OCC cryptographic proof signing for Google Gemini
Project description
occ-gemini
OCC cryptographic proof signing for Google Gemini.
Every tool/function call produces an Ed25519-signed proof entry in proof.jsonl, creating a tamper-evident audit log of agent actions.
Install
pip install occ-gemini
Quick Start
Wrap a Client (recommended)
from google import genai
from occ_gemini import wrap_client
client = genai.Client(api_key="...")
safe_client = wrap_client(client)
response = safe_client.models.generate_content(
model="gemini-2.0-flash",
contents="What's the weather?",
)
# proof.jsonl now contains signed proof entries for any function calls
Decorate Individual Tools
from occ_gemini import occ_tool
@occ_tool
def get_weather(location: str) -> str:
return f"Sunny in {location}"
Custom Signer
from occ_gemini import OCCSigner, wrap_client
signer = OCCSigner(state_dir="/tmp/.occ", proof_file="audit.jsonl")
safe_client = wrap_client(client, signer=signer)
Legacy API (wrap_model)
wrap_model also accepts a google.genai.Client or a legacy google.generativeai.GenerativeModel:
from occ_gemini import wrap_model
safe_client = wrap_model(client)
Proof Format
Each line in proof.jsonl is a JSON object:
{
"version": "occ/proof/1",
"timestamp": "2026-03-20T12:00:00.000Z",
"signer": "<base64url-ed25519-public-key>",
"payload": {
"type": "tool-call",
"tool": "get_weather",
"inputHash": "<sha256-hex>",
"outputHash": "<sha256-hex>"
},
"signature": "<base64url-ed25519-signature>",
"prev": "<sha256-hex-of-previous-proof>"
}
Proofs are chained: each proof's prev field contains the SHA-256 hash of the previous proof's canonical JSON.
Configuration
- State directory: Keypair stored in
.occ/signer-state.json(defaults to CWD) - Proof file: Defaults to
proof.jsonlin CWD - Both configurable via
OCCSigner(state_dir=..., proof_file=...)
License
Apache-2.0
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file occ_gemini-0.2.0.tar.gz.
File metadata
- Download URL: occ_gemini-0.2.0.tar.gz
- Upload date:
- Size: 6.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a67373caf077c5b35e27d3b910453837fd93a141369a895c6f814fbd9e2bd7be
|
|
| MD5 |
e9c8b06229555caad3b6ca46036ea6c2
|
|
| BLAKE2b-256 |
0758b77b1a494bd94d7f572e9c11ef0caa74241ff15378df90288c24b918d898
|
File details
Details for the file occ_gemini-0.2.0-py3-none-any.whl.
File metadata
- Download URL: occ_gemini-0.2.0-py3-none-any.whl
- Upload date:
- Size: 7.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
decc15fef159d3feca447cf9cf66fa6f545bef43de1bc49c783ca90cf823512a
|
|
| MD5 |
19177446cedb8840b215500980cc23c9
|
|
| BLAKE2b-256 |
ccc73c945cc0b133ffe966ce5a9e64d1e497e94072d6b791756609debac469f0
|