Skip to main content

Identity and trust tools for AI agents — MCP server

Project description

Synpareia Trust Toolkit

Identity and trust tools for AI agents. One install. Zero friction.

Your agent gets a cryptographic identity, tools to verify other agents, and a tamper-evident interaction log — all working locally. Connect to the synpareia network for reputation, discovery, and selective disclosure.

What You Get

Day one, no network needed:

  • Cryptographic identity — your agent gets a DID and Ed25519 keypair, persistent across sessions
  • Signing and verification — prove authorship, verify claims from other agents
  • Verified conversations — tamper-evident interaction records that both parties contribute to
  • Sealed commitments — prove your assessment was made before seeing the other party's

With the synpareia network:

  • Discovery — find trustworthy agents by capability, reputation, or criteria
  • Reputation — build and check track records that persist across interactions
  • Selective disclosure — control exactly what others see about your agent

Install

Claude Code / Claude Desktop

Add to your MCP configuration:

{
  "mcpServers": {
    "synpareia": {
      "command": "uvx",
      "args": ["synpareia-trust-mcp"]
    }
  }
}

Any MCP-compatible agent

pip install synpareia-trust-mcp
synpareia-trust-mcp

Tools

Tool What it does Offline?
get_my_identity Your DID, public key, and profile Yes
sign_content Sign content with your private key Yes
verify_signature Verify another agent's signed content Yes
verify_identity Confirm a DID matches a public key Yes
check_agent_trust Look up an agent's reputation No
seal_commitment Seal an assessment before seeing others' Yes
reveal_commitment Prove your commitment matches the seal Yes
start_conversation Begin a verified interaction record Yes
add_to_conversation Record a message or event Yes
end_conversation Close and optionally rate Yes
get_conversation_proof Export portable, verifiable proof Yes
list_conversations List all active conversations Yes

11 of 12 tools work fully offline. No network? No problem.

Network-only discovery tools (search_agents, get_agent_profile) ship in v0.2.

How It Works

The Trust Toolkit is built on synpareia — cryptographic primitives for AI agent identity. Your agent gets an Ed25519 keypair and a DID (Decentralized Identifier). Every signed statement is verifiable. Every conversation is hash-linked and tamper-evident.

Identity is local. Derived from your cryptographic keys, not from a server. Works offline, portable across platforms.

Trust builds over time. Each verified conversation adds to your agent's reputation. The more agents that participate, the more meaningful reputation becomes.

Privacy by default. Selective disclosure means your agent controls exactly what's visible, and to whom.

Example Scenarios

Verifying a counterparty

Your agent is about to delegate a task to another agent. First, check trust:

-> check_agent_trust("did:synpareia:a1b2c3...")

Reputation: 0.92 | Verified conversations: 47 | Member since: 2026-03
Recent: 12 positive ratings, 1 neutral, 0 negative

Making a provably independent assessment

Two agents need to rate a proposal independently:

-> seal_commitment("Rating: 4/5 -- strong technical approach, weak go-to-market")

Sealed. commitment_hash: 7f3a...  nonce_b64: cH/iD5Pm...
Share ONLY the hash. Keep the nonce secret until reveal.

[... other agent reveals their rating ...]

-> reveal_commitment("7f3a...", "Rating: 4/5 -- strong technical approach, weak go-to-market", "cH/iD5Pm...")

Verified: content matches the sealed commitment.
The assessment was committed before being revealed.

Recording an important interaction

-> start_conversation("Task delegation negotiation with Agent Y")

Recording. Conversation ID: conv_x7y8z9

[... interaction happens, add_to_conversation for each exchange ...]

-> end_conversation("conv_x7y8z9", rating=4, notes="Delivered on time, good quality")

Conversation recorded. 12 blocks, signed and hash-linked.

-> get_conversation_proof("conv_x7y8z9")

Exported: 4.2KB JSON, independently verifiable with synpareia.verify_export()

Configuration

Environment variables (all optional):

Variable Default Description
SYNPAREIA_DATA_DIR ~/.synpareia Where to store profile and conversations
SYNPAREIA_DISPLAY_NAME (none) Human-readable name for your agent
SYNPAREIA_NETWORK_URL (none) Synpareia network API endpoint
SYNPAREIA_AUTO_REGISTER true Register profile on network automatically

Built on

  • synpareia — cryptographic primitives (Ed25519, SHA-256, hash-linked chains)
  • MCP — Model Context Protocol for AI tool integration

License

Apache 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

synpareia_trust_mcp-0.1.0.tar.gz (88.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

synpareia_trust_mcp-0.1.0-py3-none-any.whl (15.6 kB view details)

Uploaded Python 3

File details

Details for the file synpareia_trust_mcp-0.1.0.tar.gz.

File metadata

  • Download URL: synpareia_trust_mcp-0.1.0.tar.gz
  • Upload date:
  • Size: 88.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for synpareia_trust_mcp-0.1.0.tar.gz
Algorithm Hash digest
SHA256 cb7397b46920b085becf0edad183d1f7494ac06dec1b80426698651f9717eaf7
MD5 9ae5b4a46d7f63c95cad2dae43f2f2f1
BLAKE2b-256 c0df2db0f969c71ec7028d6de27a8bbeb6d8be0bb1841f436b6bb47f3363e67a

See more details on using hashes here.

Provenance

The following attestation bundles were made for synpareia_trust_mcp-0.1.0.tar.gz:

Publisher: publish.yml on synpareia/trust-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file synpareia_trust_mcp-0.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for synpareia_trust_mcp-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b5654fef6f03f4cfe8d56dcfa4f9bf0cf72f5eb5e319acdd7fd2ce9124b5b715
MD5 ac37a340317408c6faa74b3df4b52389
BLAKE2b-256 2eba2d0e62a72bd4bced3e959e8f044135b9bcbbecd34d707644027b5d267f30

See more details on using hashes here.

Provenance

The following attestation bundles were made for synpareia_trust_mcp-0.1.0-py3-none-any.whl:

Publisher: publish.yml on synpareia/trust-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page