ctxprotocol 0.5.7__py3-none-any.whl → 0.6.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- ctxprotocol/auth/__init__.py +111 -12
- ctxprotocol/client/resources/discovery.py +2 -1
- ctxprotocol/client/resources/tools.py +1 -1
- ctxprotocol/client/types.py +31 -8
- ctxprotocol/context/__init__.py +22 -8
- ctxprotocol/handshake/__init__.py +18 -9
- {ctxprotocol-0.5.7.dist-info → ctxprotocol-0.6.0.dist-info}/METADATA +1 -1
- ctxprotocol-0.6.0.dist-info/RECORD +17 -0
- ctxprotocol-0.5.7.dist-info/RECORD +0 -17
- {ctxprotocol-0.5.7.dist-info → ctxprotocol-0.6.0.dist-info}/WHEEL +0 -0
ctxprotocol/auth/__init__.py
CHANGED
|
@@ -38,6 +38,54 @@ weipe6amt9lzQzi8WXaFKpOXHQs//WDlUytz/Hl8pvd5craZKzo6Kyrg1Vfan7H3
|
|
|
38
38
|
TQIDAQAB
|
|
39
39
|
-----END PUBLIC KEY-----"""
|
|
40
40
|
|
|
41
|
+
# ============================================================================
|
|
42
|
+
# JWKS Key Fetching (with hardcoded fallback)
|
|
43
|
+
# ============================================================================
|
|
44
|
+
|
|
45
|
+
JWKS_URL = "https://ctxprotocol.com/.well-known/jwks.json"
|
|
46
|
+
_KEY_CACHE_TTL_SECONDS = 3600 # 1 hour
|
|
47
|
+
|
|
48
|
+
_cached_public_key: Any = None
|
|
49
|
+
_cache_timestamp: float = 0
|
|
50
|
+
|
|
51
|
+
|
|
52
|
+
async def _get_platform_public_key() -> Any:
|
|
53
|
+
"""Get the platform public key, trying JWKS endpoint first with hardcoded fallback.
|
|
54
|
+
|
|
55
|
+
Caches the result for 1 hour.
|
|
56
|
+
"""
|
|
57
|
+
import time
|
|
58
|
+
global _cached_public_key, _cache_timestamp
|
|
59
|
+
|
|
60
|
+
now = time.time()
|
|
61
|
+
|
|
62
|
+
# Return cached key if still valid
|
|
63
|
+
if _cached_public_key is not None and now - _cache_timestamp < _KEY_CACHE_TTL_SECONDS:
|
|
64
|
+
return _cached_public_key
|
|
65
|
+
|
|
66
|
+
# Try JWKS endpoint first
|
|
67
|
+
try:
|
|
68
|
+
import httpx
|
|
69
|
+
async with httpx.AsyncClient(timeout=5.0) as client:
|
|
70
|
+
response = await client.get(JWKS_URL)
|
|
71
|
+
if response.is_success:
|
|
72
|
+
jwks = response.json()
|
|
73
|
+
if jwks.get("keys") and len(jwks["keys"]) > 0:
|
|
74
|
+
# For now, use hardcoded key (JWKS parsing requires additional logic)
|
|
75
|
+
# This establishes the pattern for when the endpoint is deployed
|
|
76
|
+
pass
|
|
77
|
+
except Exception:
|
|
78
|
+
# JWKS fetch failed - fall back to hardcoded key
|
|
79
|
+
pass
|
|
80
|
+
|
|
81
|
+
# Fallback: use hardcoded key
|
|
82
|
+
_cached_public_key = serialization.load_pem_public_key(
|
|
83
|
+
CONTEXT_PLATFORM_PUBLIC_KEY_PEM.encode()
|
|
84
|
+
)
|
|
85
|
+
_cache_timestamp = now
|
|
86
|
+
return _cached_public_key
|
|
87
|
+
|
|
88
|
+
|
|
41
89
|
# MCP methods that require authentication
|
|
42
90
|
# - tools/call: Executes tool logic, may cost money
|
|
43
91
|
# - resources/read: Reads potentially sensitive data
|
|
@@ -155,10 +203,8 @@ async def verify_context_request(
|
|
|
155
203
|
token = authorization_header.split(" ", 1)[1]
|
|
156
204
|
|
|
157
205
|
try:
|
|
158
|
-
# Load the public key
|
|
159
|
-
public_key =
|
|
160
|
-
CONTEXT_PLATFORM_PUBLIC_KEY_PEM.encode()
|
|
161
|
-
)
|
|
206
|
+
# Load the public key (tries JWKS endpoint first, falls back to hardcoded)
|
|
207
|
+
public_key = await _get_platform_public_key()
