loading…
Search for a command to run...
loading…
Open-source MCP server that exposes Signet cryptographic tools over stdio. It provides tools to generate Ed25519 keypairs, sign MCP actions, verify Signet recei
Open-source MCP server that exposes Signet cryptographic tools over stdio. It provides tools to generate Ed25519 keypairs, sign MCP actions, verify Signet receipts, and compute canonical content hashes for AI agent audit and accountability workflows.
Don't just log agent actions. Prove them.
Cryptographic receipts for every AI agent tool call — signed, hash-chained, offline-verifiable. Independent of any provider.
TypeScript packages:
@signet-auth/core ·
@signet-auth/mcp ·
@signet-auth/mcp-server ·
@signet-auth/mcp-tools ·
@signet-auth/node ·
@signet-auth/vercel-ai
▶ Walkthrough: signing, audit log, and verification · ▶ Demo: execution boundary & MCP integration
Your AI agent just placed an order, deleted a row, sent an email, merged a PR. Can you prove exactly what it did — to an auditor, a customer, or yourself after an incident?
Signet is the independent verification layer for agent actions. Every tool call gets a signed receipt that anyone can verify offline, without trusting the platform that hosted the agent or the vendor that stored the logs.
Your agents run on their infrastructure. The proof belongs to you.
Traditional logs tell you what a platform says happened. They're mutable, provider-dependent, and unverifiable without trusting the party that wrote them.
Signet receipts are different. Modify any field — tool name, parameters, timestamp, signer — and the Ed25519 signature breaks. Delete or reorder entries and the SHA-256 hash chain breaks. Verification requires only the public key. No network call, no API, no login.
| Ordinary logs | Signet receipts |
|---|---|
| Provider says it happened | Anyone can verify it, offline |
| Mutable after the fact | Signature breaks on tamper |
| No ordering proof | Hash chain breaks on delete/reorder |
| Trust the log host | Verify with the public key |
| One-sided claim | Bilateral co-signing available |
Use logs for observability. Use Signet when you need evidence.
signet proxy, sign every tools/call, no code changesIf a tool call cannot be verified independently, it should not be trusted unconditionally. This matters when an auditor asks for proof, when an incident happens on infrastructure you don't control, or when the question isn't "what does the console say" but "what actually happened."
Each agent gets an Ed25519 identity. Every tool call can be signed, appended to a hash-chained audit trail, verified offline or before execution, co-signed by the server, bound to a delegation chain, and optionally bound to a policy decision.
The video above shows the full flow. The SVG below shows the CLI signing details, or jump to See It Reject Bad Requests to watch the server block bad requests before they run.
This first demo shows signing + audit receipts. See also the MCP flow diagram.
Signet adds a lightweight trust layer for agent actions:
trace_id and parent_receipt_idPolicyAttestation when a YAML policy is satisfiedsignet proxy --target <cmd> --key <name> — drop Signet in front of any MCP server as a transparent stdio proxy. No changes to the agent or server required. Signs every tools/call and co-signs server responses with bilateral receipts.trace_id and parent_receipt_id fields on Action link receipts across multi-step workflows into a causal chain. Both fields are part of the signed payload — tampering invalidates the signature.signet sign --policy policy.yaml enforces policy before signing and binds the decision into the receipt. The proxy also respects --policy, blocking denied calls before they reach the server.signet delegate ... produces v4 receipts that prove who authorized the agent and what scope it had.signet dashboard shows timeline, chain integrity, signature health, and delegated vs direct activity.Signet provides the technical controls that auditors look for when assessing AI agent operations. See the full Compliance Mapping for details.
| Framework | What Signet Addresses |
|---|---|
| SOC 2 Type II | Signed audit trail (CC7.2), tamper detection (CC7.3), role-based scope (CC6.3), authorization proof (CC8.1) |
| ISO 27001 | Event logging (A.8.15), access control (A.5.15), authentication (A.5.17), configuration management (A.8.9) |
| EU AI Act | Article 12 record-keeping: event logging, traceability, identification, integrity |
| DORA | ICT incident logging (Art. 17), third-party risk evidence (Art. 28-30), audit trail integrity |
| NIST AI RMF | Govern (delegation chains), Map (signed receipts), Measure (audit queries), Manage (policy engine) |
Signet is a tool, not a certification. It provides controls that support compliance — your deployment and configuration determine compliance posture.
