@agentcred-ai/sdk 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/LICENSE ADDED
@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2025 AgentCred Contributors
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
package/dist/index.cjs ADDED
@@ -0,0 +1,262 @@
1
+ "use strict";
2
+ var __create = Object.create;
3
+ var __defProp = Object.defineProperty;
4
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
+ var __getOwnPropNames = Object.getOwnPropertyNames;
6
+ var __getProtoOf = Object.getPrototypeOf;
7
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
8
+ var __export = (target, all) => {
9
+ for (var name in all)
10
+ __defProp(target, name, { get: all[name], enumerable: true });
11
+ };
12
+ var __copyProps = (to, from, except, desc) => {
13
+ if (from && typeof from === "object" || typeof from === "function") {
14
+ for (let key of __getOwnPropNames(from))
15
+ if (!__hasOwnProp.call(to, key) && key !== except)
16
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
17
+ }
18
+ return to;
19
+ };
20
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
21
+ // If the importer is in node compatibility mode or this is not an ESM
22
+ // file that has been converted to a CommonJS file using a Babel-
23
+ // compatible transform (i.e. "__esModule" has not been set), then set
24
+ // "default" to the CommonJS "module.exports" for node compatibility.
25
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
26
+ mod
27
+ ));
28
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
29
+
30
+ // src/index.ts
31
+ var index_exports = {};
32
+ __export(index_exports, {
33
+ FileSystemKeyStorage: () => FileSystemKeyStorage,
34
+ MemoryKeyStorage: () => MemoryKeyStorage,
35
+ createDefaultStorage: () => createDefaultStorage,
36
+ createIdentity: () => createIdentity,
37
+ loadIdentity: () => loadIdentity,
38
+ resolvePublicKey: () => resolvePublicKey,
39
+ sign: () => sign,
40
+ verify: () => verify,
41
+ verifyOffline: () => verifyOffline,
42
+ version: () => version
43
+ });
44
+ module.exports = __toCommonJS(index_exports);
45
+
46
+ // src/storage.ts
47
+ var fs = __toESM(require("fs/promises"), 1);
48
+ var path = __toESM(require("path"), 1);
49
+ var os = __toESM(require("os"), 1);
50
+ var MemoryKeyStorage = class {
51
+ keys = /* @__PURE__ */ new Map();
52
+ async save(username, privateKey) {
53
+ this.keys.set(username, privateKey);
54
+ }
55
+ async load(username) {
56
+ return this.keys.get(username) ?? null;
57
+ }
58
+ async list() {
59
+ return Array.from(this.keys.keys());
60
+ }
61
+ };
62
+ var FileSystemKeyStorage = class {
63
+ keyDir;
64
+ constructor(keyDir) {
65
+ this.keyDir = keyDir ?? path.join(os.homedir(), ".agentcred", "keys");
66
+ }
67
+ async save(username, privateKey) {
68
+ await fs.mkdir(this.keyDir, { recursive: true });
69
+ const keyPath = path.join(this.keyDir, `${username}.jwk`);
70
+ await fs.writeFile(keyPath, JSON.stringify(privateKey, null, 2));
71
+ }
72
+ async load(username) {
73
+ try {
74
+ const keyPath = path.join(this.keyDir, `${username}.jwk`);
75
+ const data = await fs.readFile(keyPath, "utf-8");
76
+ return JSON.parse(data);
77
+ } catch {
78
+ return null;
79
+ }
80
+ }
81
+ async list() {
82
+ try {
83
+ const files = await fs.readdir(this.keyDir);
84
+ return files.filter((f) => f.endsWith(".jwk")).map((f) => f.replace(".jwk", ""));
85
+ } catch {
86
+ return [];
87
+ }
88
+ }
89
+ };
90
+ function createDefaultStorage() {
91
+ if (typeof window !== "undefined") {
92
+ return new MemoryKeyStorage();
93
+ }
94
+ return new FileSystemKeyStorage();
95
+ }
96
+
97
+ // src/identity.ts
98
+ var import_jose = require("jose");
99
+ var import_crypto = require("crypto");
100
+ async function createIdentity(githubToken, config) {
101
+ const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
102
+ const storage = config?.storage ?? createDefaultStorage();
103
+ const response = await fetch("https://api.github.com/user", {
104
+ headers: { Authorization: `Bearer ${githubToken}` }
105
+ });
106
+ if (!response.ok) throw new Error("GitHub authentication failed");
107
+ const profile = await response.json();
108
+ const { publicKey, privateKey } = await (0, import_jose.generateKeyPair)("EdDSA", { extractable: true });
109
+ const publicJWK = await (0, import_jose.exportJWK)(publicKey);
110
+ const privateJWK = await (0, import_jose.exportJWK)(privateKey);
111
+ const fingerprint = (0, import_crypto.createHash)("sha256").update(JSON.stringify(publicJWK)).digest("hex");
112
+ const registerResponse = await fetch(`${apiUrl}/v1/keys`, {
113
+ method: "POST",
114
+ headers: {
115
+ "Content-Type": "application/json",
116
+ "Authorization": `Bearer ${githubToken}`
117
+ },
118
+ body: JSON.stringify({ public_key: publicJWK })
119
+ });
120
+ if (!registerResponse.ok) throw new Error("Key registration failed");
121
+ const registration = await registerResponse.json();
122
+ await storage.save(profile.login, privateJWK);
123
+ return {
124
+ github: {
125
+ username: profile.login,
126
+ id: profile.id,
127
+ avatarUrl: profile.avatar_url
128
+ },
129
+ publicKey: publicJWK,
130
+ fingerprint,
131
+ registeredAt: registration.registered_at
132
+ };
133
+ }
134
+ async function loadIdentity(githubUsername, config) {
135
+ const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
136
+ const storage = config?.storage ?? createDefaultStorage();
137
+ const privateJWK = await storage.load(githubUsername);
138
+ if (!privateJWK) return null;
139
+ const publicJWK = await resolvePublicKey(githubUsername, config);
140
+ if (!publicJWK) return null;
141
+ const privateKey = await (0, import_jose.importJWK)(privateJWK, "EdDSA");
142
+ const fingerprint = (0, import_crypto.createHash)("sha256").update(JSON.stringify(publicJWK)).digest("hex");
143
+ return {
144
+ identity: {
145
+ github: {
146
+ username: githubUsername,
147
+ id: 0,
148
+ avatarUrl: ""
149
+ },
150
+ publicKey: publicJWK,
151
+ fingerprint,
152
+ registeredAt: (/* @__PURE__ */ new Date()).toISOString()
153
+ },
154
+ privateKey
155
+ };
156
+ }
157
+ async function resolvePublicKey(githubUsername, config) {
