Readme
auths
Cryptographic identity for developers. One command to set up, Git-native storage, no central server.
Getting Started (10 seconds)
auths init
auths doctor
git commit - m " first signed commit"
auths verify HEAD
That's it. auths init generates keys, creates your identity, and configures Git signing.
Link another device
auths pair # On existing device — shows QR/code
auths pair --join ABC123 # On new device — enter the code
The Basics
auths sign — Sign a commit or artifact
auths sign HEAD # Sign latest commit
auths sign main..HEAD # Sign a range
auths sign ./release.tar.gz # Sign a file
auths verify — Verify signatures
auths verify # Verify HEAD
auths verify HEAD~3..HEAD # Verify a range
auths verify abc1234 # Verify specific commit
auths verify path/to/attestation # Verify attestation file
auths status — See your identity at a glance
auths status
auths whoami — Show the current identity
auths whoami
auths doctor — Health checks
auths doctor
# Exit code 0 = all checks pass, 1 = something needs attention
auths tutorial — Interactive walkthrough
auths tutorial
Advanced Commands
Run auths - - help- all to see the full command list:
Group
What it does
id
Create, rotate, export, and register identities
device
Link, revoke, and manage device authorizations
key
List, import, export, and delete keys
approval
Manage approval workflows
artifact
Sign, verify, and publish arbitrary files
policy
Lint, compile, test, and diff authorization policies
git
Generate allowed-signers files, install hooks
trust
Pin identity-to-key bindings (TOFU)
org
Manage organizations, members, and attestations
audit
Generate signing audit reports
agent
Start/stop the SSH agent daemon
witness
Run or manage KERI witness servers
scim
SCIM provisioning integration
config
View and modify configuration
emergency
Key compromise response (revoke, rotate, freeze)
completions
Generate shell completions
Run auths < group> - - help for details on any group.
CI Setup (GitHub Actions)
auths init - - profile ci creates an ephemeral in-memory identity scoped to the current run — no platform keychain required, no secrets to rotate.
Signing commits in CI
name : Signed Commits
on : [ push , pull_request ]
jobs :
build :
runs-on : ubuntu-latest
env :
AUTHS_KEYCHAIN_BACKEND : memory
steps :
- uses : actions/checkout@v4
- uses : dtolnay/rust-toolchain@stable
- name : Install Auths
run : cargo install --path crates/auths-cli --force
- name : Set up Auths (CI profile)
run : auths init --profile ci --non-interactive
- name : Run doctor (verify setup)
run : auths doctor
- name : Your build step
run : cargo build --release
Verifying commit signatures in CI
name : Verify Commit Signatures
on : [ pull_request ]
jobs :
verify :
runs-on : ubuntu-latest
steps :
- uses : actions/checkout@v4
with :
fetch-depth : 0
- uses : dtolnay/rust-toolchain@stable
- name : Install Auths
run : cargo install --path crates/auths-cli --force
- name : Verify commits on this PR
run : auths verify HEAD
Installation
cargo install -- path crates/auths-cli -- force
This installs three binaries: auths , auths-sign , and auths-verify . Ensure ~/.cargo/bin is in your PATH.