@sanctuary-framework/mcp-server 0.5.5 → 0.5.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.cts CHANGED
@@ -1954,6 +1954,53 @@ declare class FilesystemStorage implements StorageBackend {
1954
1954
  */
1955
1955
  declare function loadPrincipalPolicy(storagePath: string): Promise<PrincipalPolicy>;
1956
1956
 
1957
+ /**
1958
+ * Sanctuary MCP Server — L1 Cognitive Sovereignty: Tool Definitions
1959
+ *
1960
+ * MCP tool wrappers for StateStore and IdentityRoot operations.
1961
+ * These tools are the public API that agents interact with.
1962
+ */
1963
+
1964
+ /** Manages all identities — provides storage and retrieval */
1965
+ declare class IdentityManager {
1966
+ private storage;
1967
+ private masterKey;
1968
+ private identities;
1969
+ private primaryIdentityId;
1970
+ constructor(storage: StorageBackend, masterKey: Uint8Array);
1971
+ private get encryptionKey();
1972
+ /** Load identities from storage on startup */
1973
+ load(): Promise<void>;
1974
+ /** Save an identity to storage */
1975
+ save(identity: StoredIdentity): Promise<void>;
1976
+ get(id: string): StoredIdentity | undefined;
1977
+ getDefault(): StoredIdentity | undefined;
1978
+ list(): PublicIdentity[];
1979
+ }
1980
+
1981
+ /**
1982
+ * Sanctuary MCP Server — SHR Generator
1983
+ *
1984
+ * Generates a Sovereignty Health Report from current server state,
1985
+ * signs it with a specified identity, and returns the complete signed SHR.
1986
+ */
1987
+
1988
+ interface SHRGeneratorOptions {
1989
+ config: SanctuaryConfig;
1990
+ identityManager: IdentityManager;
1991
+ masterKey: Uint8Array;
1992
+ /** Override validity window (milliseconds). Default: 1 hour. */
1993
+ validityMs?: number;
1994
+ }
1995
+ /**
1996
+ * Generate and sign a Sovereignty Health Report.
1997
+ *
1998
+ * @param identityId - Which identity to sign with (defaults to primary)
1999
+ * @param opts - Generator dependencies
2000
+ * @returns The signed SHR, or an error string
2001
+ */
2002
+ declare function generateSHR(identityId: string | undefined, opts: SHRGeneratorOptions): SignedSHR | string;
2003
+
1957
2004
  /**
1958
2005
  * Sanctuary MCP Server — Principal Dashboard
1959
2006
  *
@@ -1999,6 +2046,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
1999
2046
  private policy;
2000
2047
  private baseline;
2001
2048
  private auditLog;
2049
+ private identityManager;
2050
+ private handshakeResults;
2051
+ private shrOpts;
2052
+ private _sanctuaryConfig;
2002
2053
  private dashboardHTML;
2003
2054
  private loginHTML;
2004
2055
  private authToken;
@@ -2019,6 +2070,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
2019
2070
  policy: PrincipalPolicy;
2020
2071
  baseline: BaselineTracker;
2021
2072
  auditLog: AuditLog;
2073
+ identityManager?: IdentityManager;
2074
+ handshakeResults?: Map<string, HandshakeResult>;
2075
+ shrOpts?: SHRGeneratorOptions;
2076
+ sanctuaryConfig?: SanctuaryConfig;
2022
2077
  }): void;
2023
2078
  /**
2024
2079
  * Start the HTTP(S) server for the dashboard.
@@ -2097,6 +2152,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
2097
2152
  private handlePendingList;
2098
2153
  private handleAuditLog;
2099
2154
  private handleDecision;
2155
+ private handleSovereignty;
2156
+ private handleIdentity;
2157
+ private handleHandshakes;
2158
+ private handleSHR;
2100
2159
  broadcastSSE(event: string, data: unknown): void;
2101
2160
  /**
2102
2161
  * Broadcast an audit entry to connected dashboards.
@@ -2246,53 +2305,6 @@ declare class WebhookApprovalChannel implements ApprovalChannel {
2246
2305
  get pendingCount(): number;
2247
2306
  }
2248
2307
 
2249
- /**
2250
- * Sanctuary MCP Server — L1 Cognitive Sovereignty: Tool Definitions
2251
- *
2252
- * MCP tool wrappers for StateStore and IdentityRoot operations.
2253
- * These tools are the public API that agents interact with.
