Server data from the Official MCP Registry
Zero-knowledge attestation for agent capability and trust score claims
Zero-knowledge attestation for agent capability and trust score claims
Remote endpoints: streamable-http: https://hive-mcp-zk-attestation.onrender.com/mcp
Valid MCP server (1 strong, 1 medium validity signals). 2 known CVEs in dependencies Imported from the Official MCP Registry.
8 tools verified · Open access · 2 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Remote Plugin
No local installation needed. Your AI client connects to the remote endpoint directly.
Add this to your MCP configuration to connect:
{
"mcpServers": {
"io-github-srotzin-hive-mcp-zk-attestation": {
"url": "https://hive-mcp-zk-attestation.onrender.com/mcp"
}
}
}From the project's GitHub README.
Verifiable agent state attestations for the autonomous agent economy. RFC-stage v0.1.1.
A Model Context Protocol shim that lets any autonomous agent emit a zero-knowledge attestation of its internal state hash and DID. The primary verification target is Aleo snarkVM (Varuna over BLS12-377), with native Hive verification next, and Risc0 / Plonky2 referenced as future research targets. Attestation-only. No asset bridging. No custody. No wrapped value.
Brand colour: Hive Civilization gold #C08D23.
An attestation primitive for autonomous agents. The shim exposes five MCP tools that together let one agent prove to another agent — or to a regulator, counterparty, or auditor — that:
The agent never reveals its state. The verifier never learns more than the boolean result and the public inputs. The audit trail is anchored on a public chain. The verification key is portable to compatible verifiers — primarily Aleo snarkVM via Leo.
Autonomous agents transact, hold state, and make decisions on behalf of users. Existing agent-to-agent protocols — MCP, A2A, ACP — assume the agent is willing to publish what it knows. That assumption breaks the moment two agents need to negotiate without leaking inventory, model weights, prompt history, or counterparty positions.
Zero-knowledge proofs are the standard cryptographic answer. The plumbing has not been wired into the MCP / A2A surface that agent runtimes already speak. This shim is that wiring.
Honest priority order. Every name below is a public, ecosystem-neutral verifier or a research direction. There is no co-branding, no partnership, and no shared roadmap with any of these projects.
snark.verify opcode (synthesizer/program/src/logic/instruction/operation/snark_verify.rs), which accepts Varuna proofs and verification keys. The TypeScript SDK @provablehq/sdk exposes VerifyingKey.verify() for client-side checks. Mainnet endpoint: https://api.provable.com/v2./v1/zk/* publishes.┌─────────────┐ state hash + DID ┌────────────────────────┐
│ Agent (any) │ ─────────────────────▶ │ zk_attest_agent_state │
└─────────────┘ │ (attestation payload) │
└─────────────┬──────────┘
│ commitment
▼
┌────────────────────────┐
│ zk_anchor_to_base │
│ commitment → Base L2 │
└─────────────┬──────────┘
│ tx_hash
▼
┌────────────────────────┐
│ Base L2 (anchor) │
└─────────────┬──────────┘
│
attestation consumed by │
downstream verifier │
▼
┌──────────────────────┬─────────────────────────┐
│ Aleo snarkVM │ Native Hive backend │
│ (Varuna/BLS12-377 │ (verification at │
│ via Leo programs in │ hivemorph; not yet │
│ hive-leo-circuits │ rails-live) │
│ — future repo) │ │
└──────────────────────┴─────────────────────────┘
Hive emits the attestation. Base anchors the commitment. Verification happens either (a) inside snarkVM via Leo programs that consume the attestation and call snark.verify against a Varuna verification key, or (b) inside the Hive backend once /v1/zk/* publishes. The Leo programs themselves will live in a separate hive-leo-circuits repository — that repo is future work and is not part of this shim.
Earlier drafts of this shim referenced Groth16 over BN254 and Plonk as if they were first-class. They are not. Aleo's mainnet verification path is Varuna over BLS12-377, and a generic Groth16/BN254 → BLS12-377 verifier inside snarkVM would be roughly two million constraints — researched, not shipped. Groth16 and Plonk remain in this repo only as research-stage references for hypothetical bring-your-own-verifier integrations.
The whole point of v0.1.1 is honesty about where the integration actually is. Read this section before integrating.
hive-leo-circuits repository will carry that cost; this shim does not./v1/zk/* publishes. The tool surface, costs, and circuit catalog are stable across the v0.1 RFC.Stated explicitly so there is no ambiguity:
The shim is designed against three concrete threats:
The shim does not defend against: a compromised agent forging its own state hash before proving it (garbage in, valid proof of garbage out), or a verifier choosing to trust an unrelated verification key. Both are upstream of this primitive.
| Tool | Cost | Status |
|---|---|---|
zk_attest_agent_state | $0.05 USDC on Base | 503 backend pending |
zk_verify_proof | Free | 503 backend pending |
zk_anchor_to_base | $0.02 USDC + L1 gas | 503 backend pending |
zk_list_circuits | Free | 503 backend pending (stable circuit catalog returned inline) |
zk_query_attestation | Free | 503 backend pending |
The backend at https://hivemorph.onrender.com/v1/zk/* is RFC-stage. Until it ships, every paid tool returns:
{
"error": "backend_pending",
"retry_after": 86400,
"message": "zk attestation rails are RFC-stage. Backend endpoints publish when the spec is finalized. Tool surface, costs, and circuit list are stable."
}
The MCP shim, tool surface, costs, and circuit catalog are stable across the v0.1 RFC. Calling agents can integrate now and consume attestations the moment the backend is live.
Real Base USDC. No mocks, no testnet, no simulated settlement. Recipient (canonical Hive treasury, EVM): 0x15184bf50b3d3f52b60434f8942b7d52f2eb436e. Pricing is denominated in USDC; payment is collected via x402 PaymentRequired (HTTP 402) on the paid tools.
git clone https://github.com/srotzin/hive-mcp-zk-attestation
cd hive-mcp-zk-attestation
npm install
node server.js
Then point any MCP client at http://localhost:3000/mcp. Discovery endpoints:
GET /health — health probeGET /.well-known/mcp.json — MCP manifestGET /.well-known/agent.json — A2A AgentCardGET /.well-known/oac.json — Open Agent Card JSON-LDcurl -s -X POST http://localhost:3000/mcp \
-H 'Content-Type: application/json' \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"zk_list_circuits","arguments":{}}}'
While the backend is RFC-stage, this returns the stable circuit catalog inline.
MIT. See LICENSE.
This MCP server is part of the Hive Civilization gamification surface (10-mechanic capability taxonomy).
Surface tags: gamification.spec.v1 · gamification.surface.public · gamification.signal.read-only · gamification.settlement.real-rails
Real rails on Base L2 (USDC 0x833589fCD6eDb6E08f4c7C32D4f71b54bdA02913). Read-only signal layer. Brand gold #C08D23.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.