|
|
162
208
|
|
|
163
209
|
# Build decode options - match TypeScript SDK behavior
|
|
164
210
|
decode_options: dict[str, Any] = {
|
|
@@ -300,22 +346,74 @@ class ContextMiddleware:
|
|
|
300
346
|
await self.app(scope, receive, send)
|
|
301
347
|
return
|
|
302
348
|
|
|
303
|
-
#
|
|
304
|
-
# This is a simplified version - in production you might want to
|
|
305
|
-
# use a more sophisticated approach to avoid reading the body twice
|
|
349
|
+
# Buffer the request body to inspect the MCP method
|
|
306
350
|
body_parts: list[bytes] = []
|
|
351
|
+
body_complete = False
|
|
307
352
|
|
|
308
353
|
async def receive_wrapper() -> dict[str, Any]:
|
|
354
|
+
nonlocal body_complete
|
|
355
|
+
if body_parts and body_complete:
|
|
356
|
+
# Replay the buffered body
|
|
357
|
+
body = b"".join(body_parts)
|
|
358
|
+
return {"type": "http.request", "body": body, "more_body": False}
|
|
359
|
+
|
|
309
360
|
message = await receive()
|
|
310
361
|
if message["type"] == "http.request":
|
|
311
362
|
body_parts.append(message.get("body", b""))
|
|
363
|
+
if not message.get("more_body", False):
|
|
364
|
+
body_complete = True
|
|
312
365
|
return message
|
|
313
366
|
|
|
314
|
-
#
|
|
315
|
-
|
|
316
|
-
|
|
317
|
-
|
|
318
|
-
|
|
367
|
+
# Read the body to check the method
|
|
368
|
+
while not body_complete:
|
|
369
|
+
await receive_wrapper()
|
|
370
|
+
|
|
371
|
+
# Parse the body to get the MCP method
|
|
372
|
+
try:
|
|
373
|
+
import json
|
|
374
|
+
body_bytes = b"".join(body_parts)
|
|
375
|
+
body_json = json.loads(body_bytes)
|
|
376
|
+
method = body_json.get("method", "")
|
|
377
|
+
except Exception:
|
|
378
|
+
# Can't parse body - let the endpoint handle it
|
|
379
|
+
await self.app(scope, receive_wrapper, send)
|
|
380
|
+
return
|
|
381
|
+
|
|
382
|
+
# Allow discovery methods without authentication
|
|
383
|
+
if not method or not is_protected_mcp_method(method):
|
|
384
|
+
await self.app(scope, receive_wrapper, send)
|
|
385
|
+
return
|
|
386
|
+
|
|
387
|
+
# Protected method - require authentication
|
|
388
|
+
# Extract Authorization header from ASGI scope
|
|
389
|
+
headers = dict(scope.get("headers", []))
|
|
390
|
+
auth_header = headers.get(b"authorization", b"").decode("utf-8")
|
|
391
|
+
|
|
392
|
+
try:
|
|
393
|
+
payload = await verify_context_request(
|
|
394
|
+
authorization_header=auth_header if auth_header else None,
|
|
395
|
+
audience=self.audience,
|
|
396
|
+
)
|
|
397
|
+
# Attach payload to scope state for downstream use
|
|
398
|
+
if "state" not in scope:
|
|
399
|
+
scope["state"] = {}
|
|
400
|
+
scope["state"]["context"] = payload
|
|
401
|
+
await self.app(scope, receive_wrapper, send)
|
|
402
|
+
except ContextError as e:
|
|
403
|
+
# Return 401 JSON response
|
|
404
|
+
import json
|
|
405
|
+
response_body = json.dumps({"error": str(e)}).encode("utf-8")
|
|
406
|
+
await send({
|
|
407
|
+
"type": "http.response.start",
|
|
408
|
+
"status": e.status_code or 401,
|
|
409
|
+
"headers": [
|
|
410
|
+
[b"content-type", b"application/json"],
|
|
411
|
+
],
|
|
412
|
+
})
|
|
413
|
+
await send({
|
|
414
|
+
"type": "http.response.body",
|
|
415
|
+
"body": response_body,
|
|
416
|
+
})
|
|
319
417
|
|
|
320
418
|
|
|
321
419
|
def create_context_middleware(
|
|