2254
- */
2255
-
2256
- /** Manages all identities — provides storage and retrieval */
2257
- declare class IdentityManager {
2258
- private storage;
2259
- private masterKey;
2260
- private identities;
2261
- private primaryIdentityId;
2262
- constructor(storage: StorageBackend, masterKey: Uint8Array);
2263
- private get encryptionKey();
2264
- /** Load identities from storage on startup */
2265
- load(): Promise<void>;
2266
- /** Save an identity to storage */
2267
- save(identity: StoredIdentity): Promise<void>;
2268
- get(id: string): StoredIdentity | undefined;
2269
- getDefault(): StoredIdentity | undefined;
2270
- list(): PublicIdentity[];
2271
- }
2272
-
2273
- /**
2274
- * Sanctuary MCP Server — SHR Generator
2275
- *
2276
- * Generates a Sovereignty Health Report from current server state,
2277
- * signs it with a specified identity, and returns the complete signed SHR.
2278
- */
2279
-
2280
- interface SHRGeneratorOptions {
2281
- config: SanctuaryConfig;
2282
- identityManager: IdentityManager;
2283
- masterKey: Uint8Array;
2284
- /** Override validity window (milliseconds). Default: 1 hour. */
2285
- validityMs?: number;
2286
- }
2287
- /**
2288
- * Generate and sign a Sovereignty Health Report.
2289
- *
2290
- * @param identityId - Which identity to sign with (defaults to primary)
2291
- * @param opts - Generator dependencies
2292
- * @returns The signed SHR, or an error string
2293
- */
2294
- declare function generateSHR(identityId: string | undefined, opts: SHRGeneratorOptions): SignedSHR | string;
2295
-
2296
2308
  /**
2297
2309
  * Sanctuary MCP Server — SHR Verifier
2298
2310
  *
@@ -2354,6 +2366,101 @@ declare function completeHandshake(response: HandshakeResponse, session: Handsha
2354
2366
  */
2355
2367
  declare function verifyCompletion(completion: HandshakeCompletion, session: HandshakeSession): HandshakeResult;
2356
2368
 
2369
+ /**
2370
+ * Sanctuary MCP Server — Sovereignty Attestation Artifacts
2371
+ *
2372
+ * Signed, shareable artifacts proving sovereignty verification between agents.
2373
+ * Used for one-shot SHR exchanges and as portable proof of handshake completion.
2374
+ *
2375
+ * An attestation artifact contains:
2376
+ * - Both parties' SHRs
2377
+ * - Verification results (sovereignty level, trust tier)
2378
+ * - Ed25519 signature over the canonical artifact body
2379
+ * - Human-readable summary for social/public posting
2380
+ */
2381
+
2382
+ /** Attestation artifact version */
2383
+ declare const ATTESTATION_VERSION: "1.0";
2384
+ /** The signed body of an attestation artifact */
2385
+ interface AttestationBody {
2386
+ attestation_version: typeof ATTESTATION_VERSION;
2387
+ /** Who generated this attestation */
2388
+ attester_id: string;
2389
+ /** Who was verified */
2390
+ subject_id: string;
2391
+ /** Attester's SHR at time of attestation */
2392
+ attester_shr: SignedSHR;
2393
+ /** Subject's SHR that was verified */
2394
+ subject_shr: SignedSHR;
2395
+ /** Verification results */
2396
+ verification: {
2397
+ subject_shr_valid: boolean;
2398
+ subject_sovereignty_level: SovereigntyLevel;
2399
+ subject_trust_tier: TrustTier;
2400
+ /** Whether subject also verified attester (mutual exchange) */
2401
+ mutual: boolean;
2402
+ errors: string[];
2403
+ warnings: string[];
2404
+ };
2405
+ /** When this attestation was generated */
2406
+ attested_at: string;
2407
+ /** When this attestation expires (min of both SHR expiries) */
2408
+ expires_at: string;
2409
+ }
2410
+ /** Complete signed attestation artifact */
2411
+ interface SignedAttestation {
2412
+ body: AttestationBody;
2413
+ /** Attester's public key (base64url) */
2414
+ signed_by: string;
2415
+ /** Ed25519 signature over canonical body (base64url) */
2416
+ signature: string;
2417
+ /** Human-readable summary for social posting */
2418
+ summary: string;
2419
+ }
2420
+ interface AttestationOptions {
2421
+ /** Our signed SHR */
2422
+ attesterSHR: SignedSHR;
2423
+ /** Counterparty's signed SHR */
2424
+ subjectSHR: SignedSHR;
2425
+ /** Result from verifySHR(subjectSHR) */
2426
+ verificationResult: SHRVerificationResult;
2427
+ /** Whether this is a mutual exchange (both sides verify) */
2428
+ mutual?: boolean;
2429
+ /** Identity manager for signing */
2430
+ identityManager: IdentityManager;
2431
+ /** Master key for key derivation */
2432
+ masterKey: Uint8Array;
2433
+ /** Identity to sign with (defaults to primary) */
2434
+ identityId?: string;
2435
+ }
2436
+ /**
2437
+ * Generate a signed attestation artifact.