158
+ const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
159
+ try {
160
+ const response = await fetch(`${apiUrl}/v1/keys/${githubUsername}`);
161
+ if (!response.ok) return null;
162
+ const data = await response.json();
163
+ return data.public_key;
164
+ } catch {
165
+ return null;
166
+ }
167
+ }
168
+
169
+ // src/sign.ts
170
+ var import_jose2 = require("jose");
171
+ var import_crypto2 = require("crypto");
172
+ async function sign(content, identity, options) {
173
+ const agent = options?.agent ?? "default";
174
+ const contentType = options?.contentType ?? "text/plain";
175
+ const contentHash = (0, import_crypto2.createHash)("sha256").update(content).digest("hex");
176
+ const payload = {
177
+ iss: `${identity.github}@agentcred`,
178
+ sub: agent,
179
+ iat: Math.floor(Date.now() / 1e3),
180
+ content_hash: `sha256:${contentHash}`,
181
+ content_type: contentType,
182
+ nonce: (0, import_crypto2.randomUUID)()
183
+ };
184
+ const jws = await new import_jose2.CompactSign(
185
+ new TextEncoder().encode(JSON.stringify(payload))
186
+ ).setProtectedHeader({
187
+ alg: "EdDSA",
188
+ typ: "agentcred+jwt",
189
+ kid: `${identity.github}@agentcred`
190
+ }).sign(identity.privateKey);
191
+ return {
192
+ agentcred: {
193
+ v: "1.0",
194
+ jws,
195
+ github: identity.github,
196
+ agent
197
+ },
198
+ content
199
+ };
200
+ }
201
+
202
+ // src/verify.ts
203
+ var import_jose3 = require("jose");
204
+ var import_crypto3 = require("crypto");
205
+ async function verify(envelope, config) {
206
+ try {
207
+ const { github } = envelope.agentcred;
208
+ const publicJWK = await resolvePublicKey(github, config);
209
+ if (!publicJWK) {
210
+ return { verified: false, error: "Public key not found" };
211
+ }
212
+ const publicKey = await (0, import_jose3.importJWK)(publicJWK, "EdDSA");
213
+ return await verifyOffline(envelope, publicKey);
214
+ } catch (error) {
215
+ return { verified: false, error: String(error) };
216
+ }
217
+ }
218
+ async function verifyOffline(envelope, publicKey) {
219
+ try {
220
+ const { payload } = await (0, import_jose3.compactVerify)(envelope.agentcred.jws, publicKey);
221
+ const claims = JSON.parse(new TextDecoder().decode(payload));
222
+ const actualHash = (0, import_crypto3.createHash)("sha256").update(envelope.content).digest("hex");
223
+ const expectedHash = claims.content_hash.replace("sha256:", "");
224
+ if (actualHash !== expectedHash) {
225
+ return { verified: false, error: "Content hash mismatch" };
226
+ }
227
+ const now = Math.floor(Date.now() / 1e3);
228
+ const timeDiff = Math.abs(now - claims.iat);
229
+ if (timeDiff > 86400) {
230
+ return { verified: false, error: "Timestamp outside valid window" };
231
+ }
232
+ return {
233
+ verified: true,
234
+ github: {
235
+ username: envelope.agentcred.github,
236
+ id: 0,
237
+ avatarUrl: ""
238
+ },
239
+ agent: claims.sub,
240
+ signedAt: new Date(claims.iat * 1e3).toISOString()
241
+ };
242
+ } catch (error) {
243
+ return { verified: false, error: String(error) };
244
+ }
245
+ }
246
+
247
+ // src/index.ts
248
+ var version = "0.0.1";
249
+ // Annotate the CommonJS export names for ESM import in node:
250
+ 0 && (module.exports = {
251
+ FileSystemKeyStorage,
252
+ MemoryKeyStorage,
253
+ createDefaultStorage,
254
+ createIdentity,
255
+ loadIdentity,
256
+ resolvePublicKey,
257
+ sign,
258
+ verify,
259
+ verifyOffline,
260
+ version
261
+ });
262
+ //# sourceMappingURL=index.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/index.ts","../src/storage.ts","../src/identity.ts","../src/sign.ts","../src/verify.ts"],"sourcesContent":["export const version = '0.0.1'\n\nexport * from './types.js'\nexport { MemoryKeyStorage, FileSystemKeyStorage, createDefaultStorage } from './storage.js'\nexport { createIdentity, loadIdentity, resolvePublicKey } from './identity.js'\nexport { sign } from './sign.js'\nexport { verify, verifyOffline } from './verify.js'\n","import { KeyStorage } from './types.js'\nimport * as fs from 'fs/promises'\nimport * as path from 'path'\nimport * as os from 'os'\n\nexport class MemoryKeyStorage implements KeyStorage {\n private keys = new Map<string, JsonWebKey>()\n \n async save(username: string, privateKey: JsonWebKey): Promise<void> {\n this.keys.set(username, privateKey)\n }\n \n async load(username: string): Promise<JsonWebKey | null> {\n return this.keys.get(username) ?? null\n }\n \n async list(): Promise<string[]> {\n return Array.from(this.keys.keys())\n }\n}\n\nexport class FileSystemKeyStorage implements KeyStorage {\n private keyDir: string\n \n constructor(keyDir?: string) {\n this.keyDir = keyDir ?? path.join(os.homedir(), '.agentcred', 'keys')\n }\n \n async save(username: string, privateKey: JsonWebKey): Promise<void> {\n await fs.mkdir(this.keyDir, { recursive: true })\n const keyPath = path.join(this.keyDir, `${username}.jwk`)\n await fs.writeFile(keyPath, JSON.stringify(privateKey, null, 2))\n }\n \n async load(username: string): Promise<JsonWebKey | null> {\n try {\n const keyPath = path.join(this.keyDir, `${username}.jwk`)\n const data = await fs.readFile(keyPath, 'utf-8')\n return JSON.parse(data)\n } catch {\n return null\n }\n }\n \n async list(): Promise<string[]> {\n try {\n const files = await fs.readdir(this.keyDir)\n return files.filter(f => f.endsWith('.jwk')).map(f => f.replace('.jwk', ''))\n } catch {\n return []\n }\n }\n}\n\nexport function createDefaultStorage(): KeyStorage {\n if (typeof window !