Nukez SDK — agent-native storage with cryptographic verification
Project description
PyNukez
Persistent storage for AI agents. Pay with SOL or MON, store anything, get cryptographic proof.
pip install pynukez[solana] # Solana payments (SOL, USDC, USDT)
pip install pynukez[evm] # EVM payments (MON on Monad, WETH)
pip install pynukez[all] # Both
Requires Python 3.9+.
30-Second Example
from pynukez import Nukez
client = Nukez(keypair_path="~/.config/solana/id.json")
# Buy storage (3-step x402 payment flow)
request = client.request_storage(units=1)
transfer = client.solana_transfer(request.pay_to_address, request.amount_sol)
receipt = client.confirm_storage(request.pay_req_id, transfer.signature)
# Use it
client.provision_locker(receipt.id)
urls = client.create_file(receipt.id, "notes.txt")
client.upload_bytes(urls.upload_url, b"Hello!")
data = client.download_bytes(urls.download_url) # b"Hello!"
That's it. Your agent now has permanent storage with a cryptographic receipt.
Async version
from pynukez import AsyncNukez
async with AsyncNukez(keypair_path="~/.config/solana/id.json") as client:
request = await client.request_storage(units=1)
transfer = await client.solana_transfer(request.pay_to_address, request.amount_sol)
receipt = await client.confirm_storage(request.pay_req_id, transfer.signature)
# ... same methods as sync, just awaited
First Time? Start Here
1. Get a Solana Wallet
# Install Solana CLI
sh -c "$(curl -sSfL https://release.solana.com/stable/install)"
# Create wallet
solana-keygen new --outfile ~/.config/solana/id.json
2. Get Test Money (Free)
solana config set --url devnet
solana airdrop 2
3. Install PyNukez
pip install pynukez[solana]
4. Store Something
from pynukez import Nukez
client = Nukez(keypair_path="~/.config/solana/id.json")
# Buy storage (costs ~0.001 SOL on devnet)
request = client.request_storage()
transfer = client.solana_transfer(request.pay_to_address, request.amount_sol)
receipt = client.confirm_storage(request.pay_req_id, transfer.signature)
print(f"Your receipt: {receipt.id}") # Save this!
# Create your locker
client.provision_locker(receipt.id)
# Store a file
urls = client.create_file(receipt.id, "my_file.txt")
client.upload_bytes(urls.upload_url, b"My agent's data")
# Read it back
data = client.download_bytes(urls.download_url)
print(data) # b"My agent's data"
Quick Reference
| What you want | Code |
|---|---|
| Buy storage | request = client.request_storage(units=1) |
| Pay (Solana) | transfer = client.solana_transfer(request.pay_to_address, request.amount_sol) |
| Pay (EVM/Monad) | transfer = client.evm_transfer(request.pay_to_address, request.amount_raw, pay_asset=request.pay_asset, token_address=request.token_address, network=request.network) |
| Get receipt | receipt = client.confirm_storage(request.pay_req_id, transfer.signature) |
| Setup locker | client.provision_locker(receipt.id) |
| Store bytes | urls = client.create_file(receipt.id, "file.txt") then client.upload_bytes(urls.upload_url, data) |
| Store file | client.upload_file_path(receipt.id, "/path/to/file.pdf") |
| Batch upload | client.bulk_upload_paths(receipt.id, [{"filepath": "a.pdf"}, {"filepath": "b.txt"}]) |
| Store directory | client.upload_directory(receipt.id, "/path/to/dir", pattern="*.pdf", recursive=True) |
| Confirm hash | client.confirm_file(receipt.id, "file.txt", confirm_url=urls.confirm_url) |
| Get data | data = client.download_bytes(urls.download_url) |
| List files | files = client.list_files(receipt.id) |
| Delete file | client.delete_file(receipt.id, "file.txt") |
| Verify | result = client.verify_storage(receipt.id) |
| Attest | att = client.attest(receipt.id) |
| Merkle proof | proof = client.get_merkle_proof(receipt.id, "file.txt") |
| Delegate | client.add_operator(receipt.id, operator_pubkey) |
| Viewer link | client.get_owner_viewer_url(receipt.id) |
Sandboxed App Uploads
If your agent runs in a proxied app sandbox (for example, /mnt/data path restrictions), path uploads can fail even when locker auth is valid.
Use the sandbox ingest flow instead:
job = client.sandbox_create_ingest_job(
receipt_id=receipt.id,
files=[{"filename": "image.png", "content_type": "image/png"}],
)
client.sandbox_append_ingest_part(
receipt_id=receipt.id,
job_id=job["job_id"],
file_id=job["files"][0]["file_id"],
part_no=0,
payload_b64="<chunk-0-base64>",
is_last=True,
)
result = client.sandbox_complete_ingest_job(
receipt_id=receipt.id,
job_id=job["job_id"],
)
Convenience helpers are available:
client.sandbox_upload_bytes(...)client.sandbox_upload_base64(...)client.sandbox_upload_file_path(...)
