spec
2
总安装量
2
周安装量
#71011
全站排名
安装命令
npx skills add https://github.com/seriouscoderone/keri-claude --skill spec
Agent 安装分布
opencode
2
gemini-cli
2
claude-code
2
github-copilot
2
codex
2
kimi-cli
2
Skill 文档
KERI Protocol Specification Skill
KERI is a deterministic replicated state machine over a cryptographically rooted identifier namespace. It provides blockchain-equivalent security without global ordering, using append-only Key Event Logs (KELs), pre-rotation key commitments, and witness-based agreement (KAWA).
Architecture (7 Layers)
- Identifier Theory â AIDs, SCIDs, autonomic namespaces
- State Machine â KEL, key state, thresholds, rotation, delegation
- Message Semantics â Events, receipts, field labels, seals, signing
- Encoding â CESR native wire format (see cesr + cesr-encoding ref)
- Validation Engine â Acceptance rules, duplicity, recovery
- Availability â Witnesses, KAWA agreement
- Discovery â OOBI, BADA, OKEA endpoint management
Message Types
KEL events: icp (inception), rot (rotation), ixn (interaction), dip (delegated inception), drt (delegated rotation). Receipt: rct. Routed: qry/rpy (query/reply), pro/bar (prod/bare â sealed data), xip/exn (exchange inception/exchange).
Reference Files
- event-model.md â Field labels, all 12 message field orders, 7 seal types with count codes, signature attachment model, dual-index verification, config traits, delegation two-way peg
- cesr-encoding.md â CESR native encoding: version field (
0O), datetime/threshold/route encoding, CESR field orders for all message types, seal count codes - key-state-machine.md â Pre-rotation, fractionally weighted thresholds, general/reserve/custodial rotation, SQAR, cooperative delegation, keypair lifecycle, attack taxonomy, AID derivation
- validation.md â Verification vs validation, role-locality matrix, event classes, duplicity detection, first-seen policy, superseding recovery (Rules A/B/C), KAWA fault parameters and witnessing policy
- routing-discovery.md â OOBI variants and verification, BADA monotonic update policy, RUN (no-delete), OKEA endpoint authorization, JIT/NTK discovery
Key Invariants
- One KEL per AID, append-only, doubly hash-chained
- “First seen, always seen, never unseen”
- Rotation requires dual threshold: current
ktAND prior-nextnt - Delegation requires two-way peg: SealEvent in delegator +
diin delegatee - Empty
nlist at inception = non-transferable; at rotation = abandoned - Witnesses MUST be non-transferable AIDs
- All signatures attach via CESR codes, never as top-level fields