@@ -380,6 +478,7 @@ def create_context_middleware(
|
|
|
380
478
|
__all__ = [
|
|
381
479
|
# Constants
|
|
382
480
|
"CONTEXT_PLATFORM_PUBLIC_KEY_PEM",
|
|
481
|
+
"JWKS_URL",
|
|
383
482
|
"PROTECTED_MCP_METHODS",
|
|
384
483
|
"OPEN_MCP_METHODS",
|
|
385
484
|
# Method classification
|
|
@@ -46,7 +46,8 @@ class Discovery:
|
|
|
46
46
|
if limit is not None:
|
|
47
47
|
params["limit"] = str(limit)
|
|
48
48
|
|
|
49
|
-
|
|
49
|
+
from urllib.parse import urlencode
|
|
50
|
+
query_string = urlencode(params) if params else ""
|
|
50
51
|
endpoint = f"/api/v1/tools/search{'?' + query_string if query_string else ''}"
|
|
51
52
|
|
|
52
53
|
response = await self._client.fetch(endpoint)
|
ctxprotocol/client/types.py
CHANGED
|
@@ -60,9 +60,13 @@ class Tool(BaseModel):
|
|
|
60
60
|
price: Price per execution in USDC
|
|
61
61
|
category: Tool category (e.g., "defi", "nft")
|
|
62
62
|
is_verified: Whether the tool is verified by Context Protocol
|
|
63
|
+
kind: Tool type - currently always "mcp"
|
|
63
64
|
mcp_tools: Available MCP tool methods
|
|
64
|
-
|
|
65
|
-
|
|
65
|
+
total_queries: Total number of queries processed
|
|
66
|
+
success_rate: Success rate percentage (0-100)
|
|
67
|
+
uptime_percent: Uptime percentage (0-100)
|
|
68
|
+
total_staked: Total USDC staked by the developer
|
|
69
|
+
is_proven: Whether the tool has "Proven" status
|
|
66
70
|
"""
|
|
67
71
|
|
|
68
72
|
id: str = Field(..., description="Unique identifier for the tool (UUID)")
|
|
@@ -75,20 +79,39 @@ class Tool(BaseModel):
|
|
|
75
79
|
alias="isVerified",
|
|
76
80
|
description="Whether the tool is verified by Context Protocol",
|
|
77
81
|
)
|
|
82
|
+
kind: str | None = Field(
|
|
83
|
+
default=None,
|
|
84
|
+
description="Tool type - currently always 'mcp'",
|
|
85
|
+
)
|
|
78
86
|
mcp_tools: list[McpTool] | None = Field(
|
|
79
87
|
default=None,
|
|
80
88
|
alias="mcpTools",
|
|
81
89
|
description="Available MCP tool methods",
|
|
82
90
|
)
|
|
83
|
-
|
|
91
|
+
total_queries: int | None = Field(
|
|
92
|
+
default=None,
|
|
93
|
+
alias="totalQueries",
|
|
94
|
+
description="Total number of queries processed",
|
|
95
|
+
)
|
|
96
|
+
success_rate: str | None = Field(
|
|
97
|
+
default=None,
|
|
98
|
+
alias="successRate",
|
|
99
|
+
description="Success rate percentage",
|
|
100
|
+
)
|
|
101
|
+
uptime_percent: str | None = Field(
|
|
102
|
+
default=None,
|
|
103
|
+
alias="uptimePercent",
|
|
104
|
+
description="Uptime percentage",
|
|
105
|
+
)
|
|
106
|
+
total_staked: str | None = Field(
|
|
84
107
|
default=None,
|
|
85
|
-
alias="
|
|
86
|
-
description="
|
|
108
|
+
alias="totalStaked",
|
|
109
|
+
description="Total USDC staked by developer",
|
|
87
110
|
)
|
|
88
|
-
|
|
111
|
+
is_proven: bool | None = Field(
|
|
89
112
|
default=None,
|
|
90
|
-
alias="
|
|
91
|
-
description="
|
|
113
|
+
alias="isProven",
|
|
114
|
+
description="Whether tool has Proven status",
|
|
92
115
|
)
|
|
93
116
|
|
|
94
117
|
model_config = {"populate_by_name": True}
|
ctxprotocol/context/__init__.py
CHANGED
|
@@ -69,24 +69,37 @@ from ctxprotocol.context.hyperliquid import (
|
|
|
69
69
|
|
|
70
70
|
CONTEXT_REQUIREMENTS_KEY = "x-context-requirements"
|
|
71
71
|
"""
|
|
72
|
-
|
|
72
|
+
DEPRECATED: Use _meta.contextRequirements instead.