== 'undefined') {\n return new MemoryKeyStorage()\n }\n return new FileSystemKeyStorage()\n}\n","import { generateKeyPair, exportJWK, importJWK } from 'jose'\nimport { AgentCredIdentity, AgentCredConfig, SignIdentity } from './types.js'\nimport { createDefaultStorage } from './storage.js'\nimport { createHash } from 'crypto'\n\nexport async function createIdentity(\n githubToken: string,\n config?: AgentCredConfig\n): Promise<AgentCredIdentity> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n const storage = config?.storage ?? createDefaultStorage()\n \n const response = await fetch('https://api.github.com/user', {\n headers: { Authorization: `Bearer ${githubToken}` }\n })\n if (!response.ok) throw new Error('GitHub authentication failed')\n const profile = await response.json()\n \n const { publicKey, privateKey } = await generateKeyPair('EdDSA', { extractable: true })\n const publicJWK = await exportJWK(publicKey)\n const privateJWK = await exportJWK(privateKey)\n \n const fingerprint = createHash('sha256')\n .update(JSON.stringify(publicJWK))\n .digest('hex')\n \n const registerResponse = await fetch(`${apiUrl}/v1/keys`, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${githubToken}`\n },\n body: JSON.stringify({ public_key: publicJWK })\n })\n if (!registerResponse.ok) throw new Error('Key registration failed')\n const registration = await registerResponse.json()\n \n await storage.save(profile.login, privateJWK)\n \n return {\n github: {\n username: profile.login,\n id: profile.id,\n avatarUrl: profile.avatar_url\n },\n publicKey: publicJWK,\n fingerprint,\n registeredAt: registration.registered_at\n }\n}\n\nexport async function loadIdentity(\n githubUsername: string,\n config?: AgentCredConfig\n): Promise<{ identity: AgentCredIdentity; privateKey: CryptoKey | Uint8Array } | null> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n const storage = config?.storage ?? createDefaultStorage()\n \n const privateJWK = await storage.load(githubUsername)\n if (!privateJWK) return null\n \n const publicJWK = await resolvePublicKey(githubUsername, config)\n if (!publicJWK) return null\n \n const privateKey = await importJWK(privateJWK, 'EdDSA')\n \n const fingerprint = createHash('sha256')\n .update(JSON.stringify(publicJWK))\n .digest('hex')\n \n return {\n identity: {\n github: {\n username: githubUsername,\n id: 0,\n avatarUrl: ''\n },\n publicKey: publicJWK,\n fingerprint,\n registeredAt: new Date().toISOString()\n },\n privateKey\n }\n}\n\nexport async function resolvePublicKey(\n githubUsername: string,\n config?: AgentCredConfig\n): Promise<JsonWebKey | null> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n \n try {\n const response = await fetch(`${apiUrl}/v1/keys/${githubUsername}`)\n if (!response.ok) return null\n const data = await response.json()\n return data.public_key\n } catch {\n return null\n }\n}\n","import { CompactSign } from 'jose'\nimport { createHash, randomUUID } from 'crypto'\nimport { AgentCredEnvelope, SignOptions, SignIdentity } from './types.js'\n\nexport async function sign(\n content: string,\n identity: SignIdentity,\n options?: SignOptions\n): Promise<AgentCredEnvelope> {\n const agent = options?.agent ?? 'default'\n const contentType = options?.contentType ?? 'text/plain'\n \n const contentHash = createHash('sha256').update(content).digest('hex')\n \n const payload = {\n iss: `${identity.github}@agentcred`,\n sub: agent,\n iat: Math.floor(Date.now() / 1000),\n content_hash: `sha256:${contentHash}`,\n content_type: contentType,\n nonce: randomUUID()\n }\n \n const jws = await new CompactSign(\n new TextEncoder().encode(JSON.stringify(payload))\n )\n .setProtectedHeader({\n alg: 'EdDSA',\n typ: 'agentcred+jwt',\n kid: `${identity.github}@agentcred`\n })\n .sign(identity.privateKey)\n \n return {\n agentcred: {\n v: '1.0',\n jws,\n github: identity.github,\n agent\n },\n content\n }\n}\n","import { compactVerify, importJWK } from 'jose'\nimport { createHash } from 'crypto'\nimport { AgentCredEnvelope, VerifyResult, AgentCredConfig } from './types.js'\nimport { resolvePublicKey } from './identity.js'\n\nexport async function verify(\n envelope: AgentCredEnvelope,\n config?: AgentCredConfig\n): Promise<VerifyResult> {\n try {\n const { github } = envelope.agentcred\n \n const publicJWK = await resolvePublicKey(github, config)\n if (!publicJWK) {\n return { verified: false, error: 'Public key not found' }\n }\n \n const publicKey = await importJWK(publicJWK, 'EdDSA')\n return await verifyOffline(envelope, publicKey)\n } catch (error) {\n return { verified: false, error: String(error) }\n }\n}\n\nexport async function verifyOffline(\n envelope: AgentCredEnvelope,\n publicKey: any\n): Promise<VerifyResult> {\n try {\n const { payload } = await compactVerify(envelope.agentcred.jws, publicKey)\n const claims = JSON.parse(new TextDecoder().decode(payload))\n \n const actualHash = createHash('sha256').update(envelope.content).digest('hex')\n const expectedHash = claims.content_hash.replace('sha256:', '')\n if (actualHash !== expectedHash) {\n return { verified: false, error: 'Content hash mismatch' }\n }\n \n const now = Math.floor(Date.now() / 1000)\n const timeDiff = Math.abs(now - claims.iat)\n if (timeDiff > 86400) {\n return { verified: false, error: 'Timestamp outside valid window' }\n }\n \n return {\n verified: true,\n github: {\n username: envelope.agentcred.github,\n id: 0,\n avatarUrl: ''\n },\n agent: claims.sub,\n signedAt: new Date(claims.iat * 1000).toISOString()\n }\n } catch (error) {\n return { verified: false, error: String(error) }\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACCA,SAAoB;AACpB,WAAsB;AACtB,SAAoB;AAEb,IAAM,mBAAN,MAA6C;AAAA,EAC1C,OAAO,oBAAI,IAAwB;AAAA,EAE3C,MAAM,KAAK,UAAkB,YAAuC;AAClE,SAAK,KAAK,IAAI,UAAU,UAAU;AAAA,EACpC;AAAA,EAEA,MAAM,KAAK,UAA8C;AACvD,WAAO,KAAK,KAAK,IAAI,QAAQ,KAAK;AAAA,EACpC;AAAA,EAEA,MAAM,OAA0B;AAC9B,WAAO,MAAM,KAAK,KAAK,KAAK,KAAK,CAAC;AAAA,EACpC;AACF;AAEO,IAAM,uBAAN,MAAiD;AAAA,EAC9C;AAAA,EAER,YAAY,QAAiB;AAC3B,SAAK,SAAS,UAAe,UAAQ,WAAQ,GAAG,cAAc,MAAM;AAAA,EACtE;AAAA,EAEA,MAAM,KAAK,UAAkB,YAAuC;AAClE,UAAS,SAAM,KAAK,QAAQ,EAAE,WAAW,KAAK,CAAC;AAC/C,UAAM,UAAe,UAAK,KAAK,QAAQ,GAAG,QAAQ,MAAM;AACxD,UAAS,aAAU,SAAS,KAAK,UAAU,YAAY,MAAM,CAAC,CAAC;AAAA,EACjE;AAAA,EAEA,MAAM,KAAK,UAA8C;AACvD,QAAI;AACF,YAAM,UAAe,UAAK,KAAK,QAAQ,GAAG,QAAQ,MAAM;AACxD,YAAM,OAAO,MAAS,YAAS,SAAS,OAAO;AAC/C,aAAO,KAAK,MAAM,IAAI;AAAA,IACxB,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,MAAM,OAA0B;AAC9B,QAAI;AACF,YAAM,QAAQ,MAAS,WAAQ,KAAK,MAAM;AAC1C,aAAO,MAAM,OAAO,OAAK,EAAE,SAAS,MAAM,CAAC,EAAE,IAAI,OAAK,EAAE,QAAQ,QAAQ,EAAE,CAAC;AAAA,IAC7E,QAAQ;AACN,aAAO,CAAC;AAAA,IACV;AAAA,EACF;AACF;AAEO,SAAS,uBAAmC;AACjD,MAAI,OAAO,WAAW,aAAa;AACjC,WAAO,IAAI,iBAAiB;AAAA,EAC9B;AACA,SAAO,IAAI,qBAAqB;AAClC;;