2438
+ *
2439
+ * The artifact is a portable, verifiable proof that one agent
2440
+ * verified another's sovereignty posture. It includes both SHRs,
2441
+ * the verification outcome, and a human-readable summary.
2442
+ */
2443
+ declare function generateAttestation(opts: AttestationOptions): SignedAttestation | {
2444
+ error: string;
2445
+ };
2446
+ interface AttestationVerificationResult {
2447
+ valid: boolean;
2448
+ errors: string[];
2449
+ attester_id: string;
2450
+ subject_id: string;
2451
+ trust_tier: TrustTier;
2452
+ expired: boolean;
2453
+ }
2454
+ /**
2455
+ * Verify a signed attestation artifact.
2456
+ *
2457
+ * Checks:
2458
+ * 1. Signature validity (Ed25519 over canonical body)
2459
+ * 2. Temporal validity (not expired)
2460
+ * 3. Structural integrity (version, required fields)
2461
+ */
2462
+ declare function verifyAttestation(attestation: SignedAttestation, now?: Date): AttestationVerificationResult;
2463
+
2357
2464
  /**
2358
2465
  * Sanctuary MCP Server — Concordia Bridge: Type Definitions
2359
2466
  *
@@ -2559,4 +2666,4 @@ declare function createSanctuaryServer(options?: {
2559
2666
  storage?: StorageBackend;
2560
2667
  }): Promise<SanctuaryServer>;
2561
2668
 
2562
- export { ApprovalGate, AuditLog, AutoApproveChannel, BaselineTracker, type BridgeAttestationRequest, type BridgeAttestationResult, type BridgeCommitment, type BridgeVerificationResult, TEMPLATES as CONTEXT_GATE_TEMPLATES, CallbackApprovalChannel, CommitmentStore, type ConcordiaOutcome, type ContextAction, type ContextFilterResult, ContextGateEnforcer, type ContextGatePolicy, ContextGatePolicyStore, type ContextGateRule, type ContextGateTemplate, DashboardApprovalChannel, type DashboardConfig, type DetectionResult, type EnforcerConfig, type FederationCapabilities, type FederationPeer, FederationRegistry, type FieldClassification, type FieldFilterResult, FilesystemStorage, type GateResult, type HandshakeChallenge, type HandshakeCompletion, type HandshakeResponse, type HandshakeResult, InjectionDetector, type InjectionDetectorConfig, type InjectionSignal, MemoryStorage, type PedersenCommitment, type PeerTrustEvaluation, type PolicyRecommendation, PolicyStore, type PrincipalPolicy, type ProviderCategory, ReputationStore, type SHRBody, type SHRVerificationResult, type SanctuaryConfig, type SanctuaryServer, type SignedSHR, type SovereigntyTier, StateStore, StderrApprovalChannel, TIER_WEIGHTS, type TierMetadata, type TieredAttestation, WebhookApprovalChannel, type WebhookCallbackPayload, type WebhookConfig, type WebhookPayload, type ZKProofOfKnowledge, type ZKRangeProof, canonicalize, classifyField, completeHandshake, computeWeightedScore, createBridgeCommitment, createPedersenCommitment, createProofOfKnowledge, createRangeProof, createSanctuaryServer, evaluateField, filterContext, generateSHR, getTemplate, initiateHandshake, listTemplateIds, loadConfig, loadPrincipalPolicy, recommendPolicy, resolveTier, respondToHandshake, signPayload, tierDistribution, verifyBridgeCommitment, verifyCompletion, verifyPedersenCommitment, verifyProofOfKnowledge, verifyRangeProof, verifySHR, verifySignature };
2669