pip install signet-auth
from signet_auth import SigningAgent
agent = SigningAgent.create("my-agent", owner="team")
receipt = agent.sign("github_create_issue", params={"title": "fix bug"})
assert agent.verify(receipt)
print(receipt.id)
Signet is building a new category: verifiable tool-call receipts for AI agents. Starring isn't just a bookmark — it helps push cryptographic evidence for agent actions into the ecosystem so regulated industries, enterprise platforms, and framework users don't have to roll their own.
If you're building agents that need to survive an audit, an incident, or a third party asking "prove it" — star the repo, try it, open an issue.
If you're new, start with one of these five paths:
/plugin install signet@claude-plugins-official in Claude Code. In 5 minutes you'll have signed tool calls and a local audit log at ~/.signet/audit/.plugins/codex/ into ~/.codex/plugins/signet and add one PostToolUse hook. In 5 minutes you'll have signed Bash actions in Codex using the same audit trail.SigningAgent.create(...) and add framework hooks only where you need them.new SigningTransport(inner, secretKey, "my-agent"). In 5 minutes you'll have signed tools/call requests with receipts in params._meta._signet.verifyRequest(request, {...}) in your tool handler. In 5 minutes you'll have signer, freshness, target-binding, and tool/params checks at the execution boundary.Run the shortest execution-boundary demo:
cd examples/mcp-agent
npm run execution-boundary-demo
Prefer motion? Download the MP4 or GIF.
See examples/mcp-agent/demo-execution-boundary.mjs for the demo source.
Signet receipts prove what happened. Delegation chains prove who allowed it.
A root identity (human or org) cryptographically delegates scoped authority to an agent. Permissions can only narrow, never widen. The agent's v4 receipt carries the full proof of authorization.
Owner (alice) → Agent A (tools: [Bash, Read], max_depth: 0)
↓
v4 Receipt: tool=Bash, authorization.chain proves alice → Agent A
# Create a delegation token (expires in 24 hours)
signet delegate create --from alice --to deploy-bot --to-name deploy-bot \
--tools Bash,Read --targets "mcp://github" --max-depth 0 --ttl 24h
# Sign with authorization proof (v4 receipt)
signet delegate sign --key deploy-bot --tool Bash \
--params '{"cmd":"git pull"}' --target "mcp://github" --chain chain.json
# Verify: signature + chain + scope + root trust
signet delegate verify-auth receipt.json --trusted-roots alice
Best practice: Use short-lived delegations (
--ttl 1h,--ttl 24h) instead of long-lived or non-expiring tokens. If an agent is compromised, the delegation expires automatically. Re-issue tokens as needed. This is the same pattern used by short-lived JWTs and X.509 certificates.
Or in Python:
from signet_auth import sign_delegation, sign_authorized, verify_authorized
# Delegation functions accept JSON strings for scope, chain, and receipts
token_json = sign_delegation(root_key_b64, "alice", agent_pubkey_b64, "bot", scope_json)
receipt_json = sign_authorized(agent_key_b64, action_json, "bot", f"[{token_json}]")
scope_json = verify_authorized(receipt_json, [root_pubkey_b64])
Signet can enforce a YAML policy before signing. When an action is allowed, the signed receipt carries a PolicyAttestation proving which policy hash, rule, and decision were in force.
version: 1
name: production-agents
default_action: deny
rules:
- id: allow-read
match:
tool: Read
action: allow
- id: deny-rm-rf
match:
tool: Bash
params:
command:
contains: "rm -rf"
action: deny
reason: destructive command
signet policy validate policy.yaml
signet policy check policy.yaml --tool Bash --params '{"command":"rm -rf /"}'
signet sign --key deploy-bot --tool Read \
--params '{"path":"README.md"}' --target "mcp://github" --policy policy.yaml
Denied actions fail before a receipt is produced. Allowed actions produce a receipt whose signed payload proves the policy decision.