;AC3DA,kBAAsD;AAGtD,oBAA2B;AAE3B,eAAsB,eACpB,aACA,QAC4B;AAC5B,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAClE,QAAM,UAAU,QAAQ,WAAW,qBAAqB;AAExD,QAAM,WAAW,MAAM,MAAM,+BAA+B;AAAA,IAC1D,SAAS,EAAE,eAAe,UAAU,WAAW,GAAG;AAAA,EACpD,CAAC;AACD,MAAI,CAAC,SAAS,GAAI,OAAM,IAAI,MAAM,8BAA8B;AAChE,QAAM,UAAU,MAAM,SAAS,KAAK;AAEpC,QAAM,EAAE,WAAW,WAAW,IAAI,UAAM,6BAAgB,SAAS,EAAE,aAAa,KAAK,CAAC;AACtF,QAAM,YAAY,UAAM,uBAAU,SAAS;AAC3C,QAAM,aAAa,UAAM,uBAAU,UAAU;AAE7C,QAAM,kBAAc,0BAAW,QAAQ,EACpC,OAAO,KAAK,UAAU,SAAS,CAAC,EAChC,OAAO,KAAK;AAEf,QAAM,mBAAmB,MAAM,MAAM,GAAG,MAAM,YAAY;AAAA,IACxD,QAAQ;AAAA,IACR,SAAS;AAAA,MACP,gBAAgB;AAAA,MAChB,iBAAiB,UAAU,WAAW;AAAA,IACxC;AAAA,IACA,MAAM,KAAK,UAAU,EAAE,YAAY,UAAU,CAAC;AAAA,EAChD,CAAC;AACD,MAAI,CAAC,iBAAiB,GAAI,OAAM,IAAI,MAAM,yBAAyB;AACnE,QAAM,eAAe,MAAM,iBAAiB,KAAK;AAEjD,QAAM,QAAQ,KAAK,QAAQ,OAAO,UAAU;AAE5C,SAAO;AAAA,IACL,QAAQ;AAAA,MACN,UAAU,QAAQ;AAAA,MAClB,IAAI,QAAQ;AAAA,MACZ,WAAW,QAAQ;AAAA,IACrB;AAAA,IACA,WAAW;AAAA,IACX;AAAA,IACA,cAAc,aAAa;AAAA,EAC7B;AACF;AAEA,eAAsB,aACpB,gBACA,QACqF;AACrF,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAClE,QAAM,UAAU,QAAQ,WAAW,qBAAqB;AAExD,QAAM,aAAa,MAAM,QAAQ,KAAK,cAAc;AACpD,MAAI,CAAC,WAAY,QAAO;AAExB,QAAM,YAAY,MAAM,iBAAiB,gBAAgB,MAAM;AAC/D,MAAI,CAAC,UAAW,QAAO;AAEvB,QAAM,aAAa,UAAM,uBAAU,YAAY,OAAO;AAEtD,QAAM,kBAAc,0BAAW,QAAQ,EACpC,OAAO,KAAK,UAAU,SAAS,CAAC,EAChC,OAAO,KAAK;AAEf,SAAO;AAAA,IACL,UAAU;AAAA,MACR,QAAQ;AAAA,QACN,UAAU;AAAA,QACV,IAAI;AAAA,QACJ,WAAW;AAAA,MACb;AAAA,MACA,WAAW;AAAA,MACX;AAAA,MACA,eAAc,oBAAI,KAAK,GAAE,YAAY;AAAA,IACvC;AAAA,IACA;AAAA,EACF;AACF;AAEA,eAAsB,iBACpB,gBACA,QAC4B;AAC5B,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAElE,MAAI;AACF,UAAM,WAAW,MAAM,MAAM,GAAG,MAAM,YAAY,cAAc,EAAE;AAClE,QAAI,CAAC,SAAS,GAAI,QAAO;AACzB,UAAM,OAAO,MAAM,SAAS,KAAK;AACjC,WAAO,KAAK;AAAA,EACd,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACnGA,IAAAA,eAA4B;AAC5B,IAAAC,iBAAuC;AAGvC,eAAsB,KACpB,SACA,UACA,SAC4B;AAC5B,QAAM,QAAQ,SAAS,SAAS;AAChC,QAAM,cAAc,SAAS,eAAe;AAE5C,QAAM,kBAAc,2BAAW,QAAQ,EAAE,OAAO,OAAO,EAAE,OAAO,KAAK;AAErE,QAAM,UAAU;AAAA,IACd,KAAK,GAAG,SAAS,MAAM;AAAA,IACvB,KAAK;AAAA,IACL,KAAK,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AAAA,IACjC,cAAc,UAAU,WAAW;AAAA,IACnC,cAAc;AAAA,IACd,WAAO,2BAAW;AAAA,EACpB;AAEA,QAAM,MAAM,MAAM,IAAI;AAAA,IACpB,IAAI,YAAY,EAAE,OAAO,KAAK,UAAU,OAAO,CAAC;AAAA,EAClD,EACG,mBAAmB;AAAA,IAClB,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK,GAAG,SAAS,MAAM;AAAA,EACzB,CAAC,EACA,KAAK,SAAS,UAAU;AAE3B,SAAO;AAAA,IACL,WAAW;AAAA,MACT,GAAG;AAAA,MACH;AAAA,MACA,QAAQ,SAAS;AAAA,MACjB;AAAA,IACF;AAAA,IACA;AAAA,EACF;AACF;;;AC1CA,IAAAC,eAAyC;AACzC,IAAAC,iBAA2B;AAI3B,eAAsB,OACpB,UACA,QACuB;AACvB,MAAI;AACF,UAAM,EAAE,OAAO,IAAI,SAAS;AAE5B,UAAM,YAAY,MAAM,iBAAiB,QAAQ,MAAM;AACvD,QAAI,CAAC,WAAW;AACd,aAAO,EAAE,UAAU,OAAO,OAAO,uBAAuB;AAAA,IAC1D;AAEA,UAAM,YAAY,UAAM,wBAAU,WAAW,OAAO;AACpD,WAAO,MAAM,cAAc,UAAU,SAAS;AAAA,EAChD,SAAS,OAAO;AACd,WAAO,EAAE,UAAU,OAAO,OAAO,OAAO,KAAK,EAAE;AAAA,EACjD;AACF;AAEA,eAAsB,cACpB,UACA,WACuB;AACvB,MAAI;AACF,UAAM,EAAE,QAAQ,IAAI,UAAM,4BAAc,SAAS,UAAU,KAAK,SAAS;AACzE,UAAM,SAAS,KAAK,MAAM,IAAI,YAAY,EAAE,OAAO,OAAO,CAAC;AAE3D,UAAM,iBAAa,2BAAW,QAAQ,EAAE,OAAO,SAAS,OAAO,EAAE,OAAO,KAAK;AAC7E,UAAM,eAAe,OAAO,aAAa,QAAQ,WAAW,EAAE;AAC9D,QAAI,eAAe,cAAc;AAC/B,aAAO,EAAE,UAAU,OAAO,OAAO,wBAAwB;AAAA,IAC3D;AAEA,UAAM,MAAM,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AACxC,UAAM,WAAW,KAAK,IAAI,MAAM,OAAO,GAAG;AAC1C,QAAI,WAAW,OAAO;AACpB,aAAO,EAAE,UAAU,OAAO,OAAO,iCAAiC;AAAA,IACpE;AAEA,WAAO;AAAA,MACL,UAAU;AAAA,MACV,QAAQ;AAAA,QACN,UAAU,SAAS,UAAU;AAAA,QAC7B,IAAI;AAAA,QACJ,WAAW;AAAA,MACb;AAAA,MACA,OAAO,OAAO;AAAA,MACd,UAAU,IAAI,KAAK,OAAO,MAAM,GAAI,EAAE,YAAY;AAAA,IACpD;AAAA,EACF,SAAS,OAAO;AACd,WAAO,EAAE,UAAU,OAAO,OAAO,OAAO,KAAK,EAAE;AAAA,EACjD;AACF;;;AJzDO,IAAM,UAAU;","names":["import_jose","import_crypto","import_jose","import_crypto"]}
@@ -0,0 +1,80 @@
1
+ import { CryptoKey as CryptoKey$1 } from 'jose';
2
+
3
+ interface AgentCredIdentity {
4
+ github: {
5
+ username: string;
6
+ id: number;
7
+ avatarUrl: string;
8
+ };
9
+ publicKey: JsonWebKey;
10
+ fingerprint: string;
11
+ registeredAt: string;
12
+ }
13
+ interface AgentCredEnvelope {
14
+ agentcred: {
15
+ v: '1.0';
16
+ jws: string;
17
+ github: string;
18
+ agent: string;
19
+ };
20
+ content: string;
21
+ }
22
+ interface SignOptions {
23
+ agent?: string;
24
+ contentType?: string;
25
+ }
26
+ interface VerifyResult {
27
+ verified: boolean;
28
+ github?: {
29
+ username: string;
30
+ id: number;
31
+ avatarUrl: string;
32
+ };
33
+ agent?: string;
34
+ signedAt?: string;
35
+ error?: string;
36
+ }
37
+ interface KeyStorage {
38
+ save(username: string, privateKey: JsonWebKey): Promise<void>;
39
+ load(username: string): Promise<JsonWebKey | null>;
40
+ list(): Promise<string[]>;
41
+ }
42
+ interface AgentCredConfig {
43
+ apiUrl?: string;
44
+ storage?: KeyStorage;
45
+ }
46
+ interface SignIdentity {
47
+ privateKey: CryptoKey$1 | Uint8Array;
48
+ github: string;
49
+ }
50
+
51
+ declare class MemoryKeyStorage implements KeyStorage {
52
+ private keys;
53
+ save(username: string, privateKey: JsonWebKey): Promise<void>;
54
+ load(username: string): Promise<JsonWebKey | null>;
55
+ list(): Promise<string[]>;
56
+ }
57
+ declare class FileSystemKeyStorage implements KeyStorage {
58
+ private keyDir;
59
+ constructor(keyDir?: string);
60
+ save(username: string, privateKey: JsonWebKey): Promise<void>;
61
+ load(username: string): Promise<JsonWebKey | null>;
62
+ list(): Promise<string[]>;
63
+ }
64
+ declare function createDefaultStorage(): KeyStorage;
65
+
66
+ declare function createIdentity(githubToken: string, config?: AgentCredConfig): Promise<AgentCredIdentity>;
67
+ declare function loadIdentity(githubUsername: string, config?: AgentCredConfig): Promise<{
68
+ identity: AgentCredIdentity;
69
+ privateKey: CryptoKey | Uint8Array;
70
+ } | null>;
71
+ declare function resolvePublicKey(githubUsername: string, config?: AgentCredConfig): Promise<JsonWebKey | null>;
72
+
73
+ declare function sign(content: string, identity: SignIdentity, options?: SignOptions): Promise<AgentCredEnvelope>;
74
+
75
+ declare function verify(envelope: AgentCredEnvelope, config?: AgentCredConfig): Promise<VerifyResult>;
