Skip to content

IDProva launches April 7 — Registry packages coming at launch. Build from source now.

CLI Commands

Generate a new Ed25519 keypair.

Terminal window
idprova keygen [--output <path>]
FlagDescription
--output, -oFile path to save the secret key (default: stdout)

Output: Hex-encoded secret key and multibase-encoded public key.

Secret key (hex): 4a3b2c1d...
Public key (multibase): z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK

Create and sign an Agent Identity Document.

Terminal window
idprova aid create \
--id <did> \
--controller <did> \
--key <path> \
[--name <name>] \
[--description <desc>] \
[--model <model>] \
[--runtime <runtime>] \
[--trust-level <level>] \
[--output <path>]
FlagRequiredDescription
--idYesDID identifier (e.g., did:idprova:example.com:my-agent)
--controllerYesController DID
--keyYesPath to Ed25519 secret key file
--nameNoHuman-readable agent name
--descriptionNoAgent description
--modelNoAI model identifier (e.g., anthropic/claude-opus-4)
--runtimeNoRuntime environment identifier
--trust-levelNoTrust level: L0, L1, L2, L3, L4 (default: L0)
--output, -oNoOutput file path (default: stdout as JSON)

Output: W3C DID Document as JSON with verification methods, authentication, and agent metadata service extension.


Validate an AID document from a JSON file.

Terminal window
idprova aid verify <file>
ArgumentDescription
<file>Path to the AID JSON file

Checks: DID format, required fields, key encoding, metadata structure.


Resolve an AID from a registry.

Terminal window
idprova aid resolve <did>
ArgumentDescription
<did>DID to resolve (e.g., did:idprova:example.com:my-agent)

Issue a signed Delegation Attestation Token.

Terminal window
idprova dat issue \
--issuer <did> \
--subject <did> \
--scope <scopes> \
--expires-in <duration> \
--key <path>
FlagRequiredDescription
--issuerYesIssuer DID (the delegator)
--subjectYesSubject DID (the delegatee)
--scopeYesComma-separated scope strings (e.g., mcp:tool:*:read,mcp:resource:docs:write)
--expires-inYesExpiry duration: 1h, 24h, 7d, etc.
--keyYesPath to issuer’s Ed25519 secret key

Output: JWS compact serialization string.

Scope format: namespace:resource:action — see Scope Grammar.


Verify a DAT’s timing and claims.

Terminal window
idprova dat verify <token>
ArgumentDescription
<token>JWS compact serialization string

Checks: Algorithm (EdDSA required), timing (not expired, not before valid), claim structure, scope format.


Decode and pretty-print a DAT without verification.

Terminal window
idprova dat inspect <token>
ArgumentDescription
<token>JWS compact serialization string

Output: Formatted JSON showing header, claims (issuer, subject, scope, jti, expiry), and signature info.


Verify the hash chain integrity of a receipt log.

Terminal window
idprova receipt verify <file>
ArgumentDescription
<file>Path to JSONL receipt log file

Checks: Genesis hash, sequential chain integrity (each receipt’s previous_hash matches the hash of the prior entry), hash algorithm consistency.


Display statistics about a receipt log.

Terminal window
idprova receipt stats <file>
ArgumentDescription
<file>Path to JSONL receipt log file

Output: Total entry count, action type breakdown, time range, agent DIDs referenced.


FlagDescription
--help, -hShow help for any command
--version, -VShow version information
CodeMeaning
0Success
1Validation error (invalid AID, expired DAT, broken chain)
2I/O error (file not found, permission denied)