Skip to main content

OCC cryptographic proof signing for Google Gemini

Project description

occ-gemini

OCC cryptographic proof signing for Google Gemini.

Every tool/function call produces an Ed25519-signed proof entry in proof.jsonl, creating a tamper-evident audit log of agent actions.

Install

pip install occ-gemini

Quick Start

Wrap a Client (recommended)

from google import genai
from occ_gemini import wrap_client

client = genai.Client(api_key="...")
safe_client = wrap_client(client)
response = safe_client.models.generate_content(
    model="gemini-2.0-flash",
    contents="What's the weather?",
)
# proof.jsonl now contains signed proof entries for any function calls

Decorate Individual Tools

from occ_gemini import occ_tool

@occ_tool
def get_weather(location: str) -> str:
    return f"Sunny in {location}"

Custom Signer

from occ_gemini import OCCSigner, wrap_client

signer = OCCSigner(state_dir="/tmp/.occ", proof_file="audit.jsonl")
safe_client = wrap_client(client, signer=signer)

Legacy API (wrap_model)

wrap_model also accepts a google.genai.Client or a legacy google.generativeai.GenerativeModel:

from occ_gemini import wrap_model

safe_client = wrap_model(client)

Proof Format

Each line in proof.jsonl is a JSON object:

{
  "version": "occ/proof/1",
  "timestamp": "2026-03-20T12:00:00.000Z",
  "signer": "<base64url-ed25519-public-key>",
  "payload": {
    "type": "tool-call",
    "tool": "get_weather",
    "inputHash": "<sha256-hex>",
    "outputHash": "<sha256-hex>"
  },
  "signature": "<base64url-ed25519-signature>",
  "prev": "<sha256-hex-of-previous-proof>"
}

Proofs are chained: each proof's prev field contains the SHA-256 hash of the previous proof's canonical JSON.

Configuration

  • State directory: Keypair stored in .occ/signer-state.json (defaults to CWD)
  • Proof file: Defaults to proof.jsonl in CWD
  • Both configurable via OCCSigner(state_dir=..., proof_file=...)

License

Apache-2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

occ_gemini-0.2.0.tar.gz (6.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

occ_gemini-0.2.0-py3-none-any.whl (7.1 kB view details)

Uploaded Python 3

File details

Details for the file occ_gemini-0.2.0.tar.gz.

File metadata

  • Download URL: occ_gemini-0.2.0.tar.gz
  • Upload date:
  • Size: 6.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.9.6

File hashes

Hashes for occ_gemini-0.2.0.tar.gz
Algorithm Hash digest
SHA256 a67373caf077c5b35e27d3b910453837fd93a141369a895c6f814fbd9e2bd7be
MD5 e9c8b06229555caad3b6ca46036ea6c2
BLAKE2b-256 0758b77b1a494bd94d7f572e9c11ef0caa74241ff15378df90288c24b918d898

See more details on using hashes here.

File details

Details for the file occ_gemini-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: occ_gemini-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 7.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.9.6

File hashes

Hashes for occ_gemini-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 decc15fef159d3feca447cf9cf66fa6f545bef43de1bc49c783ca90cf823512a
MD5 19177446cedb8840b215500980cc23c9
BLAKE2b-256 ccc73c945cc0b133ffe966ce5a9e64d1e497e94072d6b791756609debac469f0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page