Important: if a valid receipt_id already exists, reuse it. Do not purchase storage again unless explicitly requested.
Important
Save your receipt.id — you need it for everything.
# First time
receipt = client.confirm_storage(...)
print(receipt.id) # Save this string somewhere!
# Later — fresh process, reconstructed client:
client.bind_receipt(receipt) # or: bind_receipt(receipt_id=..., owner_identity=...)
files = client.list_files(receipt.id)
confirm_storage() primes per-receipt state automatically in the same
process. Across kernel restarts, subprocesses, or receipts loaded from
disk/DB, call bind_receipt(receipt) before owner-only ops
(add_operator, remove_operator) — on dual-key clients, the SDK
refuses to guess which signer to use and raises ReceiptStateNotBoundError
instead.
Going to Production
Change one line:
# Devnet (testing)
client = Nukez(keypair_path="~/.config/solana/id.json", network="devnet")
# Mainnet (production)
client = Nukez(keypair_path="~/.config/solana/id.json", network="mainnet-beta")
Common Issues
| Problem | Fix |
|---|---|
| "Transaction not found" | Wait 3 seconds and retry confirm_storage() |
| "Insufficient funds" | Run solana airdrop 2 (devnet only) |
| "URL expired" | Call client.get_file_urls(receipt_id, filename) for fresh URLs |
| "File not found" | Check client.list_files(receipt_id) to see what exists |
ReceiptStateNotBoundError |
Call client.bind_receipt(receipt) before the op (cross-session / fresh-client flows) |
AuthenticationError: Envelope sig_alg '...' incompatible with ... network |
Dual-key client picked wrong signer — call client.bind_receipt(receipt) first |
Links
- Full SDK Reference — Every method, type, and error documented
- Examples — Working code you can copy
- PyPI — Published releases
- GitHub — Source code, issues, releases
- Contributing — Dev setup and PR workflow
License
MIT
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file pynukez-3.6.1.tar.gz.
File metadata
- Download URL: pynukez-3.6.1.tar.gz
- Upload date:
- Size: 127.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
816decd3e0410c7ace270c7e35e26a64b0bf197b7f9262f347d9ce4a50b4ceed
|
|
| MD5 |
b8584f75fcaf5264f8a076d6cbb6950b
|
|
| BLAKE2b-256 |
7ad793d8afb28e0fb981342de3684f924cade6878ff785059e233e804348c45a
|
Provenance
The following attestation bundles were made for pynukez-3.6.1.tar.gz:
Publisher:
publish.yml on ZlaylowZ/pynukez
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
pynukez-3.6.1.tar.gz -
Subject digest:
816decd3e0410c7ace270c7e35e26a64b0bf197b7f9262f347d9ce4a50b4ceed - Sigstore transparency entry: 1301407372
- Sigstore integration time:
-
Permalink:
ZlaylowZ/pynukez@fa44ff990d0abf809f72c0cc432102be5d04a96b -
Branch / Tag:
refs/tags/v3.6.1 - Owner: https://github.com/ZlaylowZ
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@fa44ff990d0abf809f72c0cc432102be5d04a96b -
Trigger Event:
release
-
Statement type:
File details
Details for the file pynukez-3.6.1-py3-none-any.whl.
File metadata
- Download URL: pynukez-3.6.1-py3-none-any.whl
- Upload date:
- Size: 110.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
aa5bd5c365bfed7c01302fd6588200e853a9e2098ec8f012eb3b2111d200dd63
|
|
| MD5 |
56a09255a0880fef09695028bea646de
|
|
| BLAKE2b-256 |
a8dd7da894f1b1b89b29fec8255131cf0579c238d85d328323d1f1a2074bc594
|
Provenance
The following attestation bundles were made for pynukez-3.6.1-py3-none-any.whl:
Publisher:
publish.yml on ZlaylowZ/pynukez
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
pynukez-3.6.1-py3-none-any.whl -
Subject digest:
aa5bd5c365bfed7c01302fd6588200e853a9e2098ec8f012eb3b2111d200dd63 - Sigstore transparency entry: 1301407467
- Sigstore integration time:
-
Permalink:
ZlaylowZ/pynukez@fa44ff990d0abf809f72c0cc432102be5d04a96b -
Branch / Tag:
refs/tags/v3.6.1 - Owner: https://github.com/ZlaylowZ
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@fa44ff990d0abf809f72c0cc432102be5d04a96b -
Trigger Event:
release
-
Statement type: