2 IETF Drafts · 64 Open Source Packages · 94 Countries

Audit is not an observation.
It is a precondition.

Open-source AI trust infrastructure. The complete protocol stack for provenance, identity, and compliance. Air-gapped to enterprise. Built for AI Act, NIS2, and GDPR.

61,000+
PyPI Downloads
94
Countries
64
Open Source Packages
14
MCP Servers

The Protocol Stack

Six protocols. One trust layer. Each solves a specific problem in AI operations — from provenance to identity, from air-gapped inference to cross-border compliance.

📜

TIBET — Provenance

Transaction/Interaction-Based Evidence Trail. Four dimensions: ERIN (content), ERAAN (references), EROMHEEN (context), ERACHTER (intent). Every AI action gets a cryptographically signed audit token before execution.

🔑

JIS — Identity

JTel Identity Service. Verifies who is calling, not just what they claim. Behavior-based trust scoring via FIR/A. Spoof-proof AI-to-AI and human-to-AI identity verification.

🛡️

SNAFT — Firewall

Factory-level immutable rules. Hard boundaries that cannot be overridden by any AI, prompt, or configuration. The safety net beneath everything else.

🌐

SEMA — Translation

Semantic cross-border protocol. Translates compliance requirements between jurisdictions. EU AI Act, California AB 853, Singapore MAS — one policy engine, multiple frameworks.

📡

Sensory — Air-Gapped

Sensor integration for environments without internet. Combined with OomLlama for fully sovereign AI: local inference, local audit, no cloud dependency. 3,975+ downloads.

🧠

OomLlama — Local AI

Run LLMs on your own hardware. GGUF model support with TIBET provenance built in. From Raspberry Pi to GPU clusters. 4,855+ downloads.

Built for Compliance

The EU AI Act is not optional. NIS2 affects critical infrastructure. GDPR applies to AI decisions. TIBET handles all three from a single audit layer.

EU AI Act

High-risk AI systems require documented decision trails. TIBET provides Article 11-compliant logging out of the box.

NIS2 Directive

Critical infrastructure AI needs incident response capability. TIBET's immutable audit trail enables rapid forensics.

GDPR Article 22

Automated decision-making requires explainability. TIBET's ERACHTER (intent) field documents the "why" for every action.

Compliance isn't a checkbox. It's infrastructure. Build it in, or bolt it on later at 10x the cost.

Technical Architecture

A layered trust stack. Each protocol handles one concern. Together they form a complete infrastructure for auditable, sovereign AI operations.

┌─────────────────────────────────────────────────────────────────┐
│                    YOUR AI APPLICATION                         │
│        Claude · Mistral · Gemini · Ollama · OomLlama · Custom    │
├─────────────────────────────────────────────────────────────────┤
│  MCP SERVERS (14)                                              │
│  tibet · sensory · inject-bender · rabel · ollama · gemini       │
├────────────────────┬────────────────────┬───────────────────────┤
│  TIBETJISSEMA                │
│  ProvenanceIdentity + FIR/ACross-border        │
│  ERIN·ERAANTrust scoringPolicy translation  │
│  EROMHEEN·ERACHTERSpoof protectionEU↔US↔APAC          │
├────────────────────┴────────────────────┴───────────────────────┤
│  SNAFT — Factory Firewall (immutable rules, hard boundaries)    │
├─────────────────────────────────────────────────────────────────┤
│  INFRASTRUCTURE                                                 │
│  OomLlama (local LLM) · Sensory (air-gapped) · tibet-vault (secrets) │
│  inject-bender (security) · tibet-audit (compliance)             │
├─────────────────────────────────────────────────────────────────┤
│  STORAGE                                                        │
│  File / SQLite / PostgreSQL / Your Backend                       │
└─────────────────────────────────────────────────────────────────┘
                
# Compliance scanning — like Lynis, but for regulations pip install tibet-audit tibet-audit scan tibet-audit status # Create provenance token BEFORE action pip install tibet-core from tibet_core import TibetToken token = TibetToken(erin="deploy hotfix", erachter="auth bug fix", eraan=["JIRA-1234"]) # Local AI — no cloud, full sovereignty pip install oomllama oomllama run qwen2.5:7b --prompt "Analyze this contract" # Air-gapped sensor integration pip install sensory sensory collect --source serial --tibet-audit

Ecosystem — 64 Packages

Modular by design. Install what you need. Every package works standalone, or as part of the full stack. Top packages by adoption:

tibet-audit

11,626 downloads

Compliance scanner — like Lynis, but for regulations. AI Act, NIS2, GDPR scanning with auto-fix capability.

oomllama

4,855 downloads

Local LLM inference. Run models on your own hardware. GGUF support. No cloud required. Sovereign AI from edge to enterprise.

