Skip to main content

✅ Sell verified agents. Buyers trust verified packages. Unsigned agents get ignored. Add verification in seconds.

Project description

agentverif-sign

The trust layer for AI agent distribution.

PyPI version CI License: MIT

[English] | 中文


agentverif-sign is the SSL certificate for AI agent distribution. Vendors sign. Buyers verify. The registry is the source of truth.

pip install agentverif-sign

Quick start

As a vendor — sign your agent:

agentverif-sign sign ./my-agent.zip
# ✅ Signed successfully
# License: AC-84F2-91AB
# Tier:    indie

As a buyer — verify before executing:

agentverif-sign verify ./agent.zip
# ✅ UNREGISTERED — Signature valid locally; registry not checked
# Verify online: https://verify.agentverif.com/AC-84F2-91AB

Verify without CLI: verify.agentverif.com


Commands

agentverif-sign sign <ZIP>

Signs an agent ZIP package. Runs a security scan, generates SIGNATURE.json, and injects it into the zip.

agentverif-sign sign ./agent.zip [--tier indie|pro|enterprise] [--api-key KEY] [--offline]
  • --tier — signing tier (default: indie)
  • --api-key — Pro/Enterprise API key (also via AGENTVERIF_API_KEY env var)
  • --offline — skip registry registration

Tiers:

Tier Cost Signing Registry Ed25519
indie free hash-only no no
pro paid hash + registry yes no
enterprise paid hash + registry yes yes

agentverif-sign verify <ZIP>

Verifies a signed agent zip. Checks the hash locally; optionally checks the registry.

agentverif-sign verify ./agent.zip [--offline] [--json]

Exit codes: 0 = VERIFIED or UNREGISTERED, 1 = MODIFIED, REVOKED, or UNSIGNED.

The --json flag emits machine-readable output for CI/CD pipelines and MCP tool calls:

{
  "status": "UNREGISTERED",
  "license_id": "AC-84F2-91AB",
  "tier": "indie",
  "badge": "✅ Signed by agentcop",
  "message": "Signature valid locally; registry not checked",
  "offline": true,
  "verify_url": "https://verify.agentverif.com/AC-84F2-91AB"
}

agentverif-sign revoke <LICENSE_ID>

Revokes a license (requires API key).

agentverif-sign revoke AC-84F2-91AB --api-key KEY

agentverif-sign badge <LICENSE_ID>

Prints the badge for a license in multiple formats.

agentverif-sign badge AC-84F2-91AB --format text|html|markdown|svg [--tier indie|pro|enterprise]

SIGNATURE.json

Human-readable, auditable — no binary blobs:

{
  "schema_version": "1.0",
  "license_id": "AC-84F2-91AB",
  "tier": "indie",
  "issued_at": "2026-04-10T00:00:00Z",
  "expires_at": null,
  "issuer": "agentverif.com",
  "issuer_version": "0.1.0",
  "file_list": ["agent.py", "config.json", "requirements.txt"],
  "file_count": 3,
  "zip_hash": "sha256:abc123...",
  "manifest_hash": "sha256:def456...",
  "scan_passed": true,
  "signature": null
}

Docker

# Sign
docker run --rm -v $(pwd):/work agentcop/agentverif-sign sign /work/agent.zip

# Verify
docker run --rm -v $(pwd):/work agentcop/agentverif-sign verify /work/agent.zip

AWS Bedrock / Claude / MCP

agentverif-sign verify --json returns JSON-parseable output suitable for LLM tool calls and MCP integrations.


Environment variables

Variable Default Description
AGENTVERIF_API_KEY Pro/Enterprise API key
AGENTVERIF_SIGN_URL https://sign.agentverif.com Registry URL
AGENTVERIF_SCAN_URL https://api.agentverif.com/scan Scanner URL
AGENTVERIF_OFFLINE Set to any value to skip all registry calls

Design principles

  • Zero mandatory deps for verify — stdlib only for offline hash checks
  • Offline-capable — works without internet
  • AuditableSIGNATURE.json is human-readable JSON, never binary
  • Docker-native — runs in containers, Lambda, Cloud Run, bare metal
  • MCP-ready--json flag for machine-readable output

Installation

# Basic
pip install agentverif-sign

# With Ed25519 support (Pro/Enterprise)
pip install agentverif-sign[crypto]

Full docs: agentverif.com/docs

Why: unsigned agents shouldn't be executed.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agentverif_sign-0.1.0.tar.gz (50.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

agentverif_sign-0.1.0-py3-none-any.whl (15.3 kB view details)

Uploaded Python 3

File details

Details for the file agentverif_sign-0.1.0.tar.gz.

File metadata

  • Download URL: agentverif_sign-0.1.0.tar.gz
  • Upload date:
  • Size: 50.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.13

File hashes

Hashes for agentverif_sign-0.1.0.tar.gz
Algorithm Hash digest
SHA256 f8b811f6c1ae18cc9cee09a95fdaed65debe459f500d75ff8ceb1b5c9f4c71dd
MD5 d9a176c5285792c719addc066eeaad50
BLAKE2b-256 d8a7f0c1e7b58cd25dce0b5d6adc8fd5e1aa25bd68990956c12cd9b96b6a41e1

See more details on using hashes here.

File details

Details for the file agentverif_sign-0.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for agentverif_sign-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 847c9beab7dcc85349248ecd0aef3adb1bb70543f82c731ac7600343f06d887d
MD5 913ecc3a44eb3649451a804eac5b1967
BLAKE2b-256 d9059b18610158e56ba14d51493137cb7665946cea4fff91e341e13d99a2a166

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page