✅ Sell verified agents. Buyers trust verified packages. Unsigned agents get ignored. Add verification in seconds.
Project description
agentverif-sign
The trust layer for AI agent distribution.
[English] | 中文
agentverif-sign is the SSL certificate for AI agent distribution. Vendors sign. Buyers verify. The registry is the source of truth.
pip install agentverif-sign
Quick start
As a vendor — sign your agent:
agentverif-sign sign ./my-agent.zip
# ✅ Signed successfully
# License: AC-84F2-91AB
# Tier: indie
As a buyer — verify before executing:
agentverif-sign verify ./agent.zip
# ✅ UNREGISTERED — Signature valid locally; registry not checked
# Verify online: https://verify.agentverif.com/AC-84F2-91AB
Verify without CLI: verify.agentverif.com
Commands
agentverif-sign sign <ZIP>
Signs an agent ZIP package. Runs a security scan, generates SIGNATURE.json, and injects it into the zip.
agentverif-sign sign ./agent.zip [--tier indie|pro|enterprise] [--api-key KEY] [--offline]
--tier— signing tier (default:indie)--api-key— Pro/Enterprise API key (also viaAGENTVERIF_API_KEYenv var)--offline— skip registry registration
Tiers:
| Tier | Cost | Signing | Registry | Ed25519 |
|---|---|---|---|---|
| indie | free | hash-only | no | no |
| pro | paid | hash + registry | yes | no |
| enterprise | paid | hash + registry | yes | yes |
agentverif-sign verify <ZIP>
Verifies a signed agent zip. Checks the hash locally; optionally checks the registry.
agentverif-sign verify ./agent.zip [--offline] [--json]
Exit codes: 0 = VERIFIED or UNREGISTERED, 1 = MODIFIED, REVOKED, or UNSIGNED.
The --json flag emits machine-readable output for CI/CD pipelines and MCP tool calls:
{
"status": "UNREGISTERED",
"license_id": "AC-84F2-91AB",
"tier": "indie",
"badge": "✅ Signed by agentcop",
"message": "Signature valid locally; registry not checked",
"offline": true,
"verify_url": "https://verify.agentverif.com/AC-84F2-91AB"
}
agentverif-sign revoke <LICENSE_ID>
Revokes a license (requires API key).
agentverif-sign revoke AC-84F2-91AB --api-key KEY
agentverif-sign badge <LICENSE_ID>
Prints the badge for a license in multiple formats.
agentverif-sign badge AC-84F2-91AB --format text|html|markdown|svg [--tier indie|pro|enterprise]
SIGNATURE.json
Human-readable, auditable — no binary blobs:
{
"schema_version": "1.0",
"license_id": "AC-84F2-91AB",
"tier": "indie",
"issued_at": "2026-04-10T00:00:00Z",
"expires_at": null,
"issuer": "agentverif.com",
"issuer_version": "0.1.0",
"file_list": ["agent.py", "config.json", "requirements.txt"],
"file_count": 3,
"zip_hash": "sha256:abc123...",
"manifest_hash": "sha256:def456...",
"scan_passed": true,
"signature": null
}
Docker
# Sign
docker run --rm -v $(pwd):/work agentcop/agentverif-sign sign /work/agent.zip
# Verify
docker run --rm -v $(pwd):/work agentcop/agentverif-sign verify /work/agent.zip
AWS Bedrock / Claude / MCP
agentverif-sign verify --json returns JSON-parseable output suitable for LLM tool calls and MCP integrations.
Environment variables
| Variable | Default | Description |
|---|---|---|
AGENTVERIF_API_KEY |
— | Pro/Enterprise API key |
AGENTVERIF_SIGN_URL |
https://sign.agentverif.com |
Registry URL |
AGENTVERIF_SCAN_URL |
https://api.agentverif.com/scan |
Scanner URL |
AGENTVERIF_OFFLINE |
— | Set to any value to skip all registry calls |
Design principles
- Zero mandatory deps for verify — stdlib only for offline hash checks
- Offline-capable — works without internet
- Auditable —
SIGNATURE.jsonis human-readable JSON, never binary - Docker-native — runs in containers, Lambda, Cloud Run, bare metal
- MCP-ready —
--jsonflag for machine-readable output
Installation
# Basic
pip install agentverif-sign
# With Ed25519 support (Pro/Enterprise)
pip install agentverif-sign[crypto]
Full docs: agentverif.com/docs
Why: unsigned agents shouldn't be executed.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file agentverif_sign-0.1.2.tar.gz.
File metadata
- Download URL: agentverif_sign-0.1.2.tar.gz
- Upload date:
- Size: 51.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
548c502924170f515ca30c69cf35194eb43d0b2487088e303db7bc3635e0221d
|
|
| MD5 |
426af7411bb7d207965399c2cb21d213
|
|
| BLAKE2b-256 |
a55dea175e72f6e8061f59a5f17f83c27586b80f7ca0e9f19ba17c193dee3b88
|
File details
Details for the file agentverif_sign-0.1.2-py3-none-any.whl.
File metadata
- Download URL: agentverif_sign-0.1.2-py3-none-any.whl
- Upload date:
- Size: 15.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
567b94fba9ba57d4b760947eb7dc5225133e585aebcfe6083933003d8c00f52b
|
|
| MD5 |
81ad950073136061db9e93215473c3f4
|
|
| BLAKE2b-256 |
28dcf83ae74d35d239f2bb0f0466c67d7b28f3331b303559e3e40973a0e6ccf5
|