Skip to main content

LangChain integration for the Kredo agent attestation protocol

Project description

langchain-kredo

LangChain integration for the Kredo agent attestation protocol.

One line of code. Signed attestation. Done.

Install

pip install langchain-kredo

One-Liner

from langchain_kredo import attest

# That's it. Resolves name, looks up skill, signs, submits.
attest("jim", "incident-triage", "Triaged 3 incidents correctly in SOC exercise")

# With a URL — auto-detected as evidence artifact
attest("jim", "code-review", "https://github.com/org/repo/pull/47")

# With explicit proficiency (1-5, default 3)
attest("jim", "threat-hunting", "Found lateral movement in 4 minutes", proficiency=5)

Set KREDO_PRIVATE_KEY env var (hex seed) and go. Subject resolved by name or pubkey. Skill resolved by reverse taxonomy lookup — just say "incident-triage", it finds the domain.

Key handling: Your signing key is a 32-byte Ed25519 seed. Store it as an environment variable, never hardcode it. Generate one with kredo identity create or any Ed25519 library.

Trust Gate

Policy enforcement for agent pipelines:

from langchain_kredo import KredoSigningClient, KredoTrustGate

client = KredoSigningClient(signing_key="your-hex-seed")
gate = KredoTrustGate(client, min_score=0.3, block_warned=True)

# Check trust
result = gate.check("ed25519:agent-pubkey")
# result.passed, result.score, result.skills, result.attestor_count

# Select best agent for a task (ranks by reputation + diversity + domain proficiency)
best = gate.select_best(candidates, domain="security-operations", skill="incident-triage")

# Build-vs-buy: delegate or self-compute?
delegate = gate.should_delegate(candidates, domain="code-generation", self_proficiency=2)

# Decorator
@gate.require(min_score=0.7)
def sensitive_operation(pubkey: str):
    ...

LangChain Tools

Four tools for agent toolboxes. Read-only tools are safe for autonomous LLM use. The submit tool requires human approval by default.

from langchain_kredo import KredoCheckTrustTool, KredoSearchAttestationsTool

# Safe for LLM agents — read-only
tools = [
    KredoCheckTrustTool(client=client),
    KredoSearchAttestationsTool(client=client),
]
Tool Name LLM-Safe Purpose
KredoCheckTrustTool kredo_check_trust Yes Check agent reputation + skills + warnings
KredoSearchAttestationsTool kredo_search_attestations Yes Find agents by skill/domain/proficiency
KredoSubmitAttestationTool kredo_submit_attestation No Sign and submit skill attestation
KredoGetTaxonomyTool kredo_get_taxonomy Yes Browse valid domains/skills

Warning: KredoSubmitAttestationTool signs and submits irreversible cryptographic claims. By default it returns a preview for human approval. Only set require_human_approval=False if your pipeline has an explicit confirmation mechanism.

Callback Handler

Tracks chain execution, builds attestation evidence automatically:

from langchain_kredo import KredoCallbackHandler

handler = KredoCallbackHandler()
chain.invoke(input, config={"callbacks": [handler]})

for record in handler.get_records():
    if record.success_rate >= 0.9:
        client.attest_skill(
            subject_pubkey="ed25519:...",
            domain="security-operations",
            skill="incident-triage",
            proficiency=3,
            context=record.build_evidence_context(),
            artifacts=record.build_artifacts(),
        )

Collects evidence but never auto-submits. You decide when and what to attest.

Client

Full signing-aware client for when you need more control:

client = KredoSigningClient(
    signing_key=sk,           # SigningKey, bytes, hex string, or env var
    name="my-agent",
    agent_type="agent",
)

# Read
profile = client.get_profile("ed25519:...")
my_profile = client.my_profile()  # your own profile
results = client.search(domain="security-operations")

# Write
client.register()
client.attest_skill(
    subject_pubkey="ed25519:...",
    domain="security-operations",
    skill="incident-triage",
    proficiency=4,
    context="Demonstrated expert-level triage in SOC exercise",
)

Development

cd langchain-kredo
pip install -e ".[dev]"
pytest tests/ -v  # 82 tests

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

langchain_kredo-0.3.1.tar.gz (19.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

langchain_kredo-0.3.1-py3-none-any.whl (16.0 kB view details)

Uploaded Python 3

File details

Details for the file langchain_kredo-0.3.1.tar.gz.

File metadata

  • Download URL: langchain_kredo-0.3.1.tar.gz
  • Upload date:
  • Size: 19.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for langchain_kredo-0.3.1.tar.gz
Algorithm Hash digest
SHA256 79847246e3d1339df1134c978b2e67fa9119127145f4c551ac34533d9702ba28
MD5 790e699176bfbfa564cfb835ee371b26
BLAKE2b-256 f3d8e4ff70a40784fe0cfd87e7d6a109c86bdd373220a1d3cce1a010b1cf7884

See more details on using hashes here.

File details

Details for the file langchain_kredo-0.3.1-py3-none-any.whl.

File metadata

File hashes

Hashes for langchain_kredo-0.3.1-py3-none-any.whl
Algorithm Hash digest
SHA256 7088c5d4f56f19fd379e1ee5c82a0ceeb2c6aa510469191db053a5429a85f8d6
MD5 42ca8641ac059e9038d530d7dbd95e4d
BLAKE2b-256 0dc931adf8a4704d5c400b8c29f2a6a714e75660e9e7cd29c5d3816df9366d92

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page