Skip to main content

๐Ÿ Official Python SDK for OpenTrust Protocol - The mathematical embodiment of trust itself. Features neutrosophic judgments, fusion operators, OTP mappers, and REVOLUTIONARY Conformance Seals with mathematical proof of conformance.

Project description

๐Ÿ OpenTrust Protocol (OTP) - Python SDK

PyPI version Documentation License: MIT Python

๐ŸŒŸ REVOLUTIONARY UPDATE: v2.0.0 - Conformance Seals

OTP v2.0 introduces the Zero Pillar: Proof-of-Conformance Seals

Every fusion operation now generates a cryptographic fingerprint (SHA-256 hash) that proves the operation was performed according to the exact OTP specification. This transforms OTP from a trust protocol into the mathematical embodiment of trust itself.

The official Python implementation of the OpenTrust Protocol - The mathematical embodiment of trust itself

๐Ÿš€ What is OpenTrust Protocol?

The OpenTrust Protocol (OTP) is a revolutionary framework for representing and managing uncertainty, trust, and auditability in AI systems, blockchain applications, and distributed networks. Built on neutrosophic logic, OTP provides a mathematical foundation for handling incomplete, inconsistent, and uncertain information.

๐ŸŽฏ Why OTP Matters

  • ๐Ÿ”’ Trust & Security: Quantify trust levels in AI decisions and blockchain transactions
  • ๐Ÿ“Š Uncertainty Management: Handle incomplete and contradictory information gracefully
  • ๐Ÿ” Full Auditability: Complete provenance chain for every decision
  • ๐ŸŒ Cross-Platform: Interoperable across Python, JavaScript, Rust, and more
  • โšก Performance: Optimized for production environments with minimal overhead

๐Ÿ Python SDK Features

Core Components

  • Neutrosophic Judgments: Represent evidence as (T, I, F) values where T + I + F โ‰ค 1.0
  • Fusion Operators: Combine multiple judgments with conflict-aware algorithms
  • OTP Mappers: Transform raw data into neutrosophic judgments
  • Provenance Chain: Complete audit trail for every transformation

๐Ÿ” Conformance Seals (v2.0.0) - THE REVOLUTION

Mathematical Proof of Conformance

Every fusion operation automatically generates a Conformance Seal - a cryptographic SHA-256 hash that proves the operation was performed according to the exact OTP specification:

from otp import conflict_aware_weighted_average, verify_conformance_seal_with_inputs

# Create judgments
judgment1 = NeutrosophicJudgment(0.8, 0.2, 0.0, [{"source_id": "sensor1"}])
judgment2 = NeutrosophicJudgment(0.6, 0.3, 0.1, [{"source_id": "sensor2"}])

# Fusion automatically generates Conformance Seal
fused = conflict_aware_weighted_average([judgment1, judgment2], [0.6, 0.4])

# Extract the Conformance Seal
seal = fused.provenance_chain[-1]["conformance_seal"]
print(f"๐Ÿ” Conformance Seal: {seal}")

# Verify mathematical proof of conformance
is_valid = verify_conformance_seal_with_inputs(fused, [judgment1, judgment2], [0.6, 0.4])
print(f"โœ… Mathematical proof verified: {is_valid}")

The Revolution:

  • Self-Auditing: OTP audits itself through mathematics
  • Tamper Detection: Any modification breaks the seal instantly
  • Independent Verification: Anyone can verify conformance without trust
  • Solves the Paradox: "Who audits the auditor?" - OTP does!

๐Ÿ†• OTP Mapper System (v1.0.6)

Transform any data type into neutrosophic judgments:

from otp import NumericalMapper, CategoricalMapper, BooleanMapper
from otp.types import NumericalParams, CategoricalParams, BooleanParams

# DeFi Health Factor Mapping
health_mapper = NumericalMapper(NumericalParams(
    id="defi-health-factor",
    version="1.0.0",
    falsity_point=1.0,      # Liquidation threshold
    indeterminacy_point=1.5, # Warning zone  
    truth_point=2.0,        # Safe zone
    clamp_to_range=True
))

# Transform health factor to neutrosophic judgment
judgment = health_mapper.apply(1.8)
print(f"Health Factor 1.8: T={judgment.T:.3f}, I={judgment.I:.3f}, F={judgment.F:.3f}")

