ArkForge Trust Layer MCP Server

1

Add it to Claude Code

Run this in a terminal.

Run in terminal
claude mcp add -e "ARKFORGE_API_KEY=${ARKFORGE_API_KEY}" arkforge-trust -- uvx arkforge-mcp
Required:ARKFORGE_API_KEY
README.md

Third-party certifying proxy for verifiable HTTP calls

ArkForge Trust Layer — MCP Server

Third-party certifying proxy — get an independent cryptographic proof for any HTTP call.

Works with AI agents, webhooks, microservices, or any HTTP client. The proof is signed by ArkForge (independent third party) — not by the caller.


Why this matters

When a system makes an HTTP call, there is no independent record of what was sent, what was received, or when it happened. Either party could deny or alter the transaction.

ArkForge fixes this by acting as a certifying proxy: the caller routes its request through ArkForge, which signs the full request+response bundle with an Ed25519 key, timestamps it via RFC 3161, and anchors it in Sigstore Rekor — an immutable, publicly auditable log.

The resulting proof is permanently verifiable at a public URL, by anyone, without contacting ArkForge.

This is the difference between a self-signed certificate and a CA-issued one. Other tools produce proofs signed by the caller itself. ArkForge produces proofs signed by an independent third party.


Use cases

  • AI agents — audit trail for every external API call (Claude, GPT, Mistral, LangChain, AutoGen)
  • Webhooks — prove a Stripe or GitHub event was received with this exact payload
  • Microservices — tamper-evident log between internal services (compliance, fintech)
  • Data providers — prove an external API returned this value at this timestamp
  • Automations — certify an action in an n8n or Zapier workflow

Installation

{
  "mcpServers": {
    "arkforge": {
      "command": "uvx",
      "args": ["arkforge-mcp"],
      "env": {
        "ARKFORGE_API_KEY": "your_api_key_here"
      }
    }
  }
}

Get a free API key (500 proofs/month) at arkforge.tech.


Tools

`certify_call`

Route an HTTP call through ArkForge and get a cryptographic proof of the transaction.

target          URL of the upstream API to call
payload         JSON body (optional)
method          "POST" or "GET" (default: "POST")
description     Human-readable description included in the proof
agent_identity  Identifier for the calling system (optional)

Returns proof_id, verification_url, upstream_response, chain_hash, timestamp, and Ed25519 signature.

Use this instead of calling the API directly when you need an auditable record.

Example response:

{
  "proof_id": "prf_20260310_143022_a1b2c3",
  "verification_url": "https://trust.arkforge.tech/v1/proof/prf_20260310_143022_a1b2c3",
  "upstream_response": { "status": "ok" },
  "chain_hash": "e3b0c44298fc1c149afb...",
  "timestamp": "2026-03-10T14:30:22.481Z",
  "timestamp_authority": "verified",
  "rekor_log_id": "https://rekor.sigstore.dev/api/v1/log/entries/...",
  "seller": "api.example.com",
  "signature": "MCowBQYDK2VwAyEA..."
}

`get_proof`

Retrieve the full proof bundle for a given proof_id.

`verify_proof`

Get a human-readable summary of what a proof certifies — useful for explaining to a user or auditor what was independently verified.

`get_usage`

Check your remaining credits for the current month.


What each proof contains

Field Description
proof_id Unique identifier — permanent public URL
hashes.request SHA-256 of the exact request sent
hashes.response SHA-256 of the exact response received
hashes.chain Combined hash — tamper-evident
parties.seller Domain of the called API
timestamp_authority RFC 3161 timestamp via FreeTSA (QTSP eIDAS on Enterprise)
rekor Sigstore Rekor immutable log entry
arkforge_signature Ed25519 signature by ArkForge's independent key

Pricing

Plan Proofs/month Price
Free 500 €0
Pro 5,000 €29/month
Enterprise 50,000 + QTSP eIDAS €149/month

Get your API key →


REST API

The MCP server is one integration path. The same API works from any language or framework:

curl -X POST https://trust.arkforge.tech/v1/proxy \
  -H "X-Api-Key: your_key" \
  -H "Content-Type: application/json" \
  -d '{"target": "https://api.example.com/action", "payload": {"data": "value"}}'

Tools (4)

certify_callRoute an HTTP call through ArkForge and get a cryptographic proof of the transaction.
get_proofRetrieve the full proof bundle for a given proof_id.
verify_proofGet a human-readable summary of what a proof certifies.
get_usageCheck your remaining credits for the current month.

Environment Variables

ARKFORGE_API_KEYrequiredAPI key for authenticating with the ArkForge service

Configuration

claude_desktop_config.json
{"mcpServers": {"arkforge": {"command": "uvx", "args": ["arkforge-mcp"], "env": {"ARKFORGE_API_KEY": "your_api_key_here"}}}}

Try it

Certify an API call to https://api.example.com/data using the certify_call tool with a POST request.
Retrieve the proof details for proof_id prf_20260310_143022_a1b2c3.
Verify the proof with ID prf_20260310_143022_a1b2c3 and explain what it certifies.
Check my current ArkForge usage and remaining credits for this month.

Frequently Asked Questions

What are the key features of ArkForge Trust Layer?

Independent Ed25519 signature for HTTP requests and responses. RFC 3161 timestamping for transaction verification. Immutable logging via Sigstore Rekor. Tamper-evident proof bundles with public verification URLs.

What can I use ArkForge Trust Layer for?

Creating an audit trail for external API calls made by AI agents. Proving receipt of specific payloads from webhooks like Stripe or GitHub. Maintaining tamper-evident logs between internal microservices for compliance. Certifying actions performed within automation workflows like n8n or Zapier.

How do I install ArkForge Trust Layer?

Install ArkForge Trust Layer by running: uvx arkforge-mcp

What MCP clients work with ArkForge Trust Layer?

ArkForge Trust Layer works with any MCP-compatible client including Claude Desktop, Claude Code, Cursor, and other editors with MCP support.

Turn this server into reusable context

Keep ArkForge Trust Layer docs, env vars, and workflow notes in Conare so your agent carries them across sessions.

Need the old visual installer? Open Conare IDE.
Open Conare