+ export { ATTESTATION_VERSION, ApprovalGate, type AttestationBody, type AttestationVerificationResult, AuditLog, AutoApproveChannel, BaselineTracker, type BridgeAttestationRequest, type BridgeAttestationResult, type BridgeCommitment, type BridgeVerificationResult, TEMPLATES as CONTEXT_GATE_TEMPLATES, CallbackApprovalChannel, CommitmentStore, type ConcordiaOutcome, type ContextAction, type ContextFilterResult, ContextGateEnforcer, type ContextGatePolicy, ContextGatePolicyStore, type ContextGateRule, type ContextGateTemplate, DashboardApprovalChannel, type DashboardConfig, type DetectionResult, type EnforcerConfig, type FederationCapabilities, type FederationPeer, FederationRegistry, type FieldClassification, type FieldFilterResult, FilesystemStorage, type GateResult, type HandshakeChallenge, type HandshakeCompletion, type HandshakeResponse, type HandshakeResult, InjectionDetector, type InjectionDetectorConfig, type InjectionSignal, MemoryStorage, type PedersenCommitment, type PeerTrustEvaluation, type PolicyRecommendation, PolicyStore, type PrincipalPolicy, type ProviderCategory, ReputationStore, type SHRBody, type SHRGeneratorOptions, type SHRVerificationResult, type SanctuaryConfig, type SanctuaryServer, type SignedAttestation, type SignedSHR, type SovereigntyTier, StateStore, StderrApprovalChannel, TIER_WEIGHTS, type TierMetadata, type TieredAttestation, WebhookApprovalChannel, type WebhookCallbackPayload, type WebhookConfig, type WebhookPayload, type ZKProofOfKnowledge, type ZKRangeProof, canonicalize, classifyField, completeHandshake, computeWeightedScore, createBridgeCommitment, createPedersenCommitment, createProofOfKnowledge, createRangeProof, createSanctuaryServer, evaluateField, filterContext, generateAttestation, generateSHR, getTemplate, initiateHandshake, listTemplateIds, loadConfig, loadPrincipalPolicy, recommendPolicy, resolveTier, respondToHandshake, signPayload, tierDistribution, verifyAttestation, verifyBridgeCommitment, verifyCompletion, verifyPedersenCommitment, verifyProofOfKnowledge, verifyRangeProof, verifySHR, verifySignature };
package/dist/index.d.ts CHANGED
@@ -1954,6 +1954,53 @@ declare class FilesystemStorage implements StorageBackend {
1954
1954
  */
1955
1955
  declare function loadPrincipalPolicy(storagePath: string): Promise<PrincipalPolicy>;
1956
1956
 
1957
+ /**
1958
+ * Sanctuary MCP Server — L1 Cognitive Sovereignty: Tool Definitions
1959
+ *
1960
+ * MCP tool wrappers for StateStore and IdentityRoot operations.
1961
+ * These tools are the public API that agents interact with.
1962
+ */
1963
+
1964
+ /** Manages all identities — provides storage and retrieval */
1965
+ declare class IdentityManager {
1966
+ private storage;
1967
+ private masterKey;
1968
+ private identities;
1969
+ private primaryIdentityId;
1970
+ constructor(storage: StorageBackend, masterKey: Uint8Array);
1971
+ private get encryptionKey();
1972
+ /** Load identities from storage on startup */
1973
+ load(): Promise<void>;
1974
+ /** Save an identity to storage */
1975
+ save(identity: StoredIdentity): Promise<void>;
1976
+ get(id: string): StoredIdentity | undefined;
1977
+ getDefault(): StoredIdentity | undefined;
1978
+ list(): PublicIdentity[];
1979
+ }
1980
+
1981
+ /**
1982
+ * Sanctuary MCP Server — SHR Generator
1983
+ *
1984
+ * Generates a Sovereignty Health Report from current server state,
1985
+ * signs it with a specified identity, and returns the complete signed SHR.
1986
+ */
1987
+
1988
+ interface SHRGeneratorOptions {
1989
+ config: SanctuaryConfig;
1990
+ identityManager: IdentityManager;
1991
+ masterKey: Uint8Array;
1992
+ /** Override validity window (milliseconds). Default: 1 hour. */
1993
+ validityMs?: number;
1994
+ }
1995
+ /**
1996
+ * Generate and sign a Sovereignty Health Report.
