loading…
Search for a command to run...
loading…
Third-party certifying proxy — sign any HTTP call (AI agents, webhooks, microservices) with an independent Ed25519 signature, RFC 3161 timestamp, and Sigstore R
Third-party certifying proxy — sign any HTTP call (AI agents, webhooks, microservices) with an independent Ed25519 signature, RFC 3161 timestamp, and Sigstore Rekor anchor. Works with Claude, GPT-4, Mistral, LangChain, AutoGen, or any HTTP client.
Third-party certifying proxy — get an independent cryptographic proof for any HTTP call.
Works with AI agents, webhooks, microservices, or any HTTP client. The proof is signed by ArkForge (independent third party) — not by the caller.
Get your free API key (500 proofs/month) →
When a system makes an HTTP call, there is no independent record of what was sent, what was received, or when it happened. Either party could deny or alter the transaction.
ArkForge fixes this by acting as a certifying proxy: the caller routes its request through ArkForge, which signs the full request+response bundle with an Ed25519 key, timestamps it via RFC 3161, and anchors it in Sigstore Rekor — an immutable, publicly auditable log.
The resulting proof is permanently verifiable at a public URL, by anyone, without contacting ArkForge.
This is the difference between a self-signed certificate and a CA-issued one. Other tools produce proofs signed by the caller itself. ArkForge produces proofs signed by an independent third party.
{
"mcpServers": {
"arkforge": {
"command": "uvx",
"args": ["arkforge-mcp"],
"env": {
"ARKFORGE_API_KEY": "your_api_key_here"
}
}
}
}
Get a free API key (500 proofs/month) at arkforge.tech.
certify_callRoute an HTTP call through ArkForge and get a cryptographic proof of the transaction.
target URL of the upstream API to call
payload JSON body (optional)
method "POST" or "GET" (default: "POST")
description Human-readable description included in the proof
agent_identity Identifier for the calling system (optional)
Returns proof_id, verification_url, upstream_response, chain_hash, timestamp, and Ed25519 signature.
Use this instead of calling the API directly when you need an auditable record.
Example response:
{
"proof_id": "prf_20260310_143022_a1b2c3",
"verification_url": "https://trust.arkforge.tech/v1/proof/prf_20260310_143022_a1b2c3",
"upstream_response": { "status": "ok" },
"chain_hash": "e3b0c44298fc1c149afb...",
"timestamp": "2026-03-10T14:30:22.481Z",
"timestamp_authority": "verified",
"rekor_log_id": "https://rekor.sigstore.dev/api/v1/log/entries/...",
"seller": "api.example.com",
"signature": "MCowBQYDK2VwAyEA..."
}
get_proofRetrieve the full proof bundle for a given proof_id.
verify_proofGet a human-readable summary of what a proof certifies — useful for explaining to a user or auditor what was independently verified.
get_usageCheck your remaining credits for the current month.
| Field | Description |
|---|---|
proof_id |
Unique identifier — permanent public URL |
hashes.request |
SHA-256 of the exact request sent |
hashes.response |
SHA-256 of the exact response received |
hashes.chain |
Combined hash — tamper-evident |
parties.seller |
Domain of the called API |
timestamp_authority |
RFC 3161 timestamp via FreeTSA (QTSP eIDAS on Enterprise) |
rekor |
Sigstore Rekor immutable log entry |
arkforge_signature |
Ed25519 signature by ArkForge's independent key |
| Plan | Proofs/month | Price |
|---|---|---|
| Free | 500 | €0 |
| Pro | 5,000 | €29/month |
| Enterprise | 50,000 + QTSP eIDAS | €149/month |
The MCP server is one integration path. The same API works from any language or framework:
curl -X POST https://trust.arkforge.tech/v1/proxy \
-H "X-Api-Key: your_key" \
-H "Content-Type: application/json" \
-d '{"target": "https://api.example.com/action", "payload": {"data": "value"}}'
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"ark-forge-arkforge-mcp": {
"command": "npx",
"args": []
}
}
}Web content fetching and conversion for efficient LLM usage.
Retrieval from AWS Knowledge Base using Bedrock Agent Runtime.
Provides auto-configuration for setting up an MCP server in Spring Boot applications.
A very streamlined mcp client that supports calling and monitoring stdio/sse/streamableHttp, and can also view request responses through the /logs page. It also