Provides multi-chain anchoring capabilities for Bitcoin blockchain integration as part of the VaultMesh governance and constitution management system
Enables Ethereum blockchain anchoring and integration for VaultMesh governance entries and constitutional amendments
Exposes VaultMesh-Architect subsystem spawning, multi-chain anchoring, governance tooling, and alchemical phase orchestration capabilities through Node.js runtime
Generates Rust crate skeletons and manifests when spawning new subsystems within the VaultMesh architecture
VaultMesh Architect MCP Server
Constitution CLI Dry-Run: verifies that the terminal amendment workflow remains operable and JSON-RPC output parses correctly on every push.
Governance Checks
Check | Purpose | Badge |
CI Tests | Unit + E2E validation | |
CLI Dry-Run | Amendment ritual canary | |
Release Proof | Anchors artifact hashes |
An MCP server that exposes the VaultMesh-Architect skill as explicit, auditable tools. It supports subsystem spawning, multi-chain anchoring (dry-run), Tem invocation, LAWCHAIN governance entries, capability issuance, CRDT realm helpers, and alchemical phase orchestration.
Status: initial scaffold with safe defaults and dry-run behavior.
Quick Start
Install dependencies
Requires Node.js 18+
From
vaultmesh-architect-mcp/:
npm installRun as MCP server (stdio)
npm start -- --stdioConfigure your MCP client
Example (Claude Desktop JSON config snippet):
{ "mcpServers": { "vaultmesh-architect": { "command": "node", "args": ["server.js", "--stdio"], "cwd": "${HOME}/vaultmesh-architect-mcp" } } }
Heartbeat Logging (Optional)
To get a visible signal in your terminal without breaking stdio, enable a stderr heartbeat:
# flag-based node server.js --stdio --heartbeat # or via env MCP_HEARTBEAT=1 MCP_HEARTBEAT_MS=15000 node server.js --stdioOutput appears on stderr as:
vaultmesh-architect: listening on stdio (dry_run=...)vaultmesh-architect: heartbeateveryMCP_HEARTBEAT_MSms (default 30000)
Tests
Install dev deps and run tests:
npm testThe test harness runs the server as a black box over stdio (JSON-RPC) and writes artifacts under a temp dir via
VM_WORKDIR.
Coverage
Generate coverage (c8, includes subprocesses) and open report:
npm run coverage npm run coverage:openBranch/line thresholds are enforced (lines 85, funcs 85, branches 80, statements 85). CI uploads
coverage/as an artifact.
Golden Manifest Snapshot
tests/hash-manifest.spec.mjssnapshots the file ordering and Merkle root fromcompute_merkle_rootusing a deterministic fixture.Snapshot lives at
tests/__snapshots__/hash-manifest.spec.mjs.snapand will fail on ordering regressions.
Constitution Resources
Every VaultMesh deployment carries its own auditable constitution, available as a first-class MCP resource. Any amendment is ratified through a signed LAWCHAIN “charter” entry and can be anchored across chains.
Examples (JSON-RPC over stdio):
Amendment Flow (Optional Governance)
Propose an amendment with a full replacement YAML (staged, requires approval):
printf '{"jsonrpc":"2.0","method":"tools/call","params":{"name":"propose_charter","arguments":{"replacement_yaml":"...new YAML...","note":"amendment 1"}},"id":4}\n' | node server.js --stdioApprove a proposal and finalize the charter (with or without applying the YAML change):
printf '{"jsonrpc":"2.0","method":"tools/call","params":{"name":"approve_charter","arguments":{"proposal_id":"<id>","approver":"dao:alice","apply_update":true}},"id":5}\n' | node server.js --stdioAnchor receipts as usual via
tools/compute_merkle_rootandtools/multi_anchor.
Terminal Workflow
Amend the constitution from a terminal (mirrors the MCP prompt flow):
The script fetches -> opens your editor -> diffs -> proposes -> optionally approves, and records LAWCHAIN entries along the way.
Verification
Verify a tagged release by confirming tarball checksum and matching LAWCHAIN/receipt proofs:
This downloads the tarball + checksums, recomputes SHA-256, and ensures the hash appears in LAWCHAIN entries or anchor receipts.
Verify a Release + Receipts
This verifies checksum, confirms LAWCHAIN proof, and prints RFC-3161 / ETH / BTC receipt statuses for the artifact (works in both dry-run and live modes).
Working Directory Override
To direct outputs to a specific path without changing the process CWD, set
VM_WORKDIR:VM_WORKDIR=/path/to/repo node server.js --stdio
Environment Variables
DRY_RUN(default:true) — iftrue, anchoring returns simulated receipts, no chain calls.RFC3161_URL— TSA endpoint (only used ifDRY_RUN=false).ETH_RPC_URL— Ethereum RPC URL (only used ifDRY_RUN=false).BTC_RPC_URL— Bitcoin RPC URL (only used ifDRY_RUN=false).LAWCHAIN_PRIVATE_KEY_PEM— Ed25519 PEM for signing LAWCHAIN entries and capabilities. If absent, an ephemeral key is generated per process.
Tooling Overview
spawn_subsystem(name, organType, rust=true)
Generates minimal k8s manifest and Rust crate skeleton under
manifests/andcrates/.Emits a LAWCHAIN
subsystem_spawndraft.
compute_merkle_root(root=".", out="manifests/hash-manifest.json")
Computes a repository hash manifest and Merkle-like root (SHA-256 based placeholder).
multi_anchor(manifestPath)
Orchestrates RFC3161/ETH/BTC anchoring. Honors
DRY_RUN.Writes receipts in
governance/anchor-receipts/and returns a consolidated proof object.
invoke_tem(threatType, realm, autoRemediate=false, lastGoodRoot?)
Transmutes threats into defensive capabilities. Writes an incident log and returns a suggested defense.
generate_lawchain_entry(type, payload)
Creates a signed LAWCHAIN entry in
governance/lawchain/.
issue_capability(subject, scopes, ttlSeconds)
Issues a signed, revocable capability (Ed25519). Returns a token-like object.
get_phase(realm) / evolve_phase(realm, action)
Reads or advances the alchemical cycle, enforcing Nigredo→Albedo→Citrinitas→Rubedo order.
Security Defaults
Redacts secret-like values in tool outputs (unless explicitly requested).
Short-lived in-memory keys if
LAWCHAIN_PRIVATE_KEY_PEMis not provided.Writes artifacts to local dirs under the server CWD; no network calls when
DRY_RUN=true.
Notes
Hash/Merkle calculations use SHA-256 placeholder. Swap in BLAKE3 as desired.
Anchoring implementations are stubbed unless
DRY_RUN=falseand endpoints are set.This server is intentionally conservative and auditable.
Sanity Check (JSON-RPC init)
You can simulate a minimal MCP handshake from the shell:
You should see a JSON response on stdout confirming initialization.
This server cannot be installed
hybrid server
The server is able to function both locally and remotely, depending on the configuration or use case.
Enables governance and orchestration of VaultMesh deployments through subsystem spawning, multi-chain anchoring, threat mitigation, constitutional amendments, and LAWCHAIN governance tracking. Provides auditable tools for managing decentralized infrastructure with cryptographic proofs and alchemical phase orchestration.
- Governance Checks
- Quick Start
- Heartbeat Logging (Optional)
- Tests
- Coverage
- Golden Manifest Snapshot
- Constitution Resources
- Amendment Flow (Optional Governance)
- Terminal Workflow
- Verification
- Verify a Release + Receipts
- Working Directory Override
- Environment Variables
- Tooling Overview
- Security Defaults
- Notes
- Sanity Check (JSON-RPC init)