1997
+ *
1998
+ * @param identityId - Which identity to sign with (defaults to primary)
1999
+ * @param opts - Generator dependencies
2000
+ * @returns The signed SHR, or an error string
2001
+ */
2002
+ declare function generateSHR(identityId: string | undefined, opts: SHRGeneratorOptions): SignedSHR | string;
2003
+
1957
2004
  /**
1958
2005
  * Sanctuary MCP Server — Principal Dashboard
1959
2006
  *
@@ -1999,6 +2046,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
1999
2046
  private policy;
2000
2047
  private baseline;
2001
2048
  private auditLog;
2049
+ private identityManager;
2050
+ private handshakeResults;
2051
+ private shrOpts;
2052
+ private _sanctuaryConfig;
2002
2053
  private dashboardHTML;
2003
2054
  private loginHTML;
2004
2055
  private authToken;
@@ -2019,6 +2070,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
2019
2070
  policy: PrincipalPolicy;
2020
2071
  baseline: BaselineTracker;
2021
2072
  auditLog: AuditLog;
2073
+ identityManager?: IdentityManager;
2074
+ handshakeResults?: Map<string, HandshakeResult>;
2075
+ shrOpts?: SHRGeneratorOptions;
2076
+ sanctuaryConfig?: SanctuaryConfig;
2022
2077
  }): void;
2023
2078
  /**
2024
2079
  * Start the HTTP(S) server for the dashboard.
@@ -2097,6 +2152,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
2097
2152
  private handlePendingList;
2098
2153
  private handleAuditLog;
2099
2154
  private handleDecision;
2155
+ private handleSovereignty;
2156
+ private handleIdentity;
2157
+ private handleHandshakes;
2158
+ private handleSHR;
2100
2159
  broadcastSSE(event: string, data: unknown): void;
2101
2160
  /**
2102
2161
  * Broadcast an audit entry to connected dashboards.
@@ -2246,53 +2305,6 @@ declare class WebhookApprovalChannel implements ApprovalChannel {
2246
2305
  get pendingCount(): number;
2247
2306
  }
2248
2307
 
2249
- /**
2250
- * Sanctuary MCP Server — L1 Cognitive Sovereignty: Tool Definitions
2251
- *
2252
- * MCP tool wrappers for StateStore and IdentityRoot operations.
2253
- * These tools are the public API that agents interact with.
2254
- */
2255
-
2256
- /** Manages all identities — provides storage and retrieval */
2257
- declare class IdentityManager {
2258
- private storage;
2259
- private masterKey;
2260
- private identities;
2261
- private primaryIdentityId;
2262
- constructor(storage: StorageBackend, masterKey: Uint8Array);
2263
- private get encryptionKey();
2264
- /** Load identities from storage on startup */
2265
- load(): Promise<void>;
2266
- /** Save an identity to storage */
2267
- save(identity: StoredIdentity): Promise<void>;
2268
- get(id: string): StoredIdentity | undefined;
2269
- getDefault(): StoredIdentity | undefined;
2270
- list(): PublicIdentity[];
2271
- }
2272
-
2273
- /**
2274
- * Sanctuary MCP Server — SHR Generator
2275
- *
2276
- * Generates a Sovereignty Health Report from current server state,
2277
- * signs it with a specified identity, and returns the complete signed SHR.
2278
- */
2279
-
2280
- interface SHRGeneratorOptions {
2281
- config: SanctuaryConfig;
2282
- identityManager: IdentityManager;
2283
- masterKey: Uint8Array;
2284
- /** Override validity window (milliseconds). Default: 1 hour. */
2285
- validityMs?: number;
2286
- }
2287
- /**
2288
- * Generate and sign a Sovereignty Health Report.
2289
- *
2290
- * @param identityId - Which identity to sign with (defaults to primary)
2291
- * @param opts - Generator dependencies
2292
- * @returns The signed SHR, or an error string
2293
- */
2294
- declare function generateSHR(identityId: string | undefined, opts: SHRGeneratorOptions): SignedSHR | string;
2295
-
2296
2308
  /**
2297
2309
  * Sanctuary MCP Server — SHR Verifier
2298
2310
  *
@@ -2354,6 +2366,101 @@ declare function completeHandshake(response: HandshakeResponse, session: Handsha
2354
2366
  */
2355
2367
  declare function verifyCompletion(completion: HandshakeCompletion, session: HandshakeSession): HandshakeResult;
2356
2368
 
2369
+ /**
2370
+ * Sanctuary MCP Server — Sovereignty Attestation Artifacts
2371
+ *
2372
+ * Signed, shareable artifacts proving sovereignty verification between agents.
