Certifying proxy for AI agents

Prove that it happened.

Your agents — Claude, GPT, Mistral, your internal APIs — execute thousands of API calls. When a provider denies delivery or a client disputes the charge: who has proof?

Get my free API key → See pricing →
See a live proof →

Your Agent
ArkForge Trust Layer
Verified Proof

Without proof, you lose.

🚫

Service denied

Provider says it wasn't delivered. You can't prove otherwise.

💳

Result disputed

Your agent did the work, but the client denies it. Without a signed proof, it's your word against theirs.

🔍

Audit requested

Regulator wants records. You have logs, not proof.


The Black Box Scenario

Your agent orders 1 server. The vendor bills you for 19. Without a neutral proof, it’s your word against theirs. With ArkForge, it’s resolved in 5 seconds.

Without ArkForge
Agent  →  qty = 1
Vendor  →  “I received 19”
Your logs  →  “I sent 1”

Lawyers. 6 weeks. Invoice paid.

With ArkForge
Request sealed  →  hash(qty=1)
Response sealed  →  “1 confirmed”
Anchored Rekor  →  2026-03-06T14:32Z

Dispute resolved in 5 seconds. Invoice rejected, case closed.

Why the proof is bilateral

The proof is created after the vendor responds — it seals both sides of the exchange. If the vendor bills 19 but responded “1 confirmed”, their own response contradicts them. Not your logs. Their response.

€0.01 per proof. One avoided dispute saves thousands.


How it works

One API call. Three things happen.

1

Route

The request transits through Trust Layer. Included in your monthly quota — Free (500), Pro (5,000), Enterprise (50,000), Platform (500,000).

2

Forward

Request relayed to target API. Response fingerprinted (SHA-256).

3

Prove

Ed25519 signed. RFC 3161 timestamped.


3 independent witnesses

Even if ArkForge disappears tomorrow, your proofs remain verifiable. Optionally add external payment verification for a 4th layer of trust.

🔑

Ed25519 Signature

Origin authentication. Every proof is signed with ArkForge's Ed25519 key. The public key is published and verifiable by anyone.

🕒

RFC 3161 TSA

Certified timestamp from a pool of WebTrust-certified authorities (FreeTSA → DigiCert → Sectigo).

🌍

Sigstore Rekor

Immutable transparency log entry. Every proof is appended to Sigstore's public Rekor ledger — tamper-evident and independently auditable by anyone.

Optional: External Payment Verification

Attach a Stripe receipt URL to your request. ArkForge fetches it, hashes the content (SHA-256), and binds it to the proof chain hash. The receipt becomes a 4th independent witness — tamper-proof and verifiable by anyone.


Your proofs survive us.

ArkForge is in the request path. It is not in the verification path.

Request path
Agent → ArkForge → LLM

ArkForge is a transit point. It forwards the request and records the exchange. This is where latency is added — measurable, minimizable, and independent of the proof itself.

Verification path
Proof → DigiCert TSA → ✓

Verification calls DigiCert, FreeTSA, or Sigstore — not ArkForge. ArkForge is absent from the verification chain. It cannot alter, revoke, or fabricate a proof after the fact.

What this means in practice

If ArkForge goes offline tomorrow, every proof issued today remains verifiable — against public TSA keys and the Sigstore Rekor ledger. Compare with LangSmith or Braintrust: if those services close, your traces disappear. ArkForge proofs are anchored outside ArkForge by design.

Enterprise: self-hosted option

For deployments that cannot route traffic through a third-party proxy: ArkForge is available as a self-hosted installation inside your VPC. You operate the proxy. You choose your TSA. ArkForge becomes the software, not the dependency. Talk to us →


Who is it for?

You’re building an agent

Your agent calls Claude, GPT, Mistral, internal APIs, third-party services — often in the same chain. No provider certifies that chain. ArkForge certifies every hop, regardless of model or infrastructure.

Zero SDK. Two lines. Works with LangChain, AutoGen, CrewAI, or a raw HTTP call.

Not a payment protocol

Some “trust layers” handle payments between agents. ArkForge is different: it’s a certifying proxy that sits between your agent and any API — proving what was sent, what was received, and when. Model-agnostic, provider-agnostic, infrastructure-agnostic. The proof works across Claude, GPT, Mistral, open-source models, and any REST endpoint — in the same chain.

You delegate to an agent

Which model was called? Exact prompt? Exact response? Real cost? Agent logs are mutable. ArkForge proofs are not.

