Mobile & AI Agent SDKs
Same trust scoring engine, platform-native secure key storage. One API key across every platform.
Python (AI Agents)
For LangChain, CrewAI, or any Python agent. Wraps requests with ECDSA signatures.
python
pip install tokenforge
from tokenforge import TokenForge
tf = TokenForge(api_key="tf_your_api_key")
# Protect an AI agent HTTP call
response = tf.fetch("https://api.example.com/data")
# Works with LangChain / CrewAI — wrap your HTTP tool
@tf.protect
def call_api(url: str) -> dict:
return requests.get(url).json()Go (Microservices)
Drop-in http.Client replacement. Signs every outbound request with device-bound keys.
go
go get github.com/opensyber/tokenforge-go
package main
import "github.com/opensyber/tokenforge-go"
func main() {
tf := tokenforge.New("tf_your_api_key")
client := tf.HTTPClient() // drop-in http.Client replacement
resp, _ := client.Get("https://api.example.com/data")
defer resp.Body.Close()
}MCP Server (Claude / Cursor / Claude Code)
Add to your MCP config. Every tool call is signed automatically. Zero code changes.
json
// Add to your MCP config (claude_desktop_config.json, .cursor/mcp.json, etc.)
{
"mcpServers": {
"tokenforge": {
"command": "npx",
"args": ["@opensyber/tokenforge-mcp"],
"env": { "TOKENFORGE_API_KEY": "tf_your_api_key" }
}
}
}
// Every tool call through the MCP server is automatically signed.
// Works with Claude Desktop, Cursor, Claude Code, and any MCP client.Swift (iOS)
Keys stored in Keychain. URLSession requests signed automatically.
swift
// Package.swift — add dependency
.package(url: "https://github.com/opensyber/tokenforge-swift", from: "1.0.0")
// AppDelegate.swift
import TokenForge
TokenForge.configure(apiKey: "tf_your_api_key")
// Usage — URLSession requests are signed automatically
let (data, _) = try await TokenForge.session.data(
from: URL(string: "https://api.example.com/data")!
)
// Keys stored in Keychain (kSecAttrAccessibleAfterFirstUnlock)Kotlin (Android)
Keys stored in hardware-backed Android Keystore. OkHttp interceptor signs all requests.
kotlin
// build.gradle.kts
dependencies {
implementation("cloud.opensyber:tokenforge:1.0.0")
}
// Application.kt
import cloud.opensyber.tokenforge.TokenForge
TokenForge.init(context, apiKey = "tf_your_api_key")
// Usage — OkHttp interceptor signs every request
val client = OkHttpClient.Builder()
.addInterceptor(TokenForge.interceptor())
.build()
// Keys stored in Android Keystore (hardware-backed)React Native
Unified SDK with platform-native key storage. Global fetch interceptor signs every call.
typescript
npm install @opensyber/tokenforge-react-native
// App.tsx
import { TokenForgeProvider } from '@opensyber/tokenforge-react-native';
export default function App() {
return (
<TokenForgeProvider apiKey="tf_your_api_key">
<YourApp />
</TokenForgeProvider>
);
}
// iOS: Keychain storage | Android: Keystore storage
// All fetch() calls signed automatically via global interceptor