# CLI
cargo install signet-cli
# Python
pip install signet-auth
# TypeScript (MCP middleware)
npm install @signet-auth/core @signet-auth/mcp
# TypeScript (MCP server verification)
npm install @signet-auth/mcp-server
# TypeScript (Node local audit/operator helpers)
npm install @signet-auth/node
# TypeScript (Vercel AI SDK middleware)
npm install @signet-auth/vercel-ai
# TypeScript (standalone MCP signing server)
npx @signet-auth/mcp-tools
Auto-sign every tool call in Claude Code with zero configuration:
# Option A: From the official Anthropic plugin marketplace
/plugin install signet@claude-plugins-official
# Option B: Add Signet as a marketplace source, then install
/plugin marketplace add Prismer-AI/signet
/plugin install signet@signet
Every tool call is signed with Ed25519 and logged to a hash-chained audit trail at ~/.signet/audit/.
Alternative install methods:
# From Git
claude plugin add --from https://github.com/Prismer-AI/signet
# Via signet CLI
signet claude install
Auto-sign every Bash tool call in Codex CLI:
git clone https://github.com/Prismer-AI/signet.git
cp -r signet/plugins/codex ~/.codex/plugins/signet
Then add the hook to ~/.codex/hooks.json:
{
"hooks": {
"PostToolUse": [{
"matcher": "Bash",
"hooks": [{
"type": "command",
"command": "node \"$HOME/.codex/plugins/signet/bin/sign.cjs\"",
"timeout": 5
}]
}]
}
}
Or use the MCP server for on-demand signing tools:
codex mcp add signet -- npx @signet-auth/mcp-tools
# Generate an agent identity
signet identity generate --name my-agent
# Sign an action
signet sign --key my-agent --tool "github_create_issue" \
--params '{"title":"fix bug"}' --target mcp://github.local
# Verify a receipt
signet verify receipt.json --pubkey my-agent
# Audit recent actions
signet audit --since 24h
# Verify log integrity
signet verify --chain
import { Client } from "@modelcontextprotocol/sdk/client/index.js";
import { StdioClientTransport } from "@modelcontextprotocol/sdk/client/stdio.js";
import { generateKeypair } from "@signet-auth/core";
import { SigningTransport } from "@signet-auth/mcp";
// Generate an agent identity
const { secretKey } = generateKeypair();
// Wrap any MCP transport -- all tool calls are now signed
const inner = new StdioClientTransport({ command: "my-mcp-server" });
const transport = new SigningTransport(inner, secretKey, "my-agent");
const client = new Client({ name: "my-agent", version: "1.0" }, {});
await client.connect(transport);
// Every callTool() is now cryptographically signed
const result = await client.callTool({
name: "echo",
arguments: { message: "Hello!" },
});
Every tools/call request gets a signed receipt injected into params._meta._signet.
If you control the MCP server too, verify requests before execution:
import { verifyRequest } from "@signet-auth/mcp-server";
server.setRequestHandler(CallToolRequestSchema, async (request) => {
const verified = verifyRequest(request, {
trustedKeys: ["ed25519:..."],
maxAge: 300,
});
if (!verified.ok) return { content: [{ type: "text", text: verified.error }], isError: true };
if (!verified.trusted) return { content: [{ type: "text", text: "untrusted signer" }], isError: true };
console.log(`Verified: ${verified.signerName}`);
// process tool call...
});
import { generateText } from "ai";
import { openai } from "@ai-sdk/openai";
import { generateKeypair } from "@signet-auth/core";
import { createSignetCallbacks } from "@signet-auth/vercel-ai";
const { secretKey } = generateKeypair();
const callbacks = createSignetCallbacks(secretKey, "my-agent");
const result = await generateText({
model: openai("gpt-4o"),
tools: { myTool },
...callbacks,
prompt: "...",
});
// Every tool call is now signed
console.log(callbacks.receipts);
This repo also includes a minimal MCP reference server that demonstrates server-side verification with @signet-auth/mcp-server.
