28 dependents
| Package | Description | Downloads/month |
|---|---|---|
| TIBET - The Trust Kernel for AI. One install, complete security: provenance, iso... | 2K | |
| Sovereign external API proxy with TIBET provenance — egress control, intent veri... | 1K | |
| Process Integrity Checker — every step a TIBET token, every deviation an alert | 965 | |
| Intent-based discovery and communication protocol with TIBET provenance. ICMP re... | 741 | |
| Human-in-the-Loop as a discipline. Airlock sandbox, zip bundle verification, UPI... | 546 | |
| Anti-cheat through provenance, not surveillance. Every game action is a TIBET to... | 540 | |
| Y2K38 Time Bridge - Software router for 32-to-64 bit epoch translation with TIBE... | 518 | |
| Cryptographic State Snapshots & Rollback — TIBET-sealed system state with verifi... | 496 | |
| Audit dossier assembler — verifiable remediation reports from TIBET provenance c... | 437 | |
| From vibe code to trusted tool. The Let's Encrypt of AI provenance. | 408 | |
| Layered context container with TIBET provenance and JIS capability gating | 190 | |
| Zero-Config CI/CD TIBET Integration — one line to audit your entire pipeline | 120 | |
| Decentralized Identity Overlay — crypto-based device identity over broken IPv4/C... | 117 | |
| Software Bill of Materials with TIBET Provenance — every dependency traced, ever... | 116 | |
| Bridge legacy IAM (Active Directory, LDAP, SAML, OAuth) to JIS cryptographic ide... | 100 | |
| MCP Server for TIBET - The Trust Kernel for AI. Audit as a Precondition, Not an ... | 95 | |
| CLI audit trail reader for TIBET provenance tokens | 85 | |
| Workload attestation & step tracking with TIBET provenance. Every pipeline step ... | 76 | |
| COBOL legacy encapsulation with TIBET provenance and JIS capability gating | 74 | |
| Immutable Database Proxy — turns any database into a cryptographically verifiabl... | 69 | |
| Verified Package Mirror — TIBET provenance for package mirrors, supply chain att... | 69 | |
| Security Operations Center — unified threat detection, incident correlation, and... | 67 | |
| SPIFFE/SPIRE bridge with TIBET provenance — your server thinks it's talking to S... | 66 | |
| Provenance-first crypto transactions — every transfer has intent, every wallet h... | 64 | |
| IoT Firmware Sealer — full provenance chain verification for firmware updates on... | 63 | |
| NIS2 Compliance Tool — Article 21 coverage with TIBET audit trail, incident resp... | 60 | |
| Post-Quantum Crypto Shield Router — bridge legacy crypto to quantum-safe algorit... | 59 | |
| Digital Twin Synchronicity Guard — deterministic sync verification between physi... | 58 |