tee-host.js";
const host = await MyTeeHost.create();
runCompliance(host); // 28 tests — green means Provenclave-compliant
// 3. node --test dist/compliance.test.jsWorks with any test runner (node:test, Jest, Vitest) via the lower-level runHostComplianceTests(host, { describe, it }) export.
Verification policy (trust anchors)
const result = await verify({
proof,
bytes,
trustAnchors: {
allowedMeasurements: ["<expected measurement>"], // exact match
allowedPublicKeys: ["<expected pubkey base64>"], // exact match
minCounter: "100", // reject proofs with counter < 100
maxCounter: "999", // reject proofs with counter > 999
minTime: Date.now() - 5 * 60 * 1000, // reject proofs older than 5 min
maxTime: Date.now() + 60 * 1000, // reject future-dated proofs
},
});All fields are optional. Omitting a field skips that check.
Browser Demo (Playground)
A zero-dependency browser UI for exploring commit and verify interactively. No build step, no framework, no cloud account.
# 1. Start the Provenclave HTTP server (uses StubHost — no TEE required)
node packages/occ-cli/dist/cli.js serve --port=8787
# 2. Start the Playground static server
npm run playground
# 3. Open your browser
open http://localhost:8788The Playground page lets you:
- Upload any file (click or drag-and-drop)
- See the browser-computed SHA-256 alongside the server's proof
- Commit → inspect the full
OCCProofJSON with syntax highlighting - Verify → confirm the proof is still consistent with the file
- Copy the proof JSON to clipboard for use elsewhere
The Playground uses StubHost unless a real TEE adapter is configured on the server side.
All cryptographic operations happen server-side; the browser only displays results.
Architecture
packages/
occ-core/ provenclave — core library (Constructor, verify, types)
src/
index.ts public re-exports
types.ts OCCProof, OCCPolicy, VerificationPolicy, SignedBody
host.ts HostCapabilities interface
canonical.ts deterministic JSON + constant-time equality
constructor.ts write path: atomic commit
verifier.ts offline verification
__tests__/ unit tests
occ-core-stub/ @provenclave/stub — dev-only host
src/
stub-host.ts StubHost.create() + StubHost.createPersistent()
__tests__/ unit tests (persistent counter, policy checks)
adapter-nitro/ @provenclave/nitro — AWS Nitro Enclaves adapter
src/
nitro-host.ts NitroHost, DefaultNsmClient (NSM ioctl transport)
kms-counter.ts KmsCounter — KMS-backed monotonic counter, SigV4, anchorCounter
adapter-kit/ @provenclave/adapter-kit — hardware adapter builder kit
src/
host-compliance.ts runHostComplianceTests() — 28-test runner-agnostic suite
compliance-runner.ts runCompliance() — node:test convenience wrapper
adapter-template.ts MyTeeHost — copy-paste skeleton with TODO stubs
occ-demo-service/ @provenclave/demo-service — local HTTP service
src/
server.ts GET /health, POST /commit, POST /verify
__tests__/ integration tests
occ-cli/ @provenclave/cli — command-line tool
src/
cli.ts occ commit / verify / serve
occ-playground/ @provenclave/playground — browser demo UI
index.html single-page commit/verify interface
app.js WebCrypto SHA-256, fetch to /commit and /verify
styles.css clean technical stylesheet (no framework)
serve.js tiny Node static server on :8788Running tests
npm test # all packages
npm test --workspace=packages/occ-core # core unit tests only
npm test --workspace=packages/occ-core-stub # stub + persistence tests
npm test --workspace=packages/occ-demo-service # HTTP integration testsCryptography
| Primitive | Algorithm | Library |
|---|---|---|
| Hashing | SHA-256 | @noble/hashes |
| Signatures | Ed25519 | @noble/ed25519 |
| Canonicalization | Sorted-key JSON + UTF-8 | built-in |
@noble/hashes and @noble/ed25519 are audited, zero-dependency pure-TypeScript.
Publishing
Do not publish until the library has received independent security review.
Publishable packages: provenclave, @provenclave/stub, @provenclave/nitro, @provenclave/adapter-kit.
Private packages (@provenclave/cli, @provenclave/demo-service, @provenclave/playground) are
marked "private": true and will not be published.
Pre-publish checklist:
# 1. Inspect tarball contents
npm pack --dry-run --workspace=packages/occ-core
npm pack --dry-run --workspace=packages/occ-core-stub
npm pack --dry-run --workspace=packages/adapter-nitro
npm pack --dry-run --workspace=packages/adapter-kit
# 2. Run full test suite
npm test
# 3. Verify test vectors
node packages/occ-cli/dist/cli.js verify test-vectors/hello.txt test-vectors/hello.proof.json
node packages/occ-cli/dist/cli.js verify test-vectors/sample.txt test-vectors/proof.json
# 4. Tag and release
git tag v0.1.0 && git push --tags
# create GitHub release from tag
# 5. Publish (when ready)
npm publish --workspace=packages/occ-core
npm publish --workspace=packages/occ-core-stub
npm publish --workspace=packages/adapter-nitro
npm publish --workspace=packages/adapter-kitSee CONTRIBUTING.md for the full release checklist.
Keywords
provenclave · content integrity · tamper-evident · cryptographic proof · file attestation · verifiable proof · commit proof · Ed25519 · SHA-256 · hardware attestation · TEE · Trusted Execution Environment · AWS Nitro Enclave · PCR0 · provenance · audit trail · AI output attestation · dataset integrity · agent output verification · content provenance · origin controlled computing · proof of finalization · monotonic counter · canonical JSON · offline verification · supply chain integrity · AI agent tools · LLM tooling · agentic workflows
License
Copyright 2024-2026 Mike Argento. Licensed under the Apache License, Version 2.0.
All source files in this repository carry the SPDX header:
// SPDX-License-Identifier: Apache-2.0
// Copyright 2024-2026 Mike ArgentoThis software depends on @noble/ed25519
and @noble/hashes (both MIT-licensed).
See the NOTICE file for full third-party attribution.