cd examples/mcp-agent
npm ci
npm run verifier-server
Available tools:
inspect_current_request — verifies the current MCP tool call if it includes params._meta._signetverify_receipt — verifies a raw Signet receipt against a public keyverify_request_payload — verifies a synthetic MCP tools/call payload offlineEnvironment variables:
SIGNET_TRUSTED_KEYS — comma-separated ed25519:<base64> public keysSIGNET_REQUIRE_SIGNATURE — true or false (default true)SIGNET_REQUIRE_TRUSTED_SIGNER — true or false (default true)SIGNET_MAX_AGE — max receipt age in seconds (default 300)SIGNET_EXPECTED_TARGET — optional expected receipt.action.target@signet-auth/mcp-tools exposes Signet signing, verification, and content hashing as MCP tools — plug into any MCP-compatible client:
npx @signet-auth/mcp-tools
Available tools: signet_generate_keypair, signet_sign, signet_verify, signet_content_hash.
pip install signet-auth
from signet_auth import SigningAgent
# Create an agent identity (saved to ~/.signet/keys/)
agent = SigningAgent.create("my-agent", owner="willamhou")
# Sign any tool call -- receipt is auto-appended to audit log
receipt = agent.sign("github_create_issue", params={"title": "fix bug"})
# Verify
assert agent.verify(receipt)
# Query audit log
for record in agent.audit_query(since="24h"):
print(f"{record.receipt.ts} {record.receipt.action.tool}")
from signet_auth import SigningAgent
from signet_auth.langchain import SignetCallbackHandler
agent = SigningAgent("my-agent")
handler = SignetCallbackHandler(agent)
# Every tool call is now signed + audited
chain.invoke(input, config={"callbacks": [handler]})
# Async chains supported too
from signet_auth.langchain import AsyncSignetCallbackHandler
from signet_auth import SigningAgent
from signet_auth.crewai import install_hooks
agent = SigningAgent("my-agent")
install_hooks(agent)
# All CrewAI tool calls are now globally signed
crew.kickoff()
from signet_auth import SigningAgent
from signet_auth.autogen import signed_tool, sign_tools
agent = SigningAgent("my-agent")
# Wrap a single tool
wrapped = signed_tool(tool, agent)
# Or wrap all tools at once
wrapped_tools = sign_tools([tool1, tool2], agent)
LangGraph uses LangChain's callback system — the same handler works directly:
from signet_auth import SigningAgent
from signet_auth.langgraph import SignetCallbackHandler
agent = SigningAgent("my-agent")
handler = SignetCallbackHandler(agent)
result = graph.invoke(input, config={"callbacks": [handler]})
from signet_auth import SigningAgent
from signet_auth.llamaindex import install_handler
agent = SigningAgent("my-agent")
handler = install_handler(agent)
# All tool call events are now signed
index = ... # your LlamaIndex setup
response = index.as_query_engine().query("What is Signet?")
# Access receipts
print(handler.receipts)
from signet_auth import SigningAgent
from signet_auth.pydantic_ai_integration import SignetMiddleware
agent = SigningAgent("my-agent")
middleware = SignetMiddleware(agent)
@middleware.wrap
def my_tool(query: str) -> str:
return f"result: {query}"
from signet_auth import SigningAgent
from signet_auth.google_adk import SignetPlugin
agent = SigningAgent("my-agent")
plugin = SignetPlugin(agent)
# Pass as callback to ADK agent
from signet_auth import SigningAgent
from signet_auth.smolagents import signet_step_callback
agent = SigningAgent("my-agent")
callback = signet_step_callback(agent)
bot = CodeAgent(tools=[...], model=model, step_callbacks=[callback])
from signet_auth import SigningAgent
from signet_auth.openai_agents import SignetAgentHooks
agent = SigningAgent("my-agent")
oai_agent = Agent(
name="assistant",
hooks=SignetAgentHooks(agent),
tools=[...],
)
Note: Tool call arguments are not yet available in the hook API (issue #939). Only the tool name is signed.
