Skip to main content

✅ Sell verified agents. Buyers trust verified packages. Unsigned agents get ignored. Add verification in seconds.

Project description

agentverif-sign

The trust layer for AI agent distribution.

PyPI version CI License: MIT

[English] | 中文


agentverif-sign is the SSL certificate for AI agent distribution. Vendors sign. Buyers verify. The registry is the source of truth.

pip install agentverif-sign

Quick start

As a vendor — sign your agent:

agentverif-sign sign ./my-agent.zip
# ✅ Signed successfully
# License: AC-84F2-91AB
# Tier:    indie

As a buyer — verify before executing:

agentverif-sign verify ./agent.zip
# ✅ UNREGISTERED — Signature valid locally; registry not checked
# Verify online: https://verify.agentverif.com/AC-84F2-91AB

Verify without CLI: verify.agentverif.com


Commands

agentverif-sign sign <ZIP>

Signs an agent ZIP package. Runs a security scan, generates SIGNATURE.json, and injects it into the zip.

agentverif-sign sign ./agent.zip [--tier indie|pro|enterprise] [--api-key KEY] [--offline]
  • --tier — signing tier (default: indie)
  • --api-key — Pro/Enterprise API key (also via AGENTVERIF_API_KEY env var)
  • --offline — skip registry registration

Tiers:

Tier Cost Signing Registry Ed25519
indie free hash-only no no
pro paid hash + registry yes no
enterprise paid hash + registry yes yes

agentverif-sign verify <ZIP>

Verifies a signed agent zip. Checks the hash locally; optionally checks the registry.

agentverif-sign verify ./agent.zip [--offline] [--json]

Exit codes: 0 = VERIFIED or UNREGISTERED, 1 = MODIFIED, REVOKED, or UNSIGNED.

The --json flag emits machine-readable output for CI/CD pipelines and MCP tool calls:

{
  "status": "UNREGISTERED",
  "license_id": "AC-84F2-91AB",
  "tier": "indie",
  "badge": "✅ Signed by agentcop",
  "message": "Signature valid locally; registry not checked",
  "offline": true,
  "verify_url": "https://verify.agentverif.com/AC-84F2-91AB"
}

agentverif-sign revoke <LICENSE_ID>

Revokes a license (requires API key).

agentverif-sign revoke AC-84F2-91AB --api-key KEY

agentverif-sign badge <LICENSE_ID>

Prints the badge for a license in multiple formats.

agentverif-sign badge AC-84F2-91AB --format text|html|markdown|svg [--tier indie|pro|enterprise]

SIGNATURE.json

Human-readable, auditable — no binary blobs:

{
  "schema_version": "1.0",
  "license_id": "AC-84F2-91AB",
  "tier": "indie",
  "issued_at": "2026-04-10T00:00:00Z",
  "expires_at": null,
  "issuer": "agentverif.com",
  "issuer_version": "0.1.0",
  "file_list": ["agent.py", "config.json", "requirements.txt"],
  "file_count": 3,
  "zip_hash": "sha256:abc123...",
  "manifest_hash": "sha256:def456...",
  "scan_passed": true,
  "signature": null
}

Docker

# Sign
docker run --rm -v $(pwd):/work agentcop/agentverif-sign sign /work/agent.zip

# Verify
docker run --rm -v $(pwd):/work agentcop/agentverif-sign verify /work/agent.zip

AWS Bedrock / Claude / MCP

agentverif-sign verify --json returns JSON-parseable output suitable for LLM tool calls and MCP integrations.


Environment variables

Variable Default Description
AGENTVERIF_API_KEY Pro/Enterprise API key
AGENTVERIF_SIGN_URL https://sign.agentverif.com Registry URL
AGENTVERIF_SCAN_URL https://api.agentverif.com/scan Scanner URL
AGENTVERIF_OFFLINE Set to any value to skip all registry calls

Design principles

  • Zero mandatory deps for verify — stdlib only for offline hash checks
  • Offline-capable — works without internet
  • AuditableSIGNATURE.json is human-readable JSON, never binary
  • Docker-native — runs in containers, Lambda, Cloud Run, bare metal
  • MCP-ready--json flag for machine-readable output

Installation

# Basic
pip install agentverif-sign

# With Ed25519 support (Pro/Enterprise)
pip install agentverif-sign[crypto]

Full docs: agentverif.com/docs

Why: unsigned agents shouldn't be executed.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agentverif_sign-0.1.1.tar.gz (51.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

agentverif_sign-0.1.1-py3-none-any.whl (15.2 kB view details)

Uploaded Python 3

File details

Details for the file agentverif_sign-0.1.1.tar.gz.

File metadata

  • Download URL: agentverif_sign-0.1.1.tar.gz
  • Upload date:
  • Size: 51.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.13

File hashes

Hashes for agentverif_sign-0.1.1.tar.gz
Algorithm Hash digest
SHA256 e1088e635efef31286cdaac5a3e3bbcea5d1ed9bdf7246784ce64aefb91f79ff
MD5 49f06a8078f773f959780d4405706d48
BLAKE2b-256 0a3f4f9473b28ba8a983ab5e6b304546cc787e9cc5cc360baffb5b2a093b89b6

See more details on using hashes here.

File details

Details for the file agentverif_sign-0.1.1-py3-none-any.whl.

File metadata

File hashes

Hashes for agentverif_sign-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 a0c3170597ed20103dd11deee7182f03aa2e9bb70dd81ebf677926d4625eb5dc
MD5 e716bb61ea517099f386b7a51a6b84a2
BLAKE2b-256 afa208f8cb087535cbc730bd3676c33fea9308364000f2c7f699ed78ff94336d

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page