docs: add ScopeBlind integration guide (signed decision receipts for tools)#1548
Closed
tomjwxf wants to merge 1 commit intokyegomez:masterfrom
Closed
docs: add ScopeBlind integration guide (signed decision receipts for tools)#1548tomjwxf wants to merge 1 commit intokyegomez:masterfrom
tomjwxf wants to merge 1 commit intokyegomez:masterfrom
Conversation
… Swarms tools Adds docs/integrations/scopeblind.md documenting how to wrap Swarms tools with Ed25519-signed decision receipts via the scopeblind-swarms Python package (pip install scopeblind-swarms). Receipts use the Veritas Acta format (draft-farley-acta-signed-receipts IETF Internet-Draft), the same envelope used by Microsoft Agent Governance Toolkit, protect-mcp, sb-runtime, hermes-decision-receipts, and Signet. Any Swarms operator can now produce tamper-evident, offline-verifiable audit trails of every tool their agents call, with no fork of Swarms required. Design note inlined in the doc: Swarms does not expose pre/post tool hooks; the canonical interception point per upstream guidance is wrapping the tool callable before passing it to Agent(tools=[...]). scopeblind-swarms uses that extension point exactly; no patches to Swarms internals. No changes outside docs/integrations/scopeblind.md.
|
Hello there, thank you for opening an PR ! 🙏🏻 The team was notified and they will get back to you asap. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Adds an integration guide at
docs/integrations/scopeblind.mdfor scopeblind-swarms — a Python package that wraps any Swarms tool with Ed25519-signed, tamper-evident, offline-verifiable decision receipts in the Veritas Acta format.The same receipt format is used by:
Microsoft Agent Governance Toolkit (see docs: Tutorial 33 — Offline-Verifiable Decision Receipts microsoft/agent-governance-toolkit#1197 (comment); docs: add Signet to Tutorial 33 cross-implementation table microsoft/agent-governance-toolkit#1201 (comment); docs: sb-runtime integration guide (a Veritas Acta receipt format implementation) microsoft/agent-governance-toolkit#1202 (comment); feat: sb-runtime governance skill (signed decision receipts, nono-composable) microsoft/agent-governance-toolkit#1203 (comment); feat: GitHub Pages docs site with MkDocs Material (closes #347) microsoft/agent-governance-toolkit#1186 (comment);
feat(examples): physical-attestation-governed — cold chain sensor receipts microsoft/agent-governance-toolkit#1168 (comment);
feat(examples): protect-mcp governed example — Cedar policies + signed receipts microsoft/agent-governance-toolkit#1159 (comment);
feat: ScopeBlind protect-mcp integration — Cedar policy enforcement + verifiable receipts microsoft/agent-governance-toolkit#667 (comment))
protect-mcp / protect-mcp-adk (MCP + Google ADK)
sb-runtime (Rust runtime backend)
hermes-decision-receipts (aeoess / Agent Passport System bridge)
Signet (Prismer-AI, maintainer-self-certified)
bindu-scopeblind (Bindu / GetBindu)
15 implementations in total on the draft-02 IETF Implementation Status appendix. This PR brings Swarms into that cross-verifying ecosystem.
What's in the PR
Doc-only. One new file:
docs/integrations/scopeblind.md. No changes to Swarms core or to any existing file.The guide covers:
pip install scopeblind-swarms swarms)tool_name,action_ref,result_hash,policy_id,previousReceiptHash, Ed25519 signature)npx @veritasacta/verify receipt.json --key operator.pem)Design note on the extension point
Swarms does not expose pre/post tool hooks. The canonical interception point per upstream guidance (BaseTool's
_execute_single_function_calldiscussion in existing tool docs) is wrapping the tool callable before passing it toAgent(tools=[...]).scopeblind-swarmsuses that extension point exactly; it does not patch Swarms internals, subclass Agent, or modify any Swarms code path.Related
scopeblind-swarmsPyPI page: https://pypi.org/project/scopeblind-swarms/@veritasacta/verify(Apache-2.0, offline, zero dependencies on ScopeBlind or Swarms)Test plan
scopeblind-swarms@0.1.0APICc @kyegomez — the receipt-layer primitive composes cleanly with existing Swarms tool machinery. Happy to iterate on scope, style, or framing if there's anything you'd like adjusted. The only ask is a doc link; the adapter itself lives on PyPI and the ScopeBlind monorepo, not in swarms-core.
📚 Documentation preview 📚: https://swarms--1548.org.readthedocs.build/en/1548/