from signet_auth import generate_keypair, sign, verify, Action
kp = generate_keypair()
action = Action("github_create_issue", params={"title": "fix bug"})
receipt = sign(kp.secret_key, action, "my-agent", "willamhou")
assert verify(receipt, kp.public_key)
from signet_auth import generate_keypair, sign, sign_bilateral, verify_bilateral, Action
# Agent signs the tool call
agent_kp = generate_keypair()
action = Action("github_create_issue", params={"title": "fix bug"})
agent_receipt = sign(agent_kp.secret_key, action, "my-agent")
# Server co-signs with the response
server_kp = generate_keypair()
bilateral = sign_bilateral(
server_kp.secret_key, agent_receipt,
{"content": [{"type": "text", "text": "issue #42 created"}]},
"github-server",
)
assert verify_bilateral(bilateral, server_kp.public_key)
assert bilateral.v == 3 # v3 = bilateral receipt
Your Agent
|
v
SigningTransport (wraps any MCP transport)
|
+---> Signs each tool call (Ed25519)
+---> Appends Action Receipt to local audit log (hash-chained)
+---> Forwards request to MCP server (unchanged)
Client-side signing works without changing the server. If you control the server too, add verifyRequest() and optional signResponse() for execution-boundary verification and bilateral receipts. signResponse() should only run after a successful trusted verifyRequest().
Every tool call starts with a signed receipt. Higher receipt versions add server co-signing (v3) and authorization chains (v4):
{
"v": 1,
"id": "rec_e7039e7e7714e84f...",
"action": {
"tool": "github_create_issue",
"params": {"title": "fix bug"},
"params_hash": "sha256:b878192252cb...",
"target": "mcp://github.local",
"transport": "stdio"
},
"signer": {
"pubkey": "ed25519:0CRkURt/tc6r...",
"name": "demo-bot",
"owner": "willamhou"
},
"ts": "2026-03-29T23:24:03.309Z",
"nonce": "rnd_dcd4e135799393...",
"sig": "ed25519:6KUohbnSmehP..."
}
The signature covers the entire receipt body (action + signer + timestamp + nonce) using RFC 8785 (JCS) canonical JSON. Modifying any field invalidates the signature.
| Command | Description |
|---|---|
signet identity generate --name <n> |
Generate Ed25519 identity (encrypted by default) |
signet identity generate --unencrypted |
Generate without encryption (for CI) |
signet identity list |
List all identities |
signet identity export --name <n> |
Export public key as JSON |
signet sign --key <n> --tool <t> --params <json> --target <uri> |
Sign an action |
signet sign --hash-only |
Store only params hash (not raw params) |
signet sign --output <file> |
Write receipt to file instead of stdout |
signet sign --no-log |
Skip audit log append |
signet sign --encrypt-params |
Encrypt action.params in the audit log while keeping the receipt output unchanged |
signet sign --policy <path> |
Enforce policy before signing and embed PolicyAttestation |
signet verify <receipt.json> --pubkey <name> |
Verify a receipt signature |
signet verify --chain |
Verify audit log hash chain integrity |
signet audit |
List recent actions |
signet audit --since <duration> |
Filter by time (e.g. 24h, 7d) |
signet audit --tool <substring> |
Filter by tool name |
signet audit --verify |
Verify all receipt signatures |
signet audit --export <file> |
Export records as JSON |
signet audit --export <file> --decrypt-params |
Export original audit records plus materialized_receipt with decrypted params |
signet explore |
Browse receipts interactively (table, detail, stats, chain check) |
signet explore --show N |
Inspect receipt #N with signature, policy, and chain info |
signet explore --show N --decrypt-params |
Materialize encrypted action.params for local inspection |
signet explore --stats |
Receipt statistics by tool, signer, and version |
signet delegate create ... --ttl 24h |
Create a scoped delegation token (short-lived) |
signet delegate sign ... --chain <file> |
Sign with delegation proof and produce a v4 receipt |
signet delegate verify-auth <receipt> --trusted-roots <name> |
Verify authorization chain, scope, and trusted root |
signet policy validate <path> |
Validate policy syntax and print its hash |
signet policy check <path> --tool <t> --params <json> |
Dry-run whether an action would be allowed |
signet proxy --target <cmd> --key <name> |
Run as MCP stdio proxy — sign all tool calls transparently |
signet proxy --target <cmd> --key <n> --policy <path> |
Proxy with policy enforcement before signing |
signet claude install |
Install Claude Code plugin (PostToolUse signing hook) |
signet claude uninstall |
Remove Claude Code plugin |
signet dashboard |
Open local audit dashboard in browser |
Passphrase via interactive prompt or SIGNET_PASSPHRASE env var for CI.