76
+ declare function verifyOffline(envelope: AgentCredEnvelope, publicKey: any): Promise<VerifyResult>;
77
+
78
+ declare const version = "0.0.1";
79
+
80
+ export { type AgentCredConfig, type AgentCredEnvelope, type AgentCredIdentity, FileSystemKeyStorage, type KeyStorage, MemoryKeyStorage, type SignIdentity, type SignOptions, type VerifyResult, createDefaultStorage, createIdentity, loadIdentity, resolvePublicKey, sign, verify, verifyOffline, version };
@@ -0,0 +1,80 @@
1
+ import { CryptoKey as CryptoKey$1 } from 'jose';
2
+
3
+ interface AgentCredIdentity {
4
+ github: {
5
+ username: string;
6
+ id: number;
7
+ avatarUrl: string;
8
+ };
9
+ publicKey: JsonWebKey;
10
+ fingerprint: string;
11
+ registeredAt: string;
12
+ }
13
+ interface AgentCredEnvelope {
14
+ agentcred: {
15
+ v: '1.0';
16
+ jws: string;
17
+ github: string;
18
+ agent: string;
19
+ };
20
+ content: string;
21
+ }
22
+ interface SignOptions {
23
+ agent?: string;
24
+ contentType?: string;
25
+ }
26
+ interface VerifyResult {
27
+ verified: boolean;
28
+ github?: {
29
+ username: string;
30
+ id: number;
31
+ avatarUrl: string;
32
+ };
33
+ agent?: string;
34
+ signedAt?: string;
35
+ error?: string;
36
+ }
37
+ interface KeyStorage {
38
+ save(username: string, privateKey: JsonWebKey): Promise<void>;
39
+ load(username: string): Promise<JsonWebKey | null>;
40
+ list(): Promise<string[]>;
41
+ }
42
+ interface AgentCredConfig {
43
+ apiUrl?: string;
44
+ storage?: KeyStorage;
45
+ }
46
+ interface SignIdentity {
47
+ privateKey: CryptoKey$1 | Uint8Array;
48
+ github: string;
49
+ }
50
+
51
+ declare class MemoryKeyStorage implements KeyStorage {
52
+ private keys;
53
+ save(username: string, privateKey: JsonWebKey): Promise<void>;
54
+ load(username: string): Promise<JsonWebKey | null>;
55
+ list(): Promise<string[]>;
56
+ }
57
+ declare class FileSystemKeyStorage implements KeyStorage {
58
+ private keyDir;
59
+ constructor(keyDir?: string);
60
+ save(username: string, privateKey: JsonWebKey): Promise<void>;
61
+ load(username: string): Promise<JsonWebKey | null>;
62
+ list(): Promise<string[]>;
63
+ }
64
+ declare function createDefaultStorage(): KeyStorage;
65
+
66
+ declare function createIdentity(githubToken: string, config?: AgentCredConfig): Promise<AgentCredIdentity>;
67
+ declare function loadIdentity(githubUsername: string, config?: AgentCredConfig): Promise<{
68
+ identity: AgentCredIdentity;
69
+ privateKey: CryptoKey | Uint8Array;
70
+ } | null>;
71
+ declare function resolvePublicKey(githubUsername: string, config?: AgentCredConfig): Promise<JsonWebKey | null>;
72
+
73
+ declare function sign(content: string, identity: SignIdentity, options?: SignOptions): Promise<AgentCredEnvelope>;
74
+
75
+ declare function verify(envelope: AgentCredEnvelope, config?: AgentCredConfig): Promise<VerifyResult>;
76
+ declare function verifyOffline(envelope: AgentCredEnvelope, publicKey: any): Promise<VerifyResult>;
77
+
78
+ declare const version = "0.0.1";
79
+
80
+ export { type AgentCredConfig, type AgentCredEnvelope, type AgentCredIdentity, FileSystemKeyStorage, type KeyStorage, MemoryKeyStorage, type SignIdentity, type SignOptions, type VerifyResult, createDefaultStorage, createIdentity, loadIdentity, resolvePublicKey, sign, verify, verifyOffline, version };
package/dist/index.js ADDED
@@ -0,0 +1,216 @@
1
+ // src/storage.ts
2
+ import * as fs from "fs/promises";
3
+ import * as path from "path";
4
+ import * as os from "os";
5
+ var MemoryKeyStorage = class {
6
+ keys = /* @__PURE__ */ new Map();
7
+ async save(username, privateKey) {
8
+ this.keys.set(username, privateKey);
9
+ }
10
+ async load(username) {
11
+ return this.keys.get(username) ?? null;
12
+ }
13
+ async list() {
14
+ return Array.from(this.keys.keys());
15
+ }
16
+ };
17
+ var FileSystemKeyStorage = class {
18
+ keyDir;
19
+ constructor(keyDir) {
20
+ this.keyDir = keyDir ?? path.join(os.homedir(), ".agentcred", "keys");
21
+ }
22
+ async save(username, privateKey) {
23
+ await fs.mkdir(this.keyDir, { recursive: true });
24
+ const keyPath = path.join(this.keyDir, `${username}.jwk`);
25
+ await fs.writeFile(keyPath, JSON.stringify(privateKey, null, 2));
26
+ }
27
+ async load(username) {
28
+ try {
29
+ const keyPath = path.join(this.keyDir, `${username}.jwk`);
30
+ const data = await fs.readFile(keyPath, "utf-8");
31
+ return JSON.parse(data);
32
+ } catch {
33
+ return null;
34
+ }
35
+ }
36
+ async list() {
37
+ try {
38
+ const files = await fs.readdir(this.keyDir);
39
+ return files.filter((f) => f.endsWith(".jwk")).map((f) => f.replace(".jwk", ""));
40
+ } catch {
41
+ return [];
42
+ }
43
+ }
44
+ };
45
+ function createDefaultStorage() {
46
+ if (typeof window !== "undefined") {
47
+ return new MemoryKeyStorage();
48
+ }
49
+ return new FileSystemKeyStorage();
50
+ }
51
+
52
+ // src/identity.ts
53
+ import { generateKeyPair, exportJWK, importJWK } from "jose";
54
+ import { createHash } from "crypto";
55
+ async function createIdentity(githubToken, config) {
56
+ const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
57
+ const storage = config?.storage ?? createDefaultStorage();
58
+ const response = await fetch("https://api.github.com/user", {
59
+ headers: { Authorization: `Bearer ${githubToken}` }
60
+ });
61
+ if (!response.ok) throw new Error("GitHub authentication failed");
62
+ const profile = await response.json();
63
+ const { publicKey, privateKey } = await generateKeyPair("EdDSA", { extractable: true });
64
+ const publicJWK = await exportJWK(publicKey);
65
+ const privateJWK = await exportJWK(privateKey);
66
+ const fingerprint = createHash("sha256").update(JSON.stringify(publicJWK)).digest("hex");
67
+ const registerResponse = await fetch(`${apiUrl}/v1/keys`, {
68
+ method: "POST",
69
+ headers: {
70
+ "Content-Type": "application/json",
71
+ "Authorization": `Bearer ${githubToken}`
72
+ },
73
+ body: JSON.stringify({ public_key: publicJWK })
74
+ });
75
+ if (!registerResponse.ok) throw new Error("Key registration failed");
76
+ const registration = await registerResponse.json();
77