ainternet

2,656 downloads

AI-to-AI networking protocol. .aint domain resolution, I-Poll messaging, agent discovery. The DNS for AI agents.

mcp-server-sensory

2,324 downloads

MCP server for sensor integration. Serial, GPIO, industrial protocols. Enables AI in air-gapped and IoT environments.

tibet-forge

1,928 downloads

Trust scoring and certification. Quantified trust metrics for code, AI models, and system components.

idd-cli

1,736 downloads

Individual Device Derivate CLI. Identity management for AI agents and devices. Unique identifiers with behavioral trust.

sensory

1,651 downloads

Sensor abstraction library. Collect, process, and audit physical-world data with TIBET provenance attached.

mcp-server-tibet

1,509 downloads

TIBET token management via MCP. Create, verify, and chain provenance tokens from Claude, Cursor, or any MCP client.

tibet-core

1,537 downloads

The provenance kernel. ERIN/ERAAN/EROMHEEN/ERACHTER token creation with cryptographic signing.

mcp-server-rabel

1,469 downloads

Persistent AI memory via MCP. Long-term context retention across sessions with auditable history.

inject-bender

1,731+ downloads (incl. MCP)

Input validation and prompt injection defense. NIS2-compliant incident response. Security middleware with legal audit trail.

tibet-vault

587 downloads

Time-locked secrets with dead man's switches. Encrypted content that unlocks on schedule or emergency conditions.

View all 64 packages on PyPI →

Solutions

Four domains. One stack. Every piece works independently or as part of the whole.

Identity & Trust

JIS + FIR/A
  • jis-core — JTel Identity Service
  • idd-cli — Individual Device Derivate management
  • FIR/A — Behavior-based trust scoring (0.0–1.0)
  • tibet-pqc — Post-quantum cryptography ready
  • Spoof-proof calling: verify intent, not just headers
pip install jis-core

Sovereign AI / Air-Gapped

No Cloud Required
  • oomllama — Local LLM inference (4,855 downloads)
  • sensory — Sensor integration for offline environments
  • mcp-server-sensory — MCP bridge for physical-world data
  • rapid-rag — Local document retrieval
  • From Raspberry Pi to GPU clusters — your hardware, your data
pip install oomllama

Security & Incident Response

Defense in Depth
  • inject-bender — Prompt injection defense + NIS2 incident response
  • tibet-claw — @tibet_guard security decorator
  • tibet-nis2 — NIS2 24-hour reporting compliance
  • tibet-soc — SOC integration for AI monitoring
  • 14 MCP servers — integrate with Claude, Mistral, Gemini, Ollama
pip install inject-bender

All packages open source. MIT licensed. Self-hosted by design.

Cross-Platform Distribution

PyPI, Docker Hub, npm — deploy however your stack requires.

61,000+
PyPI Downloads
64 packages
759+
Docker Hub Pulls
humotica + jtmeent orgs
1,000+
npm Downloads
JavaScript/TypeScript SDK
# Docker — production containers docker pull humotica/tibet-llm-router:latest docker pull humotica/oomllama:latest # PyPI — Python packages pip install tibet-audit oomllama sensory inject-bender # npm — JavaScript SDK npm install @humotica/tibet-core
Docker Hub → · PyPI →

Research & Standards

Peer-reviewed specifications. Published on IETF and Zenodo.

IETF Internet-Draft

draft-vandemeent-tibet-provenance

TIBET Protocol Specification: Cryptographic provenance for trustworthy AI systems

IETF Internet-Draft

draft-vandemeent-jis-identity

JIS: JTel Identity Service — Semantic security protocol for intent-first identity verification

Zenodo — TIBET Protocol

Cryptographic Provenance for Trustworthy AI Systems

van de Meent, J.T. (2026)

Zenodo — JIS: JTel Identity Service

Semantic Security Protocol for Intent-First Identity Verification

van de Meent, J.T. (2026)

Zenodo — Bilateral Trust Protocol

Ending Spoofing Through Verified Intent

van de Meent, J.T. (2026)

Zenodo — The JIS-TIBET Coupling

Audit as Precondition, Not Observation

van de Meent, J.T. (2026)

Zenodo — OomLlama

Efficient 2-bit and 4-bit Quantization for LLMs

van de Meent, J.T. (2026)

Zenodo — The Intent-Centric Web

Architecture for Purpose-Driven Computing

van de Meent, J.T. (2026)

Start Building Trust Infrastructure

64 open source packages. 2 IETF specifications. 61,000+ downloads across 94 countries. From compliance scanning to sovereign AI — the stack is ready.

pip install tibet-audit View on GitHub Read the IETF Draft