|
|
73
73
|
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
- Custom fields like `requirements` get stripped by MCP SDK during transport
|
|
77
|
-
- JSON Schema allows custom "x-" prefixed extension properties
|
|
78
|
-
- inputSchema is preserved end-to-end through MCP transport
|
|
74
|
+
The primary mechanism for declaring context requirements is via the MCP _meta field
|
|
75
|
+
at the tool level, which is preserved by the MCP SDK through transport:
|
|
79
76
|
|
|
80
|
-
Example:
|
|
81
77
|
>>> tool = {
|
|
82
78
|
... "name": "analyze_my_positions",
|
|
79
|
+
... "_meta": {"contextRequirements": ["hyperliquid"]},
|
|
83
80
|
... "inputSchema": {
|
|
84
81
|
... "type": "object",
|
|
85
|
-
... CONTEXT_REQUIREMENTS_KEY: ["hyperliquid"],
|
|
86
82
|
... "properties": {"portfolio": {"type": "object"}},
|
|
87
83
|
... "required": ["portfolio"]
|
|
88
84
|
... }
|
|
89
85
|
... }
|
|
86
|
+
|
|
87
|
+
This constant is kept for backwards compatibility but _meta.contextRequirements
|
|
88
|
+
is what the Context Platform reads. The x-context-requirements inputSchema extension
|
|
89
|
+
may be stripped by some MCP transports.
|
|
90
|
+
"""
|
|
91
|
+
|
|
92
|
+
META_CONTEXT_REQUIREMENTS_KEY = "contextRequirements"
|
|
93
|
+
"""
|
|
94
|
+
The key used inside _meta to declare context requirements.
|
|
95
|
+
This is the primary mechanism - the Context Platform reads _meta.contextRequirements.
|
|
96
|
+
|
|
97
|
+
Example:
|
|
98
|
+
>>> tool = {
|
|
99
|
+
... "name": "analyze_positions",
|
|
100
|
+
... "_meta": {META_CONTEXT_REQUIREMENTS_KEY: ["hyperliquid"]},
|
|
101
|
+
... "inputSchema": {...}
|
|
102
|
+
... }
|
|
90
103
|
"""
|
|
91
104
|
|
|
92
105
|
# Context requirement types supported by the Context marketplace
|
|
@@ -158,6 +171,7 @@ class UserContext(BaseModel):
|
|
|
158
171
|
__all__ = [
|
|
159
172
|
# Constants
|
|
160
173
|
"CONTEXT_REQUIREMENTS_KEY",
|
|
174
|
+
"META_CONTEXT_REQUIREMENTS_KEY",
|
|
161
175
|
# Type aliases
|
|
162
176
|
"ContextRequirementType",
|
|
163
177
|
# Wallet types
|
|
@@ -34,7 +34,10 @@ from typing import Any, Literal, Optional, TypedDict, Union
|
|
|
34
34
|
|
|
35
35
|
|
|
36
36
|
class HandshakeMeta(TypedDict, total=False):
|
|
37
|
-
"""UI metadata for handshake approval cards.
|
|
37
|
+
"""UI metadata for handshake approval cards.
|
|
38
|
+
|
|
39
|
+
Note: Keys use camelCase to match the wire format expected by the platform.
|
|
40
|
+
"""
|
|
38
41
|
|
|
39
42
|
description: str
|
|
40
43
|
"""Human-readable description of the action."""
|
|
@@ -45,15 +48,21 @@ class HandshakeMeta(TypedDict, total=False):
|
|
|
45
48
|
action: str
|
|
46
49
|
"""Action verb (e.g., 'Place Order', 'Place Bid')."""
|
|
47
50
|
|
|
48
|
-
|
|
51
|
+
tokenSymbol: str
|
|
49
52
|
"""Token symbol if relevant."""
