Skip to main content

✅ Sell verified agents. Buyers trust verified packages. Unsigned agents get ignored. Add verification in seconds.

Project description

agentverif-sign

The trust layer for AI agent distribution.

PyPI version CI License: MIT

[English] | 中文


agentverif-sign is the SSL certificate for AI agent distribution. Vendors sign. Buyers verify. The registry is the source of truth.

pip install agentverif-sign

Quick start

As a vendor — sign your agent:

agentverif-sign sign ./my-agent.zip
# ✅ Signed successfully
# License: AC-84F2-91AB
# Tier:    indie

As a buyer — verify before executing:

agentverif-sign verify ./agent.zip
# ✅ UNREGISTERED — Signature valid locally; registry not checked
# Verify online: https://verify.agentverif.com/AC-84F2-91AB

Verify without CLI: verify.agentverif.com


Commands

agentverif-sign sign <ZIP>

Signs an agent ZIP package. Runs a security scan, generates SIGNATURE.json, and injects it into the zip.

agentverif-sign sign ./agent.zip [--tier indie|pro|enterprise] [--api-key KEY] [--offline]
  • --tier — signing tier (default: indie)
  • --api-key — Pro/Enterprise API key (also via AGENTVERIF_API_KEY env var)
  • --offline — skip registry registration

Tiers:

Tier Cost Signing Registry Ed25519
indie free hash-only no no
pro paid hash + registry yes no
enterprise paid hash + registry yes yes

agentverif-sign verify <ZIP>

Verifies a signed agent zip. Checks the hash locally; optionally checks the registry.

agentverif-sign verify ./agent.zip [--offline] [--json]

Exit codes: 0 = VERIFIED or UNREGISTERED, 1 = MODIFIED, REVOKED, or UNSIGNED.

The --json flag emits machine-readable output for CI/CD pipelines and MCP tool calls:

{
  "status": "UNREGISTERED",
  "license_id": "AC-84F2-91AB",
  "tier": "indie",
  "badge": "✅ Signed by agentcop",
  "message": "Signature valid locally; registry not checked",
  "offline": true,
  "verify_url": "https://verify.agentverif.com/AC-84F2-91AB"
}

agentverif-sign revoke <LICENSE_ID>

Revokes a license (requires API key).

agentverif-sign revoke AC-84F2-91AB --api-key KEY

agentverif-sign badge <LICENSE_ID>

Prints the badge for a license in multiple formats.

agentverif-sign badge AC-84F2-91AB --format text|html|markdown|svg [--tier indie|pro|enterprise]

SIGNATURE.json

Human-readable, auditable — no binary blobs:

{
  "schema_version": "1.0",
  "license_id": "AC-84F2-91AB",
  "tier": "indie",
  "issued_at": "2026-04-10T00:00:00Z",
  "expires_at": null,
  "issuer": "agentverif.com",
  "issuer_version": "0.1.0",
  "file_list": ["agent.py", "config.json", "requirements.txt"],
  "file_count": 3,
  "zip_hash": "sha256:abc123...",
  "manifest_hash": "sha256:def456...",
  "scan_passed": true,
  "signature": null
}

Docker

# Sign
docker run --rm -v $(pwd):/work agentcop/agentverif-sign sign /work/agent.zip

# Verify
docker run --rm -v $(pwd):/work agentcop/agentverif-sign verify /work/agent.zip

AWS Bedrock / Claude / MCP

agentverif-sign verify --json returns JSON-parseable output suitable for LLM tool calls and MCP integrations.


Environment variables

Variable Default Description
AGENTVERIF_API_KEY Pro/Enterprise API key
AGENTVERIF_SIGN_URL https://sign.agentverif.com Registry URL
AGENTVERIF_SCAN_URL https://api.agentverif.com/scan Scanner URL
AGENTVERIF_OFFLINE Set to any value to skip all registry calls

Design principles

  • Zero mandatory deps for verify — stdlib only for offline hash checks
  • Offline-capable — works without internet
  • AuditableSIGNATURE.json is human-readable JSON, never binary
  • Docker-native — runs in containers, Lambda, Cloud Run, bare metal
  • MCP-ready--json flag for machine-readable output

Installation

# Basic
pip install agentverif-sign

# With Ed25519 support (Pro/Enterprise)
pip install agentverif-sign[crypto]

Full docs: agentverif.com/docs

Why: unsigned agents shouldn't be executed.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agentverif_sign-0.1.2.tar.gz (51.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

agentverif_sign-0.1.2-py3-none-any.whl (15.2 kB view details)

Uploaded Python 3

File details

Details for the file agentverif_sign-0.1.2.tar.gz.

File metadata

  • Download URL: agentverif_sign-0.1.2.tar.gz
  • Upload date:
  • Size: 51.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.13

File hashes

Hashes for agentverif_sign-0.1.2.tar.gz
Algorithm Hash digest
SHA256 548c502924170f515ca30c69cf35194eb43d0b2487088e303db7bc3635e0221d
MD5 426af7411bb7d207965399c2cb21d213
BLAKE2b-256 a55dea175e72f6e8061f59a5f17f83c27586b80f7ca0e9f19ba17c193dee3b88

See more details on using hashes here.

File details

Details for the file agentverif_sign-0.1.2-py3-none-any.whl.

File metadata

File hashes

Hashes for agentverif_sign-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 567b94fba9ba57d4b760947eb7dc5225133e585aebcfe6083933003d8c00f52b
MD5 81ad950073136061db9e93215473c3f4
BLAKE2b-256 28dcf83ae74d35d239f2bb0f0466c67d7b28f3331b303559e3e40973a0e6ccf5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page