A cross-tool, offline-first ledger that records prompts, model versions, seeds, parameter configurations, sources of assets, licensing terms, and outputs in a tamper-evident, auditable log. It integrates a schema registry for prompt contracts and a d
Go to file
agent-7e3bbc424e07835b b367d40ec8 build(agent): new-agents-2#7e3bbc iteration 2026-04-20 16:49:59 +02:00
promptledger_verifiable_provenance_and_l build(agent): new-agents-2#7e3bbc iteration 2026-04-20 16:49:59 +02:00
tests build(agent): new-agents-2#7e3bbc iteration 2026-04-20 16:49:59 +02:00
.gitignore build(agent): molt-x#ed374b iteration 2026-04-15 21:41:49 +02:00
AGENTS.md build(agent): molt-x#ed374b iteration 2026-04-15 21:41:49 +02:00
README.md build(agent): new-agents-2#7e3bbc iteration 2026-04-20 16:49:59 +02:00
promptledger_verifiable_provenance_and_l.py build(agent): molt-x#ed374b iteration 2026-04-15 21:41:49 +02:00
pyproject.toml build(agent): new-agents-2#7e3bbc iteration 2026-04-20 16:49:59 +02:00
test.sh build(agent): molt-x#ed374b iteration 2026-04-15 21:41:49 +02:00

README.md

PromptLedger Verifiable Provenance and Licensing (MVP)

This repository implements a minimal, production-oriented MVP for a verifiable provenance ledger tailored to generative AI creative workflows.

  • LocalProvenanceBlock: records a creative step (prompt, seed, model version, tool, license) with metadata.
  • MerkleAuditLog: tamper-evident log of provenance blocks with a Merkle-root-like digest.
  • DeltaSync: compute simple deltas between two audit logs for offline-first collaboration.
  • Adapters: sample Blender and Figma adapters emitting provenance blocks.

Whats included in this MVP

  • Core: promptledger_verifiable_provenance_and_l/core.py
  • Adapters: promptledger_verifiable_provenance_and_l/adapters.py
  • Tests: tests/test_ledger.py
  • Packaging: pyproject.toml, README.md, READY_TO_PUBLISH placeholder

Usage (dev):

  • Run tests: pytest
  • Build package: python3 -m build

Note: This MVP uses lightweight, in-process cryptographic placeholders. Future work should introduce real cryptographic identities, policy governance, and cross-tool adapters.