|
|
50
53
|
|
|
51
|
-
|
|
54
|
+
tokenAmount: str
|
|
52
55
|
"""Human-readable token amount."""
|
|
53
56
|
|
|
54
|
-
|
|
57
|
+
warningLevel: Literal["info", "caution", "danger"]
|
|
55
58
|
"""UI warning level."""
|
|
56
59
|
|
|
60
|
+
title: str
|
|
61
|
+
"""Title for the approval card."""
|
|
62
|
+
|
|
63
|
+
subtitle: str
|
|
64
|
+
"""Subtitle for the approval card."""
|
|
65
|
+
|
|
57
66
|
|
|
58
67
|
# =============================================================================
|
|
59
68
|
# Web3: Signature Requests (EIP-712)
|
|
@@ -125,10 +134,10 @@ class SignatureRequest(TypedDict, total=False):
|
|
|
125
134
|
class TransactionProposalMeta(HandshakeMeta, total=False):
|
|
126
135
|
"""Extended metadata for transaction proposals."""
|
|
127
136
|
|
|
128
|
-
|
|
137
|
+
estimatedGas: str
|
|
129
138
|
"""Estimated gas cost (informational - Context may sponsor)."""
|
|
130
139
|
|
|
131
|
-
|
|
140
|
+
explorerUrl: str
|
|
132
141
|
"""Link to contract on block explorer."""
|
|
133
142
|
|
|
134
143
|
|
|
@@ -168,7 +177,7 @@ class TransactionProposal(TypedDict, total=False):
|
|
|
168
177
|
class AuthRequiredMeta(TypedDict, total=False):
|
|
169
178
|
"""Metadata for OAuth requests."""
|
|
170
179
|
|
|
171
|
-
|
|
180
|
+
displayName: str
|
|
172
181
|
"""Human-friendly service name."""
|
|
173
182
|
|
|
174
183
|
scopes: list[str]
|
|
@@ -177,10 +186,10 @@ class AuthRequiredMeta(TypedDict, total=False):
|
|
|
177
186
|
description: str
|
|
178
187
|
"""Description of what access is needed."""
|
|
179
188
|
|
|
180
|
-
|
|
189
|
+
iconUrl: str
|
|
181
190
|
"""Tool's icon URL."""
|
|
182
191
|
|
|
183
|
-
|
|
192
|
+
expiresIn: str
|
|
184
193
|
"""How long authorization lasts."""
|
|
185
194
|
|
|
186
195
|
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: ctxprotocol
|
|
3
|
-
Version: 0.
|
|
3
|
+
Version: 0.6.0
|
|
4
4
|
Summary: Official Python SDK for the Context Protocol - Discover and execute AI tools programmatically
|
|
5
5
|
Project-URL: Homepage, https://ctxprotocol.com
|
|
6
6
|
Project-URL: Documentation, https://docs.ctxprotocol.com
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
ctxprotocol/__init__.py,sha256=m7s0VtVaMwm-cBBXpvBN30M3RfgDgMTIwcpY_vqVHFg,4755
|
|
2
|
+
ctxprotocol/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
3
|
+
ctxprotocol/auth/__init__.py,sha256=zXo2n9ZvVN6H0Oa5oE_4J6j6KdksymC-SFAzlLUm7JI,16645
|
|
4
|
+
ctxprotocol/client/__init__.py,sha256=dgtQ9_pzVthsNJazibWHcFkdTjZQlT_gn7SuPCsBOHo,940
|
|
5
|
+
ctxprotocol/client/client.py,sha256=eEiSTmBY6VHP04LbBEGF-D_9D5oZvDgaVF1ysMVS_zc,4771
|
|
6
|
+
ctxprotocol/client/types.py,sha256=cKJ0vdkaMckIgh7QR8gMhTDzUMAu4agDu9xyY9-WCX8,8961
|
|
