28 dependents
Package Description Downloads/month
TIBET - The Trust Kernel for AI. One install, complete security: provenance, iso... 2K
Sovereign external API proxy with TIBET provenance — egress control, intent veri... 1K
Process Integrity Checker — every step a TIBET token, every deviation an alert 965
Intent-based discovery and communication protocol with TIBET provenance. ICMP re... 741
Human-in-the-Loop as a discipline. Airlock sandbox, zip bundle verification, UPI... 546
Anti-cheat through provenance, not surveillance. Every game action is a TIBET to... 540
Y2K38 Time Bridge - Software router for 32-to-64 bit epoch translation with TIBE... 518
Cryptographic State Snapshots & Rollback — TIBET-sealed system state with verifi... 496
Audit dossier assembler — verifiable remediation reports from TIBET provenance c... 437
From vibe code to trusted tool. The Let's Encrypt of AI provenance. 408
Layered context container with TIBET provenance and JIS capability gating 190
Zero-Config CI/CD TIBET Integration — one line to audit your entire pipeline 120
Decentralized Identity Overlay — crypto-based device identity over broken IPv4/C... 117
Software Bill of Materials with TIBET Provenance — every dependency traced, ever... 116
Bridge legacy IAM (Active Directory, LDAP, SAML, OAuth) to JIS cryptographic ide... 100
MCP Server for TIBET - The Trust Kernel for AI. Audit as a Precondition, Not an ... 95
CLI audit trail reader for TIBET provenance tokens 85
Workload attestation & step tracking with TIBET provenance. Every pipeline step ... 76
COBOL legacy encapsulation with TIBET provenance and JIS capability gating 74
Immutable Database Proxy — turns any database into a cryptographically verifiabl... 69
Verified Package Mirror — TIBET provenance for package mirrors, supply chain att... 69
Security Operations Center — unified threat detection, incident correlation, and... 67
SPIFFE/SPIRE bridge with TIBET provenance — your server thinks it's talking to S... 66
Provenance-first crypto transactions — every transfer has intent, every wallet h... 64
IoT Firmware Sealer — full provenance chain verification for firmware updates on... 63
NIS2 Compliance Tool — Article 21 coverage with TIBET audit trail, incident resp... 60
Post-Quantum Crypto Shield Router — bridge legacy crypto to quantum-safe algorit... 59
Digital Twin Synchronicity Guard — deterministic sync verification between physi... 58