+ await storage.save(profile.login, privateJWK);
78
+ return {
79
+ github: {
80
+ username: profile.login,
81
+ id: profile.id,
82
+ avatarUrl: profile.avatar_url
83
+ },
84
+ publicKey: publicJWK,
85
+ fingerprint,
86
+ registeredAt: registration.registered_at
87
+ };
88
+ }
89
+ async function loadIdentity(githubUsername, config) {
90
+ const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
91
+ const storage = config?.storage ?? createDefaultStorage();
92
+ const privateJWK = await storage.load(githubUsername);
93
+ if (!privateJWK) return null;
94
+ const publicJWK = await resolvePublicKey(githubUsername, config);
95
+ if (!publicJWK) return null;
96
+ const privateKey = await importJWK(privateJWK, "EdDSA");
97
+ const fingerprint = createHash("sha256").update(JSON.stringify(publicJWK)).digest("hex");
98
+ return {
99
+ identity: {
100
+ github: {
101
+ username: githubUsername,
102
+ id: 0,
103
+ avatarUrl: ""
104
+ },
105
+ publicKey: publicJWK,
106
+ fingerprint,
107
+ registeredAt: (/* @__PURE__ */ new Date()).toISOString()
108
+ },
109
+ privateKey
110
+ };
111
+ }
112
+ async function resolvePublicKey(githubUsername, config) {
113
+ const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? "https://api.agentcred.dev";
114
+ try {
115
+ const response = await fetch(`${apiUrl}/v1/keys/${githubUsername}`);
116
+ if (!response.ok) return null;
117
+ const data = await response.json();
118
+ return data.public_key;
119
+ } catch {
120
+ return null;
121
+ }
122
+ }
123
+
124
+ // src/sign.ts
125
+ import { CompactSign } from "jose";
126
+ import { createHash as createHash2, randomUUID } from "crypto";
127
+ async function sign(content, identity, options) {
128
+ const agent = options?.agent ?? "default";
129
+ const contentType = options?.contentType ?? "text/plain";
130
+ const contentHash = createHash2("sha256").update(content).digest("hex");
131
+ const payload = {
132
+ iss: `${identity.github}@agentcred`,
133
+ sub: agent,
134
+ iat: Math.floor(Date.now() / 1e3),
135
+ content_hash: `sha256:${contentHash}`,
136
+ content_type: contentType,
137
+ nonce: randomUUID()
138
+ };
139
+ const jws = await new CompactSign(
140
+ new TextEncoder().encode(JSON.stringify(payload))
141
+ ).setProtectedHeader({
142
+ alg: "EdDSA",
143
+ typ: "agentcred+jwt",
144
+ kid: `${identity.github}@agentcred`
145
+ }).sign(identity.privateKey);
146
+ return {
147
+ agentcred: {
148
+ v: "1.0",
149
+ jws,
150
+ github: identity.github,
151
+ agent
152
+ },
153
+ content
154
+ };
155
+ }
156
+
157
+ // src/verify.ts
158
+ import { compactVerify, importJWK as importJWK2 } from "jose";
159
+ import { createHash as createHash3 } from "crypto";
160
+ async function verify(envelope, config) {
161
+ try {
162
+ const { github } = envelope.agentcred;
163
+ const publicJWK = await resolvePublicKey(github, config);
164
+ if (!publicJWK) {
165
+ return { verified: false, error: "Public key not found" };
166
+ }
167
+ const publicKey = await importJWK2(publicJWK, "EdDSA");
168
+ return await verifyOffline(envelope, publicKey);
169
+ } catch (error) {
170
+ return { verified: false, error: String(error) };
171
+ }
172
+ }
173
+ async function verifyOffline(envelope, publicKey) {
174
+ try {
175
+ const { payload } = await compactVerify(envelope.agentcred.jws, publicKey);
176
+ const claims = JSON.parse(new TextDecoder().decode(payload));
177
+ const actualHash = createHash3("sha256").update(envelope.content).digest("hex");
178
+ const expectedHash = claims.content_hash.replace("sha256:", "");
179
+ if (actualHash !== expectedHash) {
180
+ return { verified: false, error: "Content hash mismatch" };
181
+ }
182
+ const now = Math.floor(Date.now() / 1e3);
183
+ const timeDiff = Math.abs(now - claims.iat);
184
+ if (timeDiff > 86400) {
185
+ return { verified: false, error: "Timestamp outside valid window" };
186
+ }
187
+ return {
188
+ verified: true,
189
+ github: {
190
+ username: envelope.agentcred.github,
191
+ id: 0,
192
+ avatarUrl: ""
193
+ },
194
+ agent: claims.sub,
195
+ signedAt: new Date(claims.iat * 1e3).toISOString()
196
+ };
197
+ } catch (error) {
198
+ return { verified: false, error: String(error) };
199
+ }
200
+ }
201
+
202
+ // src/index.ts
203
+ var version = "0.0.1";
204
+ export {
205
+ FileSystemKeyStorage,
206
+ MemoryKeyStorage,
207
+ createDefaultStorage,
208
+ createIdentity,
209
+ loadIdentity,
210
+ resolvePublicKey,
211
+ sign,
212
+ verify,
213
+ verifyOffline,
214
+ version
215
+ };
216
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/storage.ts","../src/identity.ts","../src/sign.ts","../src/verify.ts","../src/index.ts"],"sourcesContent":["import { KeyStorage } from './types.js'\nimport * as fs from 'fs/promises'\nimport * as path from 'path'\nimport * as os from 'os'\n\nexport class MemoryKeyStorage implements KeyStorage {\n private keys = new Map<string, JsonWebKey>()\n \n async save(username: string, privateKey: JsonWebKey): Promise<void> {\n this.keys.set(username, privateKey)\n }\n \n async load(username: string): Promise<JsonWebKey | null> {\n return this.keys.get(username) ?? null\n }\n \n async list(): Promise<string[]> {\n return Array.from(this.keys.keys())\n }\n}\n\nexport class FileSystemKeyStorage implements KeyStorage {\n private keyDir: string\n \n constructor(keyDir?: string) {\n this.keyDir = keyDir ?? path.join(os.homedir(), '.agentcred', 'keys')\n }\n \n async save(username: string, privateKey: JsonWebKey): Promise<void> {\n await fs.mkdir(this.keyDir, { recursive: true })\n const keyPath = path.join(this.keyDir, `${username}.jwk`)\n await fs.writeFile(keyPath, JSON.stringify(privateKey, null, 2))\n }\n \n async load(username: string): Promise<JsonWebKey | null> {\n try {\n const keyPath = path.join(this.keyDir, `${username}.jwk`)\n const data = await fs.readFile(keyPath, 'utf-8')\n return JSON.parse(data)\n } catch {\n return null\n }\n }\n \n async list(): Promise<string[]> {\n try {\n const files = await fs.readdir(this.keyDir)\n return files.filter(f => f.endsWith('.jwk')).map(f => f.replace('.jwk', ''))\n } catch {\n return []\n }\n }\n}\n\nexport function createDefaultStorage(): KeyStorage {\n if (typeof window !