7
|
+
ctxprotocol/client/resources/__init__.py,sha256=ZJkrArhJtYMALMIu46m2JU6XimBcIUvd0LvZPi7Cpz0,238
|
|
8
|
+
ctxprotocol/client/resources/discovery.py,sha256=BH-rN53GhgG_4Ecl2lqr-tgyxHShrqpawFV8ndJThAU,2107
|
|
9
|
+
ctxprotocol/client/resources/tools.py,sha256=gV5HbssUveJjouJ4EaitL-Ouph3IK9f0cbLz4fnltZw,3425
|
|
10
|
+
ctxprotocol/context/__init__.py,sha256=3uP-_7iULzwv0bV-CLznjRWAjsA38oCIhJzpWsxmvBM,6297
|
|
11
|
+
ctxprotocol/context/hyperliquid.py,sha256=M59Ku48yCdfpS9_b5l8SyEFukZwbNb8P1xAh2P0Yh-0,7603
|
|
12
|
+
ctxprotocol/context/polymarket.py,sha256=GcBay3VRKf4MQj49VLmhOPrU172_aNa4i2TPS9-sZuQ,3484
|
|
13
|
+
ctxprotocol/context/wallet.py,sha256=g6pXMY_olLn3-4ULQQKmtpDcZ_u9kgCwIdc0JFEkckE,1742
|
|
14
|
+
ctxprotocol/handshake/__init__.py,sha256=oz-dQO5hwbzCxaPFUeOMQDolfy14K55GfygTtKmu-IY,12498
|
|
15
|
+
ctxprotocol-0.6.0.dist-info/METADATA,sha256=11JEebdyq30IQHkbCo-dQEUgRQXdJrnPIVVpVf4CR2I,11706
|
|
16
|
+
ctxprotocol-0.6.0.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
|
|
17
|
+
ctxprotocol-0.6.0.dist-info/RECORD,,
|
|
@@ -1,17 +0,0 @@
|
|
|
1
|
-
ctxprotocol/__init__.py,sha256=m7s0VtVaMwm-cBBXpvBN30M3RfgDgMTIwcpY_vqVHFg,4755
|
|
2
|
-
ctxprotocol/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
3
|
-
ctxprotocol/auth/__init__.py,sha256=J1AWTpN-KKCYfFRMtIW8z8jvBvJHE4cB7Z6t2PjFsVA,13202
|
|
4
|
-
ctxprotocol/client/__init__.py,sha256=dgtQ9_pzVthsNJazibWHcFkdTjZQlT_gn7SuPCsBOHo,940
|
|
5
|
-
ctxprotocol/client/client.py,sha256=eEiSTmBY6VHP04LbBEGF-D_9D5oZvDgaVF1ysMVS_zc,4771
|
|
6
|
-
ctxprotocol/client/types.py,sha256=3FOL5SuzzhiPAGTl-sWasDSxkEKnNjgyoaXc8wjlkOI,8143
|
|
7
|
-
ctxprotocol/client/resources/__init__.py,sha256=ZJkrArhJtYMALMIu46m2JU6XimBcIUvd0LvZPi7Cpz0,238
|
|
8
|
-
ctxprotocol/client/resources/discovery.py,sha256=xnykG55DfO_TjD6Z5taLc7aGklg98X8boPiBYsx3NFE,2076
|
|
9
|
-
ctxprotocol/client/resources/tools.py,sha256=ZkBLz-AKZI_6MUPIQMCj80PDo7gd6YgxXPYHqRJaEb4,3370
|
|
10
|
-
ctxprotocol/context/__init__.py,sha256=v_auetqp3w0eScRLhWGbFHXGRfgjcNzTEeeMKOAxigA,5819
|
|
11
|
-
ctxprotocol/context/hyperliquid.py,sha256=M59Ku48yCdfpS9_b5l8SyEFukZwbNb8P1xAh2P0Yh-0,7603
|
|
12
|
-
ctxprotocol/context/polymarket.py,sha256=GcBay3VRKf4MQj49VLmhOPrU172_aNa4i2TPS9-sZuQ,3484
|
|
13
|
-
ctxprotocol/context/wallet.py,sha256=g6pXMY_olLn3-4ULQQKmtpDcZ_u9kgCwIdc0JFEkckE,1742
|
|
14
|
-
ctxprotocol/handshake/__init__.py,sha256=GUWa1lKacLq463cgVaTu5K2Wrx9E8EhJIVbCUbqhwMs,12300
|
|
15
|
-
ctxprotocol-0.5.7.dist-info/METADATA,sha256=cNNsRcxhzJ4Y-jucq1PxJw11bH1sA-L2QfOpQKjFkjs,11706
|
|
16
|
-
ctxprotocol-0.5.7.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
|
|
17
|
-
ctxprotocol-0.5.7.dist-info/RECORD,,
|
|
File without changes
|