forge-trust-chain 0.3.0 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,8 +1,28 @@
1
- # FORGE — Trust Chain Protocol v0.3
1
+ # FORGE — Trust Chain Protocol v0.4
2
2
 
3
3
  > **Trust = Certainty × Existence**
4
4
 
5
- The trust layer for cloud operations and AI agents. Every operation produces a verifiable, undeniable, cryptographically chained fact anchored to the Bitcoin blockchain.
5
+ FORGE is not a security tool. FORGE is an **accountability tool**.
6
+
7
+ It doesn't protect your service — firewalls, access control, and encryption do that.
8
+ It protects your **truth** — proving what happened, when, and making it **undeniable**.
9
+
10
+ Safety is locking the door. FORGE is the surveillance camera with a tamper-proof tape that gets copied to a vault no one controls.
11
+
12
+ **Rust core in development!** High-performance native implementation coming soon.
13
+
14
+ ---
15
+
16
+ ## What FORGE Does — and What It Doesn't
17
+
18
+ | | FORGE Does (Accountability) | FORGE Does NOT Do (Security) |
19
+ |--|----------------------------|------------------------------|
20
+ | **Purpose** | Prove that operations happened | Prevent attacks or breaches |
21
+ | **Mechanism** | Hash chain + Bitcoin anchor | Firewalls, encryption, access control |
22
+ | **Analogy** | Surveillance camera + tamper-proof tape | Door locks + alarm system |
23
+ | **When it matters** | After the fact — dispute, audit, compliance | Before the fact — prevention |
24
+
25
+ FORGE records and anchors your operational truth. Your infrastructure security (VPS hardening, SSH config, firewall rules, patch management) is a separate, equally critical concern. **Both are necessary. Neither replaces the other.**
6
26
 
7
27
  ---
8
28
 
@@ -14,6 +34,7 @@ The trust layer for cloud operations and AI agents. Every operation produces a v
14
34
  | "Can you prove you deployed at 3pm?" | Bitcoin-anchored proof, undeniable |
15
35
  | "Someone deleted the audit log" | Hash chain + blockchain = impossible to delete |
16
36
  | "I need compliance evidence" | Export verifiable JSON, anyone can validate |
37
+ | "The provider says they never deleted my server" | Divergence detection + anchored proof says otherwise |
17
38
 
18
39
  ---
19
40
 
@@ -55,7 +76,7 @@ forge status
55
76
 
56
77
  | Command | Description |
57
78
  |---------|-------------|
58
- | `forge scan` | Scan system for trust assumptions (ports, SSH, Docker, etc.) |
79
+ | `forge scan` | Capture trust baseline enumerate system assumptions before recording |
59
80
  | `forge log "<action>"` | Record an operation (TrustAtom) |
60
81
  | `forge verify` | Verify chain integrity |
61
82
  | `forge seal` | Seal atoms into a Merkle block |
@@ -197,7 +218,7 @@ Add to `~/.config/claude/claude_desktop_config.json`:
197
218
 
198
219
  | Tool | Description |
199
220
  |------|-------------|
200
- | `forge_scan` | Enumerate trust assumptions |
221
+ | `forge_scan` | Capture trust baseline snapshot |
201
222
  | `forge_log` | Record a TrustAtom |
202
223
  | `forge_verify` | Verify chain integrity |
203
224
  | `forge_seal` | Seal atoms into Merkle block |
@@ -209,22 +230,33 @@ Add to `~/.config/claude/claude_desktop_config.json`:
209
230
 
210
231
  ---
211
232
 
212
- ## Security Scanner
233
+ ## Trust Baseline Scanner
234
+
235
+ `forge scan` does **not** fix security issues. It captures a snapshot of your system's current trust assumptions — the starting point for your audit trail.
213
236
 
214
- Forge includes a system scanner to enumerate trust assumptions:
237
+ Think of it as: "Before I start recording, what does this system look like right now?"
215
238
 
216
239
  ```bash
217
240
  forge scan
218
241
  ```
219
242
 
220
- Detects:
221
- - Open ports (Redis, databases, management panels)
222
- - SSH configuration (root login, password auth)
223
- - Docker misconfigurations
224
- - Firewall status
225
- - Running processes
226
- - Cron jobs
227
- - Recent logins
243
+ Enumerates trust assumptions:
244
+ - Open ports (what services are exposed?)
245
+ - SSH configuration (how is access controlled?)
246
+ - Docker state (any risky configurations?)
247
+ - Firewall status (what rules exist?)
248
+ - Running processes (what's active?)
249
+ - Cron jobs (what runs unmonitored?)
250
+ - Recent logins (who has accessed this system?)
251
+
252
+ After scanning, use `forge log` to record your remediation actions, creating an auditable trail of what you found and what you did about it.
253
+
254
+ ```bash
255
+ forge scan # Capture baseline
256
+ forge log "found Redis exposed on 0.0.0.0" # Record finding
257
+ forge log "bound Redis to 127.0.0.1" # Record remediation
258
+ forge seal && forge anchor # Anchor the proof
259
+ ```
228
260
 
229
261
  Risk levels: 🔴 HIGH, 🟡 MEDIUM, 🔵 LOW, 🟢 INFO
230
262
 
@@ -338,8 +370,50 @@ node src/test.js
338
370
 
339
371
  ---
340
372
 
373
+ ## Rust Implementation
374
+
375
+ A high-performance Rust implementation is in development (private repository).
376
+
377
+ ### Why Rust?
378
+
379
+ | Aspect | JavaScript | Rust |
380
+ |--------|------------|------|
381
+ | **Speed** | Interpreted | Native binary |
382
+ | **Memory** | GC managed | Zero-cost abstractions |
383
+ | **Safety** | Runtime errors | Compile-time guarantees |
384
+ | **Deployment** | Requires Node.js | Single binary |
385
+
386
+ ### Implementation Status
387
+
388
+ | Module | JS | Rust | Status |
389
+ |--------|:--:|:----:|--------|
390
+ | TrustPixel (hash + witness) | ✅ | ✅ | Cross-validated |
391
+ | TrustAtom (state transitions) | ✅ | ✅ | Cross-validated |
392
+ | Merkle Tree | ✅ | 🚧 | In progress |
393
+ | Chain Manager | ✅ | 🚧 | In progress |
394
+ | Store (persistence) | ✅ | ⏳ | Planned |
395
+ | Witness (OTS) | ✅ | ⏳ | Planned |
396
+ | CLI | ✅ | ⏳ | Planned |
397
+ | Scanner | ✅ | ⏳ | Planned |
398
+
399
+ ### Cross-Validation
400
+
401
+ Rust and JavaScript produce identical outputs:
402
+
403
+ ```
404
+ hash("hello") → 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
405
+ ```
406
+
407
+ Both implementations pass 20+ cross-validation tests.
408
+
409
+ ---
410
+
341
411
  ## Roadmap
342
412
 
413
+ - [x] Rust core implementation (Phase 1)
414
+ - [ ] Rust Merkle tree and chain (Phase 2)
415
+ - [ ] Rust persistence and OTS (Phase 3)
416
+ - [ ] Rust CLI (Phase 4)
343
417
  - [ ] Web dashboard for chain visualization
344
418
  - [ ] Team/organization support
345
419
  - [ ] Webhook notifications
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "forge-trust-chain",
3
- "version": "0.3.0",
3
+ "version": "0.5.0",
4
4
  "description": "FORGE - Trust Chain Protocol: Verifiable, undeniable, Bitcoin-anchored audit trail for cloud operations and AI agents",
5
5
  "type": "module",
6
6
  "main": "src/cli/index.js",