2373
+ * Used for one-shot SHR exchanges and as portable proof of handshake completion.
2374
+ *
2375
+ * An attestation artifact contains:
2376
+ * - Both parties' SHRs
2377
+ * - Verification results (sovereignty level, trust tier)
2378
+ * - Ed25519 signature over the canonical artifact body
2379
+ * - Human-readable summary for social/public posting
2380
+ */
2381
+
2382
+ /** Attestation artifact version */
2383
+ declare const ATTESTATION_VERSION: "1.0";
2384
+ /** The signed body of an attestation artifact */
2385
+ interface AttestationBody {
2386
+ attestation_version: typeof ATTESTATION_VERSION;
2387
+ /** Who generated this attestation */
2388
+ attester_id: string;
2389
+ /** Who was verified */
2390
+ subject_id: string;
2391
+ /** Attester's SHR at time of attestation */
2392
+ attester_shr: SignedSHR;
2393
+ /** Subject's SHR that was verified */
2394
+ subject_shr: SignedSHR;
2395
+ /** Verification results */
2396
+ verification: {
2397
+ subject_shr_valid: boolean;
2398
+ subject_sovereignty_level: SovereigntyLevel;
2399
+ subject_trust_tier: TrustTier;
2400
+ /** Whether subject also verified attester (mutual exchange) */
2401
+ mutual: boolean;
2402
+ errors: string[];
2403
+ warnings: string[];
2404
+ };
2405
+ /** When this attestation was generated */
2406
+ attested_at: string;
2407
+ /** When this attestation expires (min of both SHR expiries) */
2408
+ expires_at: string;
2409
+ }
2410
+ /** Complete signed attestation artifact */
2411
+ interface SignedAttestation {
2412
+ body: AttestationBody;
2413
+ /** Attester's public key (base64url) */
2414
+ signed_by: string;
2415
+ /** Ed25519 signature over canonical body (base64url) */
2416
+ signature: string;
2417
+ /** Human-readable summary for social posting */
2418
+ summary: string;
2419
+ }
2420
+ interface AttestationOptions {
2421
+ /** Our signed SHR */
2422
+ attesterSHR: SignedSHR;
2423
+ /** Counterparty's signed SHR */
2424
+ subjectSHR: SignedSHR;
2425
+ /** Result from verifySHR(subjectSHR) */
2426
+ verificationResult: SHRVerificationResult;
2427
+ /** Whether this is a mutual exchange (both sides verify) */
2428
+ mutual?: boolean;
2429
+ /** Identity manager for signing */
2430
+ identityManager: IdentityManager;
2431
+ /** Master key for key derivation */
2432
+ masterKey: Uint8Array;
2433
+ /** Identity to sign with (defaults to primary) */
2434
+ identityId?: string;
2435
+ }
2436
+ /**
2437
+ * Generate a signed attestation artifact.
2438
+ *
2439
+ * The artifact is a portable, verifiable proof that one agent
2440
+ * verified another's sovereignty posture. It includes both SHRs,
2441
+ * the verification outcome, and a human-readable summary.
2442
+ */
2443
+ declare function generateAttestation(opts: AttestationOptions): SignedAttestation | {
2444
+ error: string;
2445
+ };
2446
+ interface AttestationVerificationResult {
2447
+ valid: boolean;
2448
+ errors: string[];
2449
+ attester_id: string;
2450
+ subject_id: string;
2451
+ trust_tier: TrustTier;
2452
+ expired: boolean;
2453
+ }
2454
+ /**
2455
+ * Verify a signed attestation artifact.