Run signet dashboard to open a local web UI for your audit log — no account, no network, just your local receipts.
Timeline view: every tool call logged with signer, tool name, target, and receipt ID. Filter by time, tool, or signer.
The Chain Integrity tab verifies the SHA-256 hash chain across your entire audit log — any tampering or gap is pinpointed to the exact file and line:
Chain broken at line 189: expected vs actual hash shown. This is what "append-only" actually looks like in practice.
| Doc | Description |
|---|---|
| Architecture | System design, component overview, data flow |
| Security | Crypto primitives, threat model, key storage |
| MCP Integration Guide | Step-by-step MCP setup with SigningTransport |
| CI/CD Integration | GitHub Actions example, key management for CI |
| Audit Log Guide | Querying, filtering, hash chain verification |
| Contributing | Build instructions, development workflow |
| Changelog | Version history |
signet/
├── crates/signet-core/ Rust core: identity, sign, verify, audit, keystore
├── signet-cli/ CLI tool (signet binary)
├── bindings/
│ ├── signet-ts/ WASM binding (wasm-bindgen)
│ └── signet-py/ Python binding (PyO3 + maturin)
├── plugins/
│ ├── claude-code/ Claude Code plugin (WASM signing + audit)
│ └── codex/ Codex CLI plugin (WASM signing + audit)
├── packages/
│ ├── signet-core/ @signet-auth/core — TypeScript wrapper
│ ├── signet-mcp/ @signet-auth/mcp — MCP SigningTransport middleware
│ ├── signet-mcp-server/ @signet-auth/mcp-server — Server verification
│ ├── signet-mcp-tools/ @signet-auth/mcp-tools — Standalone MCP signing server
│ ├── signet-node/ @signet-auth/node — Node local audit/operator helpers
│ └── signet-vercel-ai/ @signet-auth/vercel-ai — Vercel AI SDK middleware
├── examples/
│ ├── wasm-roundtrip/ WASM validation tests
│ └── mcp-agent/ MCP agent, echo server, and verifier server example
├── docs/ Design docs, specs, plans
├── LICENSE-APACHE
└── LICENSE-MIT
# Rust core + CLI
cargo build --release -p signet-cli
# WASM binding
wasm-pack build bindings/signet-ts --target nodejs --out-dir ../../packages/signet-core/wasm
# TypeScript packages
cd packages/signet-core && npm run build
cd packages/signet-mcp && npm run build
cd packages/signet-mcp-server && npm run build
cd packages/signet-mcp-tools && npm run build
cd packages/signet-node && npm run build
cd packages/signet-vercel-ai && npm run build
# Python binding
cd bindings/signet-py
pip install maturin
maturin develop
# Rust tests
cargo test --workspace
# Python tests
cd bindings/signet-py && pytest tests/ -v
# WASM roundtrip
node examples/wasm-roundtrip/test.mjs
# TypeScript tests
cd packages/signet-core && npm test
cd packages/signet-mcp && npm test
cd packages/signet-mcp-server && npm test
cd packages/signet-mcp-tools && npm test
cd packages/signet-node && npm test
# Plugin tests
cd plugins/claude-code && npm test
cd plugins/codex && npm test
# Vercel AI SDK tests
cd packages/signet-vercel-ai && npm test
# Reference verifier server smoke test
cd examples/mcp-agent && npm run smoke
ed25519-dalek)Keys stored at ~/.signet/keys/ with 0600 permissions. Override with SIGNET_HOME env var.
signResponse() for server co-signing — shipped in v0.4)Signet is first an evidence layer: it proves what happened. It can also enforce checks at the signing boundary and execution boundary, but it does not replace sandboxing, least-privilege design, or human approval where those are required.
If Signet is useful to you, please star this repo — it helps more teams find it.
Apache-2.0 + MIT dual license.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"signet": {
"command": "npx",
"args": []
}
}
}