Regulated environments

DORA, NIS2, EU AI Act require verifiable proof — not logs. ArkForge certifies every execution with a certified timestamp and anchors it in a public immutability log.

Compliance evidence reports

Every certified proof is indexed. Query them by date range and generate an evidence-mapping report against the regulatory framework of your choice — directly from your proof history, without manual work.

EU AI Act

Articles 9, 10, 13, 14, 17, 22

ISO/IEC 42001:2023

Clauses 6.1, 8.2, 8.4, 9.1, 9.2, 10.1

NIST AI RMF 1.0

GOVERN, MAP, MEASURE, MANAGE

SOC 2 Readiness

CC6.1, CC6.7, CC7.2, PI1.1, PI1.2, A1.1

† Readiness evidence only — not a SOC 2 audit opinion. A formal SOC 2 Type II report requires an independent CPA firm accredited by the AICPA. See Terms § 7b.

All frameworks, criteria and example outputs →


See it in action

terminal
$ curl -X POST https://trust.arkforge.tech/v1/proxy \ -H "X-Api-Key: YOUR_API_KEY" \ -H "Content-Type: application/json" \ -d '{"target": "https://api.example.com/v1/run", "payload": {"task": "analyze", "text": "hello"}}' { "proof_id": "prf_20260303_161853_4d0904", "spec_version": "2.0", "hashes": { "chain": "sha256:242d07519cf9d834...", "request": "sha256:bf6a5be70fcc5de6...", "response": "sha256:30f08484fa5a9be1..." }, "arkforge_signature": "ed25519:_31W2HE6aUrozGNa...", "timestamp_authority": { "status": "verified", "provider": "freetsa.org" }, "transparency_log": { "status": "verified", "log_index": 1018479057 }, "provider_payment": { // verified Stripe receipt "receipt_content_hash": "sha256:c26b65261ff8fdb9...", "parsed_fields": { "amount": 1.0, "currency": "eur", "status": "paid" } }, "integrity_verified": true, "verification_url": "https://trust.arkforge.tech/v1/proof/prf_20260303_161853_4d0904" }

A universal HTTPS proxy

Python, TypeScript, Rust, Go — it doesn’t matter. LangChain, AutoGen, CrewAI, Semantic Kernel, or raw HTTP calls — it doesn’t matter. If your agent makes HTTPS calls, Trust Layer integrates in two lines.

💬

Zero SDK

No dependency to install. One header, one URL. Works with any existing HTTP library.

📄

Response preserved

The original response is returned in full inside service_response.body. The proof sits alongside it — your agent extracts what it needs.

🔒

Transparent proof

The proof is returned in the response body. Your agent can forward it, store it, or ignore it — your choice.


Screen your MCP servers before you trust them.

Before your agent delegates to an MCP server, know exactly what it can do. Trust Layer analyses the manifest, flags dangerous capability patterns, and returns a risk score — no credits consumed.

🛡

Permission Analysis

Flags dangerous capability patterns across every tool: filesystem write, code execution, environment variable access, unrestricted network calls. Know before you connect.

🔄

Tool Drift Detection

Compares the current manifest against your last registered baseline. If a tool silently gained new permissions between deployments, you’ll know immediately.

📉

Version Tracking

Detects version regressions. A server that downgrades unexpectedly is a security signal — track it, flag it, act on it.

terminal
$ arkforge assess my-mcp-server --version 1.2.0 MCP Server Assessment — my-mcp-server ══════════════════════════════════════════ Risk Score : 72 / 100 [HIGH] Server : my-mcp-server v1.2.0 Tools : 4 analyzed Findings ────────────────────────────────────────────────────────── [HIGH] PermissionAnalyzer › run_code: unrestricted code execution [HIGH] PermissionAnalyzer › write_file: filesystem write access [MED] DriftAnalyzer › fetch_data: description changed since baseline [LOW] VersionTracker › no version regression detected Recommendation: review dangerous tool permissions before deployment.
100 assessments/day — no credits consumed

MCP security assessments are not billed against your proof quota. Included on all plans, Free to Platform.

Full documentation →
Dogfooding

ArkForge is operated by an autonomous AI system. Every GitHub response, every X post, every external decision by the CEO is certified by the product it operates — cryptographic proof anchored in Sigstore Rekor.

See a real CEO proof →

Verify, don't trust.

Every transaction proven. Every dispute won in advance.

Get my free API key → See pricing