Available Mappers

Mapper Type Use Case Example
NumericalMapper Continuous data interpolation DeFi health factors, IoT sensors
CategoricalMapper Discrete category mapping KYC status, product categories
BooleanMapper Boolean value transformation SSL certificates, feature flags

๐Ÿ“ฆ Installation

pip install opentrustprotocol

๐Ÿš€ Quick Start

Basic Neutrosophic Judgment

from otp import NeutrosophicJudgment, fuse

# Create judgments with provenance
judgment1 = NeutrosophicJudgment(
    T=0.8, I=0.2, F=0.0,
    provenance_chain=[{
        "source_id": "sensor1",
        "timestamp": "2023-01-01T00:00:00Z"
    }]
)

judgment2 = NeutrosophicJudgment(
    T=0.6, I=0.3, F=0.1,
    provenance_chain=[{
        "source_id": "sensor2", 
        "timestamp": "2023-01-01T00:00:00Z"
    }]
)

# Fuse judgments with conflict-aware weighted average
fused = fuse.conflict_aware_weighted_average(
    judgments=[judgment1, judgment2],
    weights=[0.6, 0.4]
)

print(f"Fused: {fused}")

Real-World Example: DeFi Risk Assessment

from otp import *
from otp.types import *
from typing import Dict

# 1. Health Factor Mapper
health_mapper = NumericalMapper(NumericalParams(
    id="health-factor",
    version="1.0.0",
    falsity_point=1.0,
    indeterminacy_point=1.5,
    truth_point=2.0,
    clamp_to_range=True
))

# 2. KYC Status Mapper
kyc_mappings = {
    "VERIFIED": JudgmentData(T=0.9, I=0.1, F=0.0),
    "PENDING": JudgmentData(T=0.3, I=0.7, F=0.0),
    "REJECTED": JudgmentData(T=0.0, I=0.0, F=1.0)
}

kyc_mapper = CategoricalMapper(CategoricalParams(
    id="kyc-status",
    version="1.0.0",
    mappings=kyc_mappings,
    default_judgment=None
))

# 3. SSL Certificate Mapper
ssl_mapper = BooleanMapper(BooleanParams(
    id="ssl-cert",
    version="1.0.0",
    true_map=JudgmentData(T=0.9, I=0.1, F=0.0),
    false_map=JudgmentData(T=0.0, I=0.0, F=1.0)
))

# 4. Transform data to judgments
health_judgment = health_mapper.apply(1.8)
kyc_judgment = kyc_mapper.apply("VERIFIED")
ssl_judgment = ssl_mapper.apply(True)

# 5. Fuse for final risk assessment
risk_assessment = fuse.conflict_aware_weighted_average(
    judgments=[health_judgment, kyc_judgment, ssl_judgment],
    weights=[0.5, 0.3, 0.2]  # Health factor most important
)

print(f"DeFi Risk Assessment: T={risk_assessment.T:.3f}, I={risk_assessment.I:.3f}, F={risk_assessment.F:.3f}")

๐Ÿ—๏ธ Architecture

Performance & Reliability

  • ๐Ÿ”’ Memory Efficient: Optimized data structures with minimal overhead
  • โšก Fast Execution: C-optimized operations where possible
  • ๐Ÿ”„ Thread Safe: Safe concurrent access with proper locking
  • ๐Ÿ“ฆ Minimal Dependencies: Only essential packages for reliability

Mapper Registry System

from otp import get_global_registry

registry = get_global_registry()

# Register mappers
registry.register(health_mapper)
registry.register(kyc_mapper)

# Retrieve and use
mapper = registry.get("health-factor")
judgment = mapper.apply(1.5)

# Export configurations
configs = registry.export()

๐Ÿงช Testing

Run the comprehensive test suite:

python -m pytest tests/

Run examples:

python examples/mapper_examples.py

๐Ÿ“Š Use Cases

๐Ÿ”— Blockchain & DeFi

  • Risk Assessment: Health factors, liquidation risks
  • KYC/AML: Identity verification, compliance scoring
  • Oracle Reliability: Data source trust evaluation

๐Ÿค– AI & Machine Learning

  • Uncertainty Quantification: Model confidence scoring
  • Data Quality: Input validation and reliability
  • Decision Fusion: Multi-model ensemble decisions

