ArkForge Trust Layer
Third-party certifying proxy — sign any HTTP call (AI agents, webhooks, microservices) with an independent Ed25519 signature, RFC 3161 timestamp, and Sigstore Rekor anchor.
README
ArkForge Trust Layer — MCP Server
Third-party certifying proxy — get an independent cryptographic proof for any HTTP call.
Works with AI agents, webhooks, microservices, or any HTTP client. The proof is signed by ArkForge (independent third party) — not by the caller.
Why this matters
When a system makes an HTTP call, there is no independent record of what was sent, what was received, or when it happened. Either party could deny or alter the transaction.
ArkForge fixes this by acting as a certifying proxy: the caller routes its request through ArkForge, which signs the full request+response bundle with an Ed25519 key, timestamps it via RFC 3161, and anchors it in Sigstore Rekor — an immutable, publicly auditable log.
The resulting proof is permanently verifiable at a public URL, by anyone, without contacting ArkForge.
This is the difference between a self-signed certificate and a CA-issued one. Other tools produce proofs signed by the caller itself. ArkForge produces proofs signed by an independent third party.
Use cases
- AI agents — audit trail for every external API call (Claude, GPT, Mistral, LangChain, AutoGen)
- Webhooks — prove a Stripe or GitHub event was received with this exact payload
- Microservices — tamper-evident log between internal services (compliance, fintech)
- Data providers — prove an external API returned this value at this timestamp
- Automations — certify an action in an n8n or Zapier workflow
Installation
{
"mcpServers": {
"arkforge": {
"command": "uvx",
"args": ["arkforge-mcp"],
"env": {
"ARKFORGE_API_KEY": "your_api_key_here"
}
}
}
}
Get a free API key (500 proofs/month) at arkforge.tech.
Tools
certify_call
Route an HTTP call through ArkForge and get a cryptographic proof of the transaction.
target URL of the upstream API to call
payload JSON body (optional)
method "POST" or "GET" (default: "POST")
description Human-readable description included in the proof
agent_identity Identifier for the calling system (optional)
Returns proof_id, verification_url, upstream_response, chain_hash, timestamp, and Ed25519 signature.
Use this instead of calling the API directly when you need an auditable record.
Example response:
{
"proof_id": "prf_20260310_143022_a1b2c3",
"verification_url": "https://trust.arkforge.tech/v1/proof/prf_20260310_143022_a1b2c3",
"upstream_response": { "status": "ok" },
"chain_hash": "e3b0c44298fc1c149afb...",
"timestamp": "2026-03-10T14:30:22.481Z",
"timestamp_authority": "verified",
"rekor_log_id": "https://rekor.sigstore.dev/api/v1/log/entries/...",
"seller": "api.example.com",
"signature": "MCowBQYDK2VwAyEA..."
}
get_proof
Retrieve the full proof bundle for a given proof_id.
verify_proof
Get a human-readable summary of what a proof certifies — useful for explaining to a user or auditor what was independently verified.
get_usage
Check your remaining credits for the current month.
What each proof contains
| Field | Description |
|---|---|
proof_id |
Unique identifier — permanent public URL |
hashes.request |
SHA-256 of the exact request sent |
hashes.response |
SHA-256 of the exact response received |
hashes.chain |
Combined hash — tamper-evident |
parties.seller |
Domain of the called API |
timestamp_authority |
RFC 3161 timestamp via FreeTSA (QTSP eIDAS on Enterprise) |
rekor |
Sigstore Rekor immutable log entry |
arkforge_signature |
Ed25519 signature by ArkForge's independent key |
Pricing
| Plan | Proofs/month | Price |
|---|---|---|
| Free | 500 | €0 |
| Pro | 5,000 | €29/month |
| Enterprise | 50,000 + QTSP eIDAS | €149/month |
REST API
The MCP server is one integration path. The same API works from any language or framework:
curl -X POST https://trust.arkforge.tech/v1/proxy \
-H "X-Api-Key: your_key" \
-H "Content-Type: application/json" \
-d '{"target": "https://api.example.com/action", "payload": {"data": "value"}}'
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
Audiense Insights MCP Server
Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.
VeyraX MCP
Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.
graphlit-mcp-server
The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.
Kagi MCP Server
An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.
E2B
Using MCP to run code via e2b.
Neon Database
MCP server for interacting with Neon Management API and databases
Exa Search
A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.
Qdrant Server
This repository is an example of how to create a MCP server for Qdrant, a vector search engine.