Skip to main content

MCP server exposing Satsignal tamper-evident anchoring as agent-callable tools.

Project description

satsignal-mcp

MCP server exposing Satsignal tamper-evident anchoring as agent-callable tools.

Any MCP-compatible client (Claude Desktop, Claude Code, agent frameworks that speak MCP over stdio) can call Satsignal directly — no custom SDK required.

What it does

Each anchor call computes a sha256 of the input client-side and sends only the hash to proof.satsignal.cloud. The file/text/JSON bytes never leave the calling machine. The server records the hash on the BSV blockchain and returns a receipt the agent can save or pass on.

Tools

Tool Auth What it does
anchor_file yes sha256 a local file, anchor the digest
anchor_text yes sha256 a UTF-8 string, anchor the digest
anchor_json yes canonicalize JSON (sorted keys, compact, UTF-8), sha256, anchor
lookup_hash no check if a sha256 is on-chain
verify_bundle no open a local .mbnt and chain-confirm via lookup_hash

anchor_* tools accept dry_run: true to preview the sha256 without broadcasting. The Satsignal API itself does not honor dry_run — the flag lives in this MCP layer and short-circuits before any network call.

Configuration

Env var Required Default
SATSIGNAL_API_KEY for anchoring
SATSIGNAL_API_BASE no https://proof.satsignal.cloud
SATSIGNAL_MATTER no inbox

Get an API key at https://proof.satsignal.cloud.

Install

pip install satsignal-mcp

Claude Desktop config

Add this to claude_desktop_config.json:

{
  "mcpServers": {
    "satsignal": {
      "command": "satsignal-mcp",
      "env": {
        "SATSIGNAL_API_KEY": "sk_...",
        "SATSIGNAL_MATTER": "case-123"
      }
    }
  }
}

Verification model

Each anchor returns a bundle_id, txid, and receipt_url. The proof is independent of Satsignal: anyone can fetch the bundle, verify the on-chain transaction directly against BSV, and check the sha256 matches. satsignal-cli performs the full cryptographic + chain verification; verify_bundle in this MCP server does a faster chain-confirm only (matches the bundle's claimed txid against what the public /lookup_hash index reports for that sha).

Security notes

  • The label, filename, and matter_slug fields you pass are written into the receipt and rendered on the public verifier page. They are also attacker-controllable from any agent calling this server — downstream code that reads these fields should treat them as untrusted text (HTML-escape, never embed in LLM context without an isolation boundary).
  • The API key is sent as Authorization: Bearer … over HTTPS and is never logged or returned in tool output.

License

MIT.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

satsignal_mcp-0.1.0.tar.gz (14.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

satsignal_mcp-0.1.0-py3-none-any.whl (11.4 kB view details)

Uploaded Python 3

File details

Details for the file satsignal_mcp-0.1.0.tar.gz.

File metadata

  • Download URL: satsignal_mcp-0.1.0.tar.gz
  • Upload date:
  • Size: 14.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for satsignal_mcp-0.1.0.tar.gz
Algorithm Hash digest
SHA256 b600d373aa9d8bc06da0d7094c92ee9c2d4ee66f6ddc9785fca0f1d9bb79070f
MD5 5b0d256b6cc6023b28bf247368c089a6
BLAKE2b-256 f46c5c7dc7d6029c939120c2584c1fb53cfcfa3bb7770eef6bfbf207917ff3d8

See more details on using hashes here.

File details

Details for the file satsignal_mcp-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: satsignal_mcp-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 11.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for satsignal_mcp-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 9b3e9b7863391d536933863501a5d924ea97f4b4805091c1aa174710f9fee837
MD5 28d987ff215eccf1491ae46f85202959
BLAKE2b-256 f4d2e5a8d8fe060452f7b6cd97566a0d1962ca826c74c64db96717cd3f2e05e5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page