๐ŸŒ IoT & Sensors

  • Sensor Reliability: Temperature, pressure, motion sensors
  • Data Fusion: Multi-sensor decision making
  • Anomaly Detection: Trust-based outlier identification

๐Ÿญ Supply Chain

  • Product Tracking: Status monitoring and verification
  • Quality Control: Defect detection and classification
  • Compliance: Regulatory requirement tracking

๐Ÿ”ง Advanced Features

Custom Mapper Creation

from otp.types import Mapper, MapperType, MapperParams
from otp import NeutrosophicJudgment

class CustomMapper(Mapper):
    def __init__(self, params: MapperParams):
        self.params = params
    
    def apply(self, input_value: any) -> NeutrosophicJudgment:
        # Your transformation logic
        return NeutrosophicJudgment(T=0.8, I=0.2, F=0.0, provenance_chain=[])
    
    def get_params(self) -> MapperParams:
        return self.params
    
    def get_type(self) -> MapperType:
        return MapperType.Custom
    
    def validate(self) -> bool:
        # Validate your parameters
        return True

JSON Schema Validation

from otp import MapperValidator

validator = MapperValidator()
result = validator.validate(mapper_params)

if result.valid:
    print("โœ… Valid mapper configuration")
else:
    for error in result.errors:
        print(f"โŒ Validation error: {error}")

๐ŸŒŸ Why Choose OTP Python SDK?

๐Ÿš€ Performance

  • Optimized operations - Minimal runtime overhead
  • Memory efficient - Smart garbage collection
  • Fast development - Rich ecosystem integration

๐Ÿ”’ Safety

  • Type safety - Full type hints and validation
  • Error handling - Comprehensive exception handling
  • Data integrity - Immutable provenance chains

๐Ÿ”ง Developer Experience

  • Rich ecosystem - Seamless integration with Python tools
  • Comprehensive docs - Extensive documentation and examples
  • Active community - Growing ecosystem and support

๐Ÿ“ˆ Performance Benchmarks

Operation Time Memory
Judgment Creation < 10ฮผs 64 bytes
Mapper Application < 15ฮผs 128 bytes
Fusion (10 judgments) < 50ฮผs 512 bytes

๐Ÿค Contributing

We welcome contributions! Please see our Contributing Guide for details.

Development Setup

git clone https://github.com/draxork/opentrustprotocol-py.git
cd opentrustprotocol-py
pip install -e .
pytest
python examples/mapper_examples.py

๐Ÿ“š Documentation

๐ŸŒ Ecosystem

OTP is available across multiple platforms:

Platform Package Status
Python opentrustprotocol โœ… v1.0.6
JavaScript opentrustprotocol โœ… v1.0.3
Rust opentrustprotocol โœ… v0.2.0

๐Ÿ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.

๐Ÿ™ Acknowledgments

  • Neutrosophic Logic: Founded by Florentin Smarandache
  • Python Community: For the amazing language and ecosystem
  • Open Source Contributors: Making trust auditable for everyone

๐ŸŒŸ Star this repository if you find it useful!

GitHub stars

Made with โค๏ธ by the OpenTrust Protocol Team

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

opentrustprotocol-2.0.0.tar.gz (28.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

opentrustprotocol-2.0.0-py3-none-any.whl (33.3 kB view details)

Uploaded Python 3

File details

Details for the file opentrustprotocol-2.0.0.tar.gz.

File metadata

  • Download URL: opentrustprotocol-2.0.0.tar.gz
  • Upload date:
  • Size: 28.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.1

File hashes

Hashes for opentrustprotocol-2.0.0.tar.gz
Algorithm Hash digest
SHA256 ed7296aada85a57c63f4567d40d286d5540b25a91a8e3389816456a7a3a3c1e0
MD5 cad851a96a0f601ec19377a56be290de
BLAKE2b-256 4a5055d2f1cf74697ce7d012a54547132133de8d1b819fb583dfad5ba8f08bfc

See more details on using hashes here.

File details

Details for the file opentrustprotocol-2.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for opentrustprotocol-2.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 3b432c7602d3ed315b8cfe1ca902c3e8b785bf09dd5e3797c31e991a30e4a306
MD5 2de472ce4033aa847b17ad4ac548013f
BLAKE2b-256 ea3d55f540eaef7005f786010d224c9f0cdb97f8ba71d2de3e45dc4a0dab6fd3

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page