== 'undefined') {\n return new MemoryKeyStorage()\n }\n return new FileSystemKeyStorage()\n}\n","import { generateKeyPair, exportJWK, importJWK } from 'jose'\nimport { AgentCredIdentity, AgentCredConfig, SignIdentity } from './types.js'\nimport { createDefaultStorage } from './storage.js'\nimport { createHash } from 'crypto'\n\nexport async function createIdentity(\n githubToken: string,\n config?: AgentCredConfig\n): Promise<AgentCredIdentity> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n const storage = config?.storage ?? createDefaultStorage()\n \n const response = await fetch('https://api.github.com/user', {\n headers: { Authorization: `Bearer ${githubToken}` }\n })\n if (!response.ok) throw new Error('GitHub authentication failed')\n const profile = await response.json()\n \n const { publicKey, privateKey } = await generateKeyPair('EdDSA', { extractable: true })\n const publicJWK = await exportJWK(publicKey)\n const privateJWK = await exportJWK(privateKey)\n \n const fingerprint = createHash('sha256')\n .update(JSON.stringify(publicJWK))\n .digest('hex')\n \n const registerResponse = await fetch(`${apiUrl}/v1/keys`, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${githubToken}`\n },\n body: JSON.stringify({ public_key: publicJWK })\n })\n if (!registerResponse.ok) throw new Error('Key registration failed')\n const registration = await registerResponse.json()\n \n await storage.save(profile.login, privateJWK)\n \n return {\n github: {\n username: profile.login,\n id: profile.id,\n avatarUrl: profile.avatar_url\n },\n publicKey: publicJWK,\n fingerprint,\n registeredAt: registration.registered_at\n }\n}\n\nexport async function loadIdentity(\n githubUsername: string,\n config?: AgentCredConfig\n): Promise<{ identity: AgentCredIdentity; privateKey: CryptoKey | Uint8Array } | null> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n const storage = config?.storage ?? createDefaultStorage()\n \n const privateJWK = await storage.load(githubUsername)\n if (!privateJWK) return null\n \n const publicJWK = await resolvePublicKey(githubUsername, config)\n if (!publicJWK) return null\n \n const privateKey = await importJWK(privateJWK, 'EdDSA')\n \n const fingerprint = createHash('sha256')\n .update(JSON.stringify(publicJWK))\n .digest('hex')\n \n return {\n identity: {\n github: {\n username: githubUsername,\n id: 0,\n avatarUrl: ''\n },\n publicKey: publicJWK,\n fingerprint,\n registeredAt: new Date().toISOString()\n },\n privateKey\n }\n}\n\nexport async function resolvePublicKey(\n githubUsername: string,\n config?: AgentCredConfig\n): Promise<JsonWebKey | null> {\n const apiUrl = config?.apiUrl ?? process.env.AGENTCRED_API_URL ?? 'https://api.agentcred.dev'\n \n try {\n const response = await fetch(`${apiUrl}/v1/keys/${githubUsername}`)\n if (!response.ok) return null\n const data = await response.json()\n return data.public_key\n } catch {\n return null\n }\n}\n","import { CompactSign } from 'jose'\nimport { createHash, randomUUID } from 'crypto'\nimport { AgentCredEnvelope, SignOptions, SignIdentity } from './types.js'\n\nexport async function sign(\n content: string,\n identity: SignIdentity,\n options?: SignOptions\n): Promise<AgentCredEnvelope> {\n const agent = options?.agent ?? 'default'\n const contentType = options?.contentType ?? 'text/plain'\n \n const contentHash = createHash('sha256').update(content).digest('hex')\n \n const payload = {\n iss: `${identity.github}@agentcred`,\n sub: agent,\n iat: Math.floor(Date.now() / 1000),\n content_hash: `sha256:${contentHash}`,\n content_type: contentType,\n nonce: randomUUID()\n }\n \n const jws = await new CompactSign(\n new TextEncoder().encode(JSON.stringify(payload))\n )\n .setProtectedHeader({\n alg: 'EdDSA',\n typ: 'agentcred+jwt',\n kid: `${identity.github}@agentcred`\n })\n .sign(identity.privateKey)\n \n return {\n agentcred: {\n v: '1.0',\n jws,\n github: identity.github,\n agent\n },\n content\n }\n}\n","import { compactVerify, importJWK } from 'jose'\nimport { createHash } from 'crypto'\nimport { AgentCredEnvelope, VerifyResult, AgentCredConfig } from './types.js'\nimport { resolvePublicKey } from './identity.js'\n\nexport async function verify(\n envelope: AgentCredEnvelope,\n config?: AgentCredConfig\n): Promise<VerifyResult> {\n try {\n const { github } = envelope.agentcred\n \n const publicJWK = await resolvePublicKey(github, config)\n if (!publicJWK) {\n return { verified: false, error: 'Public key not found' }\n }\n \n const publicKey = await importJWK(publicJWK, 'EdDSA')\n return await verifyOffline(envelope, publicKey)\n } catch (error) {\n return { verified: false, error: String(error) }\n }\n}\n\nexport async function verifyOffline(\n envelope: AgentCredEnvelope,\n publicKey: any\n): Promise<VerifyResult> {\n try {\n const { payload } = await compactVerify(envelope.agentcred.jws, publicKey)\n const claims = JSON.parse(new TextDecoder().decode(payload))\n \n const actualHash = createHash('sha256').update(envelope.content).digest('hex')\n const expectedHash = claims.content_hash.replace('sha256:', '')\n if (actualHash !== expectedHash) {\n return { verified: false, error: 'Content hash mismatch' }\n }\n \n const now = Math.floor(Date.now() / 1000)\n const timeDiff = Math.abs(now - claims.iat)\n if (timeDiff > 86400) {\n return { verified: false, error: 'Timestamp outside valid window' }\n }\n \n return {\n verified: true,\n github: {\n username: envelope.agentcred.github,\n id: 0,\n avatarUrl: ''\n },\n agent: claims.sub,\n signedAt: new Date(claims.iat * 1000).toISOString()\n }\n } catch (error) {\n return { verified: false, error: String(error) }\n }\n}\n","export const version = '0.0.1'\n\nexport * from './types.js'\nexport { MemoryKeyStorage, FileSystemKeyStorage, createDefaultStorage } from './storage.js'\nexport { createIdentity, loadIdentity, resolvePublicKey } from './identity.js'\nexport { sign } from './sign.js'\nexport { verify, verifyOffline } from './verify.js'\n"],"mappings":";AACA,YAAY,QAAQ;AACpB,YAAY,UAAU;AACtB,YAAY,QAAQ;AAEb,IAAM,mBAAN,MAA6C;AAAA,EAC1C,OAAO,oBAAI,IAAwB;AAAA,EAE3C,MAAM,KAAK,UAAkB,YAAuC;AAClE,SAAK,KAAK,IAAI,UAAU,UAAU;AAAA,EACpC;AAAA,EAEA,MAAM,KAAK,UAA8C;AACvD,WAAO,KAAK,KAAK,IAAI,QAAQ,KAAK;AAAA,EACpC;AAAA,EAEA,MAAM,OAA0B;AAC9B,WAAO,MAAM,KAAK,KAAK,KAAK,KAAK,CAAC;AAAA,EACpC;AACF;AAEO,IAAM,uBAAN,MAAiD;AAAA,EAC9C;AAAA,EAER,YAAY,QAAiB;AAC3B,SAAK,SAAS,UAAe,UAAQ,WAAQ,GAAG,cAAc,MAAM;AAAA,EACtE;AAAA,EAEA,MAAM,KAAK,UAAkB,YAAuC;AAClE,UAAS,SAAM,KAAK,QAAQ,EAAE,WAAW,KAAK,CAAC;AAC/C,UAAM,UAAe,UAAK,KAAK,QAAQ,GAAG,QAAQ,MAAM;AACxD,UAAS,aAAU,SAAS,KAAK,UAAU,YAAY,MAAM,CAAC,CAAC;AAAA,EACjE;AAAA,EAEA,MAAM,KAAK,UAA8C;AACvD,QAAI;AACF,YAAM,UAAe,UAAK,KAAK,QAAQ,GAAG,QAAQ,MAAM;AACxD,YAAM,OAAO,MAAS,YAAS,SAAS,OAAO;AAC/C,aAAO,KAAK,MAAM,IAAI;AAAA,IACxB,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,MAAM,OAA0B;AAC9B,QAAI;AACF,YAAM,QAAQ,MAAS,WAAQ,KAAK,MAAM;AAC1C,aAAO,MAAM,OAAO,OAAK,EAAE,SAAS,MAAM,CAAC,EAAE,IAAI,OAAK,EAAE,QAAQ,QAAQ,EAAE,CAAC;AAAA,IAC7E,QAAQ;AACN,aAAO,CAAC;AAAA,IACV;AAAA,EACF;AACF;AAEO,SAAS,uBAAmC;AACjD,MAAI,OAAO,WAAW,aAAa;AACjC,WAAO,IAAI,iBAAiB;AAAA,EAC9B;AACA,SAAO,IAAI,qBAAqB;AAClC;;;AC3DA,SAAS,iBAAiB,WAAW,iBAAiB;AAGtD,SAAS,kBAAkB;AAE3B,eAAsB,eACpB,aACA,QAC4B;AAC5B,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAClE,QAAM,UAAU,QAAQ,WAAW,qBAAqB;AAExD,QAAM,WAAW,MAAM,MAAM,+BAA+B;AAAA,IAC1D,SAAS,EAAE,eAAe,UAAU,WAAW,GAAG;AAAA,EACpD,CAAC;AACD,MAAI,CAAC,SAAS,GAAI,OAAM,IAAI,MAAM,8BAA8B;AAChE,QAAM,UAAU,MAAM,SAAS,KAAK;AAEpC,QAAM,EAAE,WAAW,WAAW,IAAI,MAAM,gBAAgB,SAAS,EAAE,aAAa,KAAK,CAAC;AACtF,QAAM,YAAY,MAAM,UAAU,SAAS;AAC3C,QAAM,aAAa,MAAM,UAAU,UAAU;AAE7C,QAAM,cAAc,WAAW,QAAQ,EACpC,OAAO,KAAK,UAAU,SAAS,CAAC,EAChC,OAAO,KAAK;AAEf,QAAM,mBAAmB,MAAM,MAAM,GAAG,MAAM,YAAY;AAAA,IACxD,QAAQ;AAAA,IACR,SAAS;AAAA,MACP,gBAAgB;AAAA,MAChB,iBAAiB,UAAU,WAAW;AAAA,IACxC;AAAA,IACA,MAAM,KAAK,UAAU,EAAE,YAAY,UAAU,CAAC;AAAA,EAChD,CAAC;AACD,MAAI,CAAC,iBAAiB,GAAI,OAAM,IAAI,MAAM,yBAAyB;AACnE,QAAM,eAAe,MAAM,iBAAiB,KAAK;AAEjD,QAAM,QAAQ,KAAK,QAAQ,OAAO,UAAU;AAE5C,SAAO;AAAA,IACL,QAAQ;AAAA,MACN,UAAU,QAAQ;AAAA,MAClB,IAAI,QAAQ;AAAA,MACZ,WAAW,QAAQ;AAAA,IACrB;AAAA,IACA,WAAW;AAAA,IACX;AAAA,IACA,cAAc,aAAa;AAAA,EAC7B;AACF;AAEA,eAAsB,aACpB,gBACA,QACqF;AACrF,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAClE,QAAM,UAAU,QAAQ,WAAW,qBAAqB;AAExD,QAAM,aAAa,MAAM,QAAQ,KAAK,cAAc;AACpD,MAAI,CAAC,WAAY,QAAO;AAExB,QAAM,YAAY,MAAM,iBAAiB,gBAAgB,MAAM;AAC/D,MAAI,CAAC,UAAW,QAAO;AAEvB,QAAM,aAAa,MAAM,UAAU,YAAY,OAAO;AAEtD,QAAM,cAAc,WAAW,QAAQ,EACpC,OAAO,KAAK,UAAU,SAAS,CAAC,EAChC,OAAO,KAAK;AAEf,SAAO;AAAA,IACL,UAAU;AAAA,MACR,QAAQ;AAAA,QACN,UAAU;AAAA,QACV,IAAI;AAAA,QACJ,WAAW;AAAA,MACb;AAAA,MACA,WAAW;AAAA,MACX;AAAA,MACA,eAAc,oBAAI,KAAK,GAAE,YAAY;AAAA,IACvC;AAAA,IACA;AAAA,EACF;AACF;AAEA,eAAsB,iBACpB,gBACA,QAC4B;AAC5B,QAAM,SAAS,QAAQ,UAAU,QAAQ,IAAI,qBAAqB;AAElE,MAAI;AACF,UAAM,WAAW,MAAM,MAAM,GAAG,MAAM,YAAY,cAAc,EAAE;AAClE,QAAI,CAAC,SAAS,GAAI,QAAO;AACzB,UAAM,OAAO,MAAM,SAAS,KAAK;AACjC,WAAO,KAAK;AAAA,EACd,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACnGA,SAAS,mBAAmB;AAC5B,SAAS,cAAAA,aAAY,kBAAkB;AAGvC,eAAsB,KACpB,SACA,UACA,SAC4B;AAC5B,QAAM,QAAQ,SAAS,SAAS;AAChC,QAAM,cAAc,SAAS,eAAe;AAE5C,QAAM,cAAcA,YAAW,QAAQ,EAAE,OAAO,OAAO,EAAE,OAAO,KAAK;AAErE,QAAM,UAAU;AAAA,IACd,KAAK,GAAG,SAAS,MAAM;AAAA,IACvB,KAAK;AAAA,IACL,KAAK,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AAAA,IACjC,cAAc,UAAU,WAAW;AAAA,IACnC,cAAc;AAAA,IACd,OAAO,WAAW;AAAA,EACpB;AAEA,QAAM,MAAM,MAAM,IAAI;AAAA,IACpB,IAAI,YAAY,EAAE,OAAO,KAAK,UAAU,OAAO,CAAC;AAAA,EAClD,EACG,mBAAmB;AAAA,IAClB,KAAK;AAAA,IACL,KAAK;AAAA,IACL,KAAK,GAAG,SAAS,MAAM;AAAA,EACzB,CAAC,EACA,KAAK,SAAS,UAAU;AAE3B,SAAO;AAAA,IACL,WAAW;AAAA,MACT,GAAG;AAAA,MACH;AAAA,MACA,QAAQ,SAAS;AAAA,MACjB;AAAA,IACF;AAAA,IACA;AAAA,EACF;AACF;;;AC1CA,SAAS,eAAe,aAAAC,kBAAiB;AACzC,SAAS,cAAAC,mBAAkB;AAI3B,eAAsB,OACpB,UACA,QACuB;AACvB,MAAI;AACF,UAAM,EAAE,OAAO,IAAI,SAAS;AAE5B,UAAM,YAAY,MAAM,iBAAiB,QAAQ,MAAM;AACvD,QAAI,CAAC,WAAW;AACd,aAAO,EAAE,UAAU,OAAO,OAAO,uBAAuB;AAAA,IAC1D;AAEA,UAAM,YAAY,MAAMC,WAAU,WAAW,OAAO;AACpD,WAAO,MAAM,cAAc,UAAU,SAAS;AAAA,EAChD,SAAS,OAAO;AACd,WAAO,EAAE,UAAU,OAAO,OAAO,OAAO,KAAK,EAAE;AAAA,EACjD;AACF;AAEA,eAAsB,cACpB,UACA,WACuB;AACvB,MAAI;AACF,UAAM,EAAE,QAAQ,IAAI,MAAM,cAAc,SAAS,UAAU,KAAK,SAAS;AACzE,UAAM,SAAS,KAAK,MAAM,IAAI,YAAY,EAAE,OAAO,OAAO,CAAC;AAE3D,UAAM,aAAaC,YAAW,QAAQ,EAAE,OAAO,SAAS,OAAO,EAAE,OAAO,KAAK;AAC7E,UAAM,eAAe,OAAO,aAAa,QAAQ,WAAW,EAAE;AAC9D,QAAI,eAAe,cAAc;AAC/B,aAAO,EAAE,UAAU,OAAO,OAAO,wBAAwB;AAAA,IAC3D;AAEA,UAAM,MAAM,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AACxC,UAAM,WAAW,KAAK,IAAI,MAAM,OAAO,GAAG;AAC1C,QAAI,WAAW,OAAO;AACpB,aAAO,EAAE,UAAU,OAAO,OAAO,iCAAiC;AAAA,IACpE;AAEA,WAAO;AAAA,MACL,UAAU;AAAA,MACV,QAAQ;AAAA,QACN,UAAU,SAAS,UAAU;AAAA,QAC7B,IAAI;AAAA,QACJ,WAAW;AAAA,MACb;AAAA,MACA,OAAO,OAAO;AAAA,MACd,UAAU,IAAI,KAAK,OAAO,MAAM,GAAI,EAAE,YAAY;AAAA,IACpD;AAAA,EACF,SAAS,OAAO;AACd,WAAO,EAAE,UAAU,OAAO,OAAO,OAAO,KAAK,EAAE;AAAA,EACjD;AACF;;;ACzDO,IAAM,UAAU;","names":["createHash","importJWK","createHash","importJWK","createHash"]}
package/package.json ADDED
@@ -0,0 +1,54 @@
1
+ {
2
+ "name": "@agentcred-ai/sdk",
3
+ "version": "0.1.0",
4
+ "description": "Core SDK for AgentCred - sign, verify, and manage agent credentials",
5
+ "type": "module",
6
+ "exports": {
7
+ ".": {
8
+ "types": "./dist/index.d.ts",
9
+ "import": "./dist/index.js",
10
+ "require": "./dist/index.cjs"
11
+ }
12
+ },
13
+ "main": "./dist/index.cjs",
14
+ "module": "./dist/index.js",
15
+ "types": "./dist/index.d.ts",
16
+ "files": [
17
+ "dist"
18
+ ],
19
+ "devDependencies": {
20
+ "@types/node": "^25.1.0",
21
+ "tsup": "^8.0.0",
22
+ "typescript": "^5.8.0",
23
+ "vitest": "^3.0.0"
24
+ },
25
+ "license": "MIT",
26
+ "repository": {
27
+ "type": "git",
28
+ "url": "https://github.com/agentcred-ai/agentcred",
29
+ "directory": "packages/sdk"
30
+ },
31
+ "homepage": "https://agentcred.dev",
32
+ "bugs": {
33
+ "url": "https://github.com/agentcred-ai/agentcred/issues"
34
+ },
35
+ "keywords": [
36
+ "agentcred",
37
+ "ai-agent",
38
+ "mcp",
39
+ "cryptography",
40
+ "ed25519",
41
+ "identity",
42
+ "signature"
43
+ ],
44
+ "author": "AgentCred Contributors",
45
+ "dependencies": {
46
+ "jose": "^6.1.3",
47
+ "zod": "^4.3.6"
48
+ },
49
+ "scripts": {
50
+ "build": "tsup",
51
+ "test": "vitest run",
52
+ "typecheck": "tsc --noEmit"
53
+ }
54
+ }