Back to Home
trebortGolin icon

amorce

Verified Safe

by trebortGolin

Overview

Provides a secure, cryptographic trust layer and orchestrator for AI agent communication, enabling cross-framework interaction, LLM discovery, and Human-in-the-Loop (HITL) approvals.

Installation

Run Command
docker run -d --name amorce-orchestrator -p 8080:8080 -v $(pwd)/config:/app/config -v $(pwd)/data:/app/data -e AMORCE_MODE=standalone amorce:latest

Environment Variables

  • AMORCE_MODE
  • AGENT_API_KEY
  • TRUST_DIRECTORY_URL
  • GCP_PROJECT_ID
  • REDIS_HOST
  • REDIS_PORT
  • PORT
  • LOG_LEVEL
  • DIRECTORY_ADMIN_KEY
  • SECRET_NAME
  • AGENT_ID
  • GOOGLE_API_KEY
  • BRAVE_API_KEY

Security Notes

The project emphasizes a robust zero-trust security model with L1 API key authentication (in cloud mode) and L2 Ed25519 cryptographic signatures for all transactions. It uses Google Secret Manager for secure key management and has actively removed past hardcoded secrets, providing clear guidance for secure key rotation. Human-in-the-Loop (HITL) approvals add an important layer of oversight for sensitive operations. A critical warning exists against using 'standalone' (development) mode in production, as it relaxes signature verification and lacks cloud-managed services; this is a significant risk if ignored. The use of 'subprocess.Popen' to launch external MCP servers is noted, but current configuration implies local control over these commands.

Similar Servers

Stats

Interest Score13
Security Score9
Cost ClassLow
Avg Tokens150
Stars2
Forks0
Last Update2025-12-19

Tags

AmorceAI AgentOrchestrationSecurityTrust LayerMCPHITLProtocolFramework Agnostic