Skip to content
Native SDKs

Mobile & AI Agent SDKs

Same trust scoring engine, platform-native secure key storage. One API key across every platform.

Python (AI Agents)

For LangChain, CrewAI, or any Python agent. Wraps requests with ECDSA signatures.

python
pip install tokenforge

from tokenforge import TokenForge

tf = TokenForge(api_key="tf_your_api_key")

# Protect an AI agent HTTP call
response = tf.fetch("https://api.example.com/data")

# Works with LangChain / CrewAI — wrap your HTTP tool
@tf.protect
def call_api(url: str) -> dict:
    return requests.get(url).json()

Go (Microservices)

Drop-in http.Client replacement. Signs every outbound request with device-bound keys.

go
go get github.com/opensyber/tokenforge-go

package main

import "github.com/opensyber/tokenforge-go"

func main() {
    tf := tokenforge.New("tf_your_api_key")
    client := tf.HTTPClient() // drop-in http.Client replacement

    resp, _ := client.Get("https://api.example.com/data")
    defer resp.Body.Close()
}

MCP Server (Claude / Cursor / Claude Code)

Add to your MCP config. Every tool call is signed automatically. Zero code changes.

json
// Add to your MCP config (claude_desktop_config.json, .cursor/mcp.json, etc.)
{
  "mcpServers": {
    "tokenforge": {
      "command": "npx",
      "args": ["@opensyber/tokenforge-mcp"],
      "env": { "TOKENFORGE_API_KEY": "tf_your_api_key" }
    }
  }
}

// Every tool call through the MCP server is automatically signed.
// Works with Claude Desktop, Cursor, Claude Code, and any MCP client.

Swift (iOS)

Keys stored in Keychain. URLSession requests signed automatically.

swift
// Package.swift — add dependency
.package(url: "https://github.com/opensyber/tokenforge-swift", from: "1.0.0")

// AppDelegate.swift
import TokenForge

TokenForge.configure(apiKey: "tf_your_api_key")

// Usage — URLSession requests are signed automatically
let (data, _) = try await TokenForge.session.data(
    from: URL(string: "https://api.example.com/data")!
)
// Keys stored in Keychain (kSecAttrAccessibleAfterFirstUnlock)

Kotlin (Android)

Keys stored in hardware-backed Android Keystore. OkHttp interceptor signs all requests.

kotlin
// build.gradle.kts
dependencies {
    implementation("cloud.opensyber:tokenforge:1.0.0")
}

// Application.kt
import cloud.opensyber.tokenforge.TokenForge

TokenForge.init(context, apiKey = "tf_your_api_key")

// Usage — OkHttp interceptor signs every request
val client = OkHttpClient.Builder()
    .addInterceptor(TokenForge.interceptor())
    .build()
// Keys stored in Android Keystore (hardware-backed)

React Native

Unified SDK with platform-native key storage. Global fetch interceptor signs every call.

typescript
npm install @opensyber/tokenforge-react-native

// App.tsx
import { TokenForgeProvider } from '@opensyber/tokenforge-react-native';

export default function App() {
  return (
    <TokenForgeProvider apiKey="tf_your_api_key">
      <YourApp />
    </TokenForgeProvider>
  );
}
// iOS: Keychain storage | Android: Keystore storage
// All fetch() calls signed automatically via global interceptor