Skip to main content

RCF Ghost Shield — Active Protection Framework (Python Edition)

Project description

RCF Ghost Shield — Python Edition 🛡️🐍

The official Python Command Line Interface for the RCF (Restricted Correlation Framework) Protocol v2.0.6 "Ghost Protocol".

RCF is an author-defined licensing protocol designed to protect intellectual property in the age of automated extraction and AI/ML mass replication. It creates a clear legal and technical boundary between Visibility and Usage Rights using cryptographic integrity chains.

Installation

Install via PyPI:

pip install rcf-cli

Features

  • Ghost Shield Protection: Active enforcement of RCF-PL v2.0.6 standards across your codebase.
  • Project Initialization: Instantly generate NOTICE.md and .rcfignore files to protect your project.
  • Automated Scanning: Quickly scan projects for RCF compliance and extract Ghost Markers.
  • Header Validation: Ensure files have the required NOTICE: This file is protected under RCF-PL v2.0.6 header.
  • RCF-Audit v2.0.6: Generate cryptographically signed compliance reports for enterprise auditing.
  • Integrity Chains: Compare current file hashes and Ghost Markers against an audit report to detect unauthorized modifications, tampering, or "Void Shell" imitations.

CLI Usage

1. Initialize RCF Ghost Shield in your project

Run this in your project's root directory to generate the legal notice:

rcf-ghost-shield init --project "My awesome app" --author "Aladdin Aliyev"

2. Scan your project

# Scan the current directory
rcf-ghost-shield .

# Output scan results as JSON
rcf-ghost-shield . --format json

# Print summary only
rcf-ghost-shield . --summary

3. Generate an RCF-Audit Report (v2.0.6)

# Provide license key via flag
rcf-ghost-shield audit . --license-key RCF-AUDIT-XXXX-XXXX

# Or use environment variable
export RCF_LICENSE_KEY=RCF-AUDIT-XXXX-XXXX
rcf-ghost-shield audit .

4. Verify Project Integrity

Compare current files with the latest audit report:

rcf-ghost-shield verify .

# Show summary only
rcf-ghost-shield verify . --summary

Markers Reference

RCF uses semantic markers to define protection levels. Place these inside code comments:

  • [RCF:PUBLIC] — Architecture and public concepts. Safe to discuss.
  • [RCF:PROTECTED] — Core methodology. Visible but not replicable.
  • [RCF:RESTRICTED] — Highly sensitive implementation. Minimal rights.
  • [RCF:GHOST:HASH]New in v2.0.6: Cryptographic marker for active integrity verification.

Example header for protected files:

# NOTICE: This file is protected under RCF-PL v2.0.6
# [RCF:PROTECTED]
# [RCF:GHOST:6A...F3]

Documentation

For full specification and legal framework details, visit the official site: aliyev.site/rcf

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

rcf_cli-2.0.6.tar.gz (14.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

rcf_cli-2.0.6-py3-none-any.whl (13.9 kB view details)

Uploaded Python 3

File details

Details for the file rcf_cli-2.0.6.tar.gz.

File metadata

  • Download URL: rcf_cli-2.0.6.tar.gz
  • Upload date:
  • Size: 14.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for rcf_cli-2.0.6.tar.gz
Algorithm Hash digest
SHA256 5e5c96a59340394d677080f27e5ef0a586b1ec84c9ec6dcb960367b764bc4896
MD5 2692a99a44e2ace71fd4696e6ea4d651
BLAKE2b-256 c1ccc20a4e1a61b54f307008fe8cb8c575e8f908c0645d77817c05c4c425e220

See more details on using hashes here.

File details

Details for the file rcf_cli-2.0.6-py3-none-any.whl.

File metadata

  • Download URL: rcf_cli-2.0.6-py3-none-any.whl
  • Upload date:
  • Size: 13.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for rcf_cli-2.0.6-py3-none-any.whl
Algorithm Hash digest
SHA256 dbdea9dc09166e844e451b5a769bab4245cf357db26b6dc090a679b4318aa2bc
MD5 c33e2d554c552c1f2222a91e6db81bd4
BLAKE2b-256 1958b378e842ff868fd9bdc83a377942d721f15febd1bd1144a00290d8fd0334

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page