

Quantum-Safe File Attestation
Function
Available ActionsEach successful request consumes credits as outlined below.
attest_artifact25crverify_attestation5crget_public_key5cr
Details
Issue formally verified, post-quantum cryptographic attestation certificates for any file. Every attestation is backed by a proof-carrying certificate bundle whose acceptance logic is proven correct in Lean 4. Signing uses ML-DSA-65 from the NIST post-quantum standard, executed through PQClean standardized runtimes with the private key secured in a hardware security module. A 4-check verification pipeline confirms signature validity, manifest consistency, artifact integrity, and certificate Merkle-tree integrity — all must pass. Anyone can verify certificates independently using the open-source offline verifier. No trust in our infrastructure required.
Use Cases
Sign software releases with formally verified post-quantum cryptography, Create proof-carrying attestation certificates with Lean 4 verified acceptance kernels, Verify file integrity with NIST-standardized ML-DSA-65 digital signatures and PQClean runtimes, Generate compliance evidence for SOC 2 SOX HIPAA and regulatory audits with cryptographic proof chains, Timestamp and cryptographically attest intellectual property artifacts with tamper-evident CAB bundles, Verify software supply chain integrity with 4-check verification pipeline, Issue verifiable certificates for code repositories and release archives backed by formal proofs, Provide independent verification keys for third-party auditors and partners, Create provenance records for AI model weights and training data with quantum-safe signatures, Attest firmware images and embedded software updates with hardware-backed signing, Notarize documents with post-quantum signatures backed by information-theoretic security foundations, Sign configuration files and infrastructure-as-code with formally verified cryptographic protocol stack
Connect Your Agent In 5 Min
Watch the setup guide for your platform
Or Install Locally
STDIO connector for Claude Code, Codex, Cursor, Zed, and other LLMs that require STDIO or custom connections. This lightweight connector routes requests to https://api.agentpmt.com/mcp. All tool execution happens in the cloud and the server cannot edit any files on your computer.
npm install -g @agentpmt/mcp-routeragentpmt-setupAbout this Product
How It Works
Upload a file and receive a cryptographic attestation package that mathematically proves what the file contained at the moment it was signed. The attestation binds your file's SHA-256 hash, a timestamp, and any metadata you provide into a signed manifest using ML-DSA-65 (Dilithium3 / FIPS 204).
Formally Verified Acceptance Kernel
Unlike conventional code-signing tools where the verification logic is tested but not proven, every attestation includes a Carried Algebraic Bundle (CAB) whose acceptance kernel has been formally verified in Lean 4. The verification logic is mathematically proven correct — not just tested against known inputs. The kernel includes a verified C implementation extracted directly from the Lean 4 proof source.
Proof-Carrying Certificate Bundles
Each attestation package contains a CAB bundle that cryptographically binds three elements into a single tamper-evident envelope: the artifact hash, the proof commitment, and the manifest signature. The bundle includes a Merkle tree over all verification artifacts (kernel source, provenance metadata, and expected outputs), ensuring that any modification to any component is detectable.
4-Check Verification Pipeline
Every verification — whether through the hosted API or the standalone offline verifier — runs four independent checks that must all pass for acceptance:
- Signature validity — the ML-DSA-65 signature over the canonical manifest is cryptographically correct
- Manifest consistency — the package ID matches the SHA-256 of the canonical manifest bytes
- Artifact integrity — the file's SHA-256 matches what was recorded in the signed manifest
- CAB certificate integrity — the Merkle tree over all bundle artifacts verifies against the committed root
NIST PQC Parameter Coverage
The underlying VerifiedPQC protocol stack supports all 6 NIST post-quantum parameter sets: ML-KEM-512, ML-KEM-768, ML-KEM-1024 for key encapsulation, and ML-DSA-44, ML-DSA-65, ML-DSA-87 for digital signatures. The attestation service uses ML-DSA-65 (security level 3) for signing, backed by PQClean reference implementations — real, audited, standardized byte-level runtimes, not toy cryptography.
Hardware Key Protection
The ML-DSA-65 signing key is provisioned inside a Google Cloud KMS hardware security module. The private key never leaves the HSM — signing requests are sent to KMS, which returns the signature. Even if the service infrastructure were fully compromised, the signing key cannot be extracted. Every signing operation is logged by Google Cloud for audit purposes.
Security Foundations
The security model draws on information-theoretic foundations including privacy amplification and the leftover hash lemma. Constructive hardness guarantees are backed by contextuality-based impossibility proofs for the underlying lattice assumptions. These are not just computational security claims — the protocol stack includes formally verified components with mathematical correctness proofs.
Independent Verification
Attestation certificates can be verified without any connection to this service. The open-source standalone verifier is available at github.com/Abraxas1010/verified-pqc-verifier. It includes the ML-DSA-65 verification binary, the trust anchor with the issuer's public key, and a step-by-step guide. No account, API access, or trust in our servers is required. The cryptographic proof is self-contained.
Independent Audit
An independent operational audit (2026-03-28) confirmed the full protocol stack: runtime replay correctness, byte-level transport verification, mutation rejection, cross-backend interoperability, fuzz rejection, policy scenario enforcement, and performance envelope compliance across all supported parameter sets.









