36 results for “topic:hash-chain”
Immutable, scalable, and easy to use ledger service.
Public append-only ledger microservice built with Slim Framework
Chronicle — Verifiable Audit Logging and Append-Only Audit Trails for Laravel.
The open protocol for cryptographically sealed audit records of autonomous AI operations. SHA3-256 + Ed25519 + hash chain. Spec, conformance suite, and reference implementations in Python and TypeScript.
Flash is a C library and CLI for append-only, verifiable event streams stored in ".flsh" files.
Educational COBOL banking system with Python integrity layer, REST API, LLM tool-use, and glass morphism web console — 372 tests, 6-node settlement network, SHA-256 hash chains
Capsule Protocol integration for LiteLLM. Automatic cryptographic audit trail for every LLM call.
Tamper-evident audit trail for OpenClaw agent runs
Provable memory for AI agents — append-only, hash-chained, tamper-proof
Flask web authentication portal with two-factor authentication using 100-iteration SHA-256 hash chain-based OTP, RSA-encrypted database storage (PKCS1_OAEP), secure password hashing, automatic OTP chain renewal, and session management. Educational Python web security project demonstrating modern authentication.
Deterministic governance layer for autonomous AI agents. Three functions. One invariant. If it can't prove integrity, it halts.
Capture, preserve, and organize web evidence with cryptographic integrity
Go verifier for the Capsule Protocol Specification (CPS). Canonical JSON, SHA3-256, Ed25519. Passes all 16 golden vectors.
Public settlement ledger for swarm.at — 901 hash-chained entries, 76 types
Multi-tenant append-only audit logging system with tamper-evident hash-chain verification.
Audit trail library for .NET 8. Immutable entries with SHA-256 hash chaining for tamper detection. Non-blocking dispatch to multiple sinks.
"Hasq Technology" algorithm mod
Reference implementation of AEGIS — a three-layer cryptographic protocol (hash chain + Ed25519 + JCS) for AI agent action accountability. 202 tests, zero dependencies.
Tamper-evident audit trail with SHA-256 hash chaining, Ed25519 signatures, and Merkle tree anchoring
Tamper-evident hash chains for agent memory files 🔗
Documentation for the Twine Protocol
HashMap and HashSet using Seperate Chaining for Collision Resolution
Append-only immutable event log with hash chain integrity, temporal queries, and tiered storage
Secure IoT Home Network
Merkle tree and hash chain utilities for building tamper-evident audit logs in Python
Cryptographic audit layer for A2A: hash-chained, signed blocks with equivocation detection.
Deterministic canonical JSON hashing and tamper-evident hash-chain event log engine for TypeScript
Legal Act Change Tracker - Blockchain-inspired system for tracking legal amendments with AI simplification (Python, FastAPI, LLM)
Open-source time-lock core and reference tools for the Lethesafe project.
Tamper-evident evidence collection pipeline with append-only SQLite storage, hash-chain integrity, and one-shot audit CLI execution.