Skip to main content

Third-party cryptographic proof for AI agent API calls — ArkForge Trust Layer MCP server

Project description

ArkForge Trust Layer — MCP Server

Third-party certifying proxy — get an independent cryptographic proof for any HTTP call.

Works with AI agents, webhooks, microservices, or any HTTP client. The proof is signed by ArkForge (independent third party) — not by the caller.

ArkForge Trust Layer MCP server

Why this matters

When a system makes an HTTP call, there is no independent record of what was sent, what was received, or when it happened. Either party could deny or alter the transaction.

ArkForge fixes this by acting as a certifying proxy: the caller routes its request through ArkForge, which signs the full request+response bundle with an Ed25519 key, timestamps it via RFC 3161, and anchors it in Sigstore Rekor — an immutable, publicly auditable log.

The resulting proof is permanently verifiable at a public URL, by anyone, without contacting ArkForge.

This is the difference between a self-signed certificate and a CA-issued one. Other tools produce proofs signed by the caller itself. ArkForge produces proofs signed by an independent third party.


Use cases

  • AI agents — audit trail for every external API call (Claude, GPT, Mistral, LangChain, AutoGen)
  • Webhooks — prove a Stripe or GitHub event was received with this exact payload
  • Microservices — tamper-evident log between internal services (compliance, fintech)
  • Data providers — prove an external API returned this value at this timestamp
  • Automations — certify an action in an n8n or Zapier workflow

Installation

{
  "mcpServers": {
    "arkforge": {
      "command": "uvx",
      "args": ["arkforge-mcp"],
      "env": {
        "ARKFORGE_API_KEY": "your_api_key_here"
      }
    }
  }
}

Get a free API key (500 proofs/month) at arkforge.tech.


Tools

certify_call

Route an HTTP call through ArkForge and get a cryptographic proof of the transaction.

target          URL of the upstream API to call
payload         JSON body (optional)
method          "POST" or "GET" (default: "POST")
description     Human-readable description included in the proof
agent_identity  Identifier for the calling system (optional)

Returns proof_id, verification_url, upstream_response, chain_hash, timestamp, and Ed25519 signature.

Use this instead of calling the API directly when you need an auditable record.

Example response:

{
  "proof_id": "prf_20260310_143022_a1b2c3",
  "verification_url": "https://trust.arkforge.tech/v1/proof/prf_20260310_143022_a1b2c3",
  "upstream_response": { "status": "ok" },
  "chain_hash": "e3b0c44298fc1c149afb...",
  "timestamp": "2026-03-10T14:30:22.481Z",
  "timestamp_authority": "verified",
  "rekor_log_id": "https://rekor.sigstore.dev/api/v1/log/entries/...",
  "seller": "api.example.com",
  "signature": "MCowBQYDK2VwAyEA..."
}

get_proof

Retrieve the full proof bundle for a given proof_id.

verify_proof

Get a human-readable summary of what a proof certifies — useful for explaining to a user or auditor what was independently verified.

get_usage

Check your remaining credits for the current month.


What each proof contains

Field Description
proof_id Unique identifier — permanent public URL
hashes.request SHA-256 of the exact request sent
hashes.response SHA-256 of the exact response received
hashes.chain Combined hash — tamper-evident
parties.seller Domain of the called API
timestamp_authority RFC 3161 timestamp via FreeTSA (QTSP eIDAS on Enterprise)
rekor Sigstore Rekor immutable log entry
arkforge_signature Ed25519 signature by ArkForge's independent key

Pricing

Plan Proofs/month Price
Free 500 €0
Pro 5,000 €29/month
Enterprise 50,000 + QTSP eIDAS €149/month

Get your API key →


REST API

The MCP server is one integration path. The same API works from any language or framework:

curl -X POST https://trust.arkforge.tech/v1/proxy \
  -H "X-Api-Key: your_key" \
  -H "Content-Type: application/json" \
  -d '{"target": "https://api.example.com/action", "payload": {"data": "value"}}'

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

arkforge_mcp-1.1.0.tar.gz (7.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

arkforge_mcp-1.1.0-py3-none-any.whl (7.6 kB view details)

Uploaded Python 3

File details

Details for the file arkforge_mcp-1.1.0.tar.gz.

File metadata

  • Download URL: arkforge_mcp-1.1.0.tar.gz
  • Upload date:
  • Size: 7.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.3

File hashes

Hashes for arkforge_mcp-1.1.0.tar.gz
Algorithm Hash digest
SHA256 762c8faf81bcd62c33676ce71541f2a0205ea458eb0eb1cd6013e5b9a9db0d2d
MD5 ff7900849668e61b75dc49af87137ba0
BLAKE2b-256 27e36ed52263dd30c979af508652b63dad8d344e978088b6530d0b1819cc480b

See more details on using hashes here.

File details

Details for the file arkforge_mcp-1.1.0-py3-none-any.whl.

File metadata

  • Download URL: arkforge_mcp-1.1.0-py3-none-any.whl
  • Upload date:
  • Size: 7.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.3

File hashes

Hashes for arkforge_mcp-1.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7e47e20c24569f24a588c02daa4ac99cf243c7e12130db8f38fb5adf0360c79e
MD5 9e6393cd0f5ae6626dfdef9d5317091b
BLAKE2b-256 3ab0af13b47ee9f443d2d89dd5a24ebdfc1b79c6ce42f169b5723b3d9c99581c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page