2456
+ *
2457
+ * Checks:
2458
+ * 1. Signature validity (Ed25519 over canonical body)
2459
+ * 2. Temporal validity (not expired)
2460
+ * 3. Structural integrity (version, required fields)
2461
+ */
2462
+ declare function verifyAttestation(attestation: SignedAttestation, now?: Date): AttestationVerificationResult;
2463
+
2357
2464
  /**
2358
2465
  * Sanctuary MCP Server — Concordia Bridge: Type Definitions
2359
2466
  *
@@ -2559,4 +2666,4 @@ declare function createSanctuaryServer(options?: {
2559
2666
  storage?: StorageBackend;
2560
2667
  }): Promise<SanctuaryServer>;
2561
2668
 
2562
- export { ApprovalGate, AuditLog, AutoApproveChannel, BaselineTracker, type BridgeAttestationRequest, type BridgeAttestationResult, type BridgeCommitment, type BridgeVerificationResult, TEMPLATES as CONTEXT_GATE_TEMPLATES, CallbackApprovalChannel, CommitmentStore, type ConcordiaOutcome, type ContextAction, type ContextFilterResult, ContextGateEnforcer, type ContextGatePolicy, ContextGatePolicyStore, type ContextGateRule, type ContextGateTemplate, DashboardApprovalChannel, type DashboardConfig, type DetectionResult, type EnforcerConfig, type FederationCapabilities, type FederationPeer, FederationRegistry, type FieldClassification, type FieldFilterResult, FilesystemStorage, type GateResult, type HandshakeChallenge, type HandshakeCompletion, type HandshakeResponse, type HandshakeResult, InjectionDetector, type InjectionDetectorConfig, type InjectionSignal, MemoryStorage, type PedersenCommitment, type PeerTrustEvaluation, type PolicyRecommendation, PolicyStore, type PrincipalPolicy, type ProviderCategory, ReputationStore, type SHRBody, type SHRVerificationResult, type SanctuaryConfig, type SanctuaryServer, type SignedSHR, type SovereigntyTier, StateStore, StderrApprovalChannel, TIER_WEIGHTS, type TierMetadata, type TieredAttestation, WebhookApprovalChannel, type WebhookCallbackPayload, type WebhookConfig, type WebhookPayload, type ZKProofOfKnowledge, type ZKRangeProof, canonicalize, classifyField, completeHandshake, computeWeightedScore, createBridgeCommitment, createPedersenCommitment, createProofOfKnowledge, createRangeProof, createSanctuaryServer, evaluateField, filterContext, generateSHR, getTemplate, initiateHandshake, listTemplateIds, loadConfig, loadPrincipalPolicy, recommendPolicy, resolveTier, respondToHandshake, signPayload, tierDistribution, verifyBridgeCommitment, verifyCompletion, verifyPedersenCommitment, verifyProofOfKnowledge, verifyRangeProof, verifySHR, verifySignature };
2669
+ export { ATTESTATION_VERSION, ApprovalGate, type AttestationBody, type AttestationVerificationResult, AuditLog, AutoApproveChannel, BaselineTracker, type BridgeAttestationRequest, type BridgeAttestationResult, type BridgeCommitment, type BridgeVerificationResult, TEMPLATES as CONTEXT_GATE_TEMPLATES, CallbackApprovalChannel, CommitmentStore, type ConcordiaOutcome, type ContextAction, type ContextFilterResult, ContextGateEnforcer, type ContextGatePolicy, ContextGatePolicyStore, type ContextGateRule, type ContextGateTemplate, DashboardApprovalChannel, type DashboardConfig, type DetectionResult, type EnforcerConfig, type FederationCapabilities, type FederationPeer, FederationRegistry, type FieldClassification, type FieldFilterResult, FilesystemStorage, type GateResult, type HandshakeChallenge, type HandshakeCompletion, type HandshakeResponse, type HandshakeResult, InjectionDetector, type InjectionDetectorConfig, type InjectionSignal, MemoryStorage, type PedersenCommitment, type PeerTrustEvaluation, type PolicyRecommendation, PolicyStore, type PrincipalPolicy, type ProviderCategory, ReputationStore, type SHRBody, type SHRGeneratorOptions, type SHRVerificationResult, type SanctuaryConfig, type SanctuaryServer, type SignedAttestation, type SignedSHR, type SovereigntyTier, StateStore, StderrApprovalChannel, TIER_WEIGHTS, type TierMetadata, type TieredAttestation, WebhookApprovalChannel, type WebhookCallbackPayload, type WebhookConfig, type WebhookPayload, type ZKProofOfKnowledge, type ZKRangeProof, canonicalize, classifyField, completeHandshake, computeWeightedScore, createBridgeCommitment, createPedersenCommitment, createProofOfKnowledge, createRangeProof, createSanctuaryServer, evaluateField, filterContext, generateAttestation, generateSHR, getTemplate, initiateHandshake, listTemplateIds, loadConfig, loadPrincipalPolicy, recommendPolicy, resolveTier, respondToHandshake, signPayload, tierDistribution, verifyAttestation, verifyBridgeCommitment, verifyCompletion, verifyPedersenCommitment, verifyProofOfKnowledge, verifyRangeProof, verifySHR, verifySignature };