No Client Identity
Create one to connect to servers
Anatomy of a Tamper-Evident Proof
Watch how MCP-I creates cryptographically sealed audit records. Each step is deterministic—the same input always produces the same proof.
Prepare
Construct
Sign
Prepare · Step 1
Capture the Interaction
Record the tool request and response. These payloads will be cryptographically bound to the agent's identity.
RFC 8785
JSON Canonicalization ensures identical data produces identical bytes across any system.
RFC 7515
JSON Web Signature provides a portable, self-contained proof format.
Ed25519
High-performance elliptic curve signatures with compact 64-byte output.