AKF — The AI Native File Format

EXIF for AI. AKF embeds trust scores, source provenance, and compliance metadata into every file your AI touches — DOCX, PDF, images, code, and 20+ formats. 9 MCP tools: stamp, inspect, trust, audit, scan, embed, extract, detect. Audit against EU AI Act, SOX, HIPAA, NIST in one command.


_akf: '{"v":"1.0","claims":[{"c":"Trust metadata for README.md","t":0.7,"id":"1979cbeb","src":"unspecified","tier":5,"ver":false,"ai":true,"evidence":[{"type":"other","detail":"updated certify and github action references","at":"2026-03-18T04:21:48.869226+00:00"}]}],"id":"akf-c33254656fc5","agent":"claude-code","at":"2026-03-18T04:21:48.870623+00:00","label":"public","inherit":true,"ext":false,"sv":"1.1"}'

AKF Format

Stars

AKF — The AI Native File Format

Trust scores · Source provenance · Security classification · Compliance readiness
Embeds natively into DOCX, PDF, XLSX, images, code, and all major formats.
Think EXIF for AI — ~15 tokens of JSON that travel with your files.

AKF Demo — stamp, inspect, audit in 10 seconds

⭐ Star on GitHub · Try Online · HuggingFace Demo

Quickstart · AI Agents · MCP Server · Agent Skills · CLI · Website


The Problem

AI generates reports, code, docs, images — and none of it carries provenance. Your team opens a file with no idea: Who made it? AI or human? Can we trust it? Is it compliant?

EU AI Act Article 50 takes effect August 2, 2026. After that, AI-generated content must carry transparency metadata. Penalties: up to EUR 35M / 7% of global turnover.

The Solution

AKF is the AI native file format — ~15 tokens of JSON that embed into any file:

WhatHow
Trust score0–1 confidence based on source tier
Source provenanceSEC filing → analyst → AI agent chain
ComplianceOne command: akf audit file --regulation eu_ai_act
AI generates content → AKF stamps trust metadata → Anyone can verify it

vs Alternatives

AKFC2PAWatermarkingManual tracking
Works on documents/code❌ (media only)⚠️
No Certificate Authority needed
Trust scores
Source provenance chain⚠️
Compliance auditing
~15 tokens (LLM-friendly)N/AN/A
20+ file formats⚠️ (media)⚠️ (text)
Free & open source⚠️Varies

Quickstart

pip install akf    # Python
npm install akf-format    # TypeScript / Node.js

akf doctor         # Check your install — detects PATH issues and guides setup

akf command not found? Run akf doctor to auto-detect your setup, or use python3 -m akf (always works).

  • Install with pipx: pipx install akf (recommended — auto-handles PATH)
  • Windows: use python3 -m akf or install via pipx
import akf

# Stamp trust metadata onto any AI output
akf.stamp("Revenue was $4.2B, up 12% YoY",
          confidence=0.98, source="SEC 10-Q",
          agent="claude-code", model="claude-sonnet-4-20250514")

# Embed into Office docs, PDFs, images — any format
akf.embed("report.docx", claims=[...], classification="confidential")

# Audit for compliance (EU AI Act, HIPAA, SOX, GDPR, NIST AI, ISO 42001)
result = akf.audit("report.akf", regulation="eu_ai_act")
print(f"Compliant: {result.compliant}")

For AI Agents

AKF is designed agent-first. One-line APIs for stamping, streaming, and auditing.

import akf

# Stamp with evidence (auto-detected: test_pass, type_check, etc.)
akf.stamp("Fixed auth bypass", kind="code_change",
          evidence=["42/42 tests passed", "mypy: 0 errors"],
          agent="claude-code", model="claude-sonnet-4-20250514")

# Stream trust metadata in real-time
with akf.stream("output.md", model="gpt-4o") as s:
    for chunk in llm_response:
        s.write(chunk)

# Trust-annotated git commits (uses git notes)
akf.stamp_commit(content="Refactored auth module", kind="code_change",
                 evidence=["all tests pass"], agent="claude-code")
print(akf.trust_log(n=10))  # + ACCEPT  ~ LOW  - REJECT  ? none

Multi-Agent Teams

AKF supports multi-agent orchestration — Claude Agent Teams, Copilot Cowork, Codex multi-agent, and any A2A-compatible platform.

import akf

# Agent-to-agent delegation with trust ceiling
policy = akf.DelegationPolicy(
    delegator="lead-agent", delegate="research-bot",
    trust_ceiling=0.7, allowed_actions=["search", "summarize"]
)
result = akf.delegate(parent_unit, policy)

# Multi-agent streaming session
with akf.TeamStream(["research", "writer", "reviewer"]) as ts:
    ts.write("research", "Found 3 sources", confidence=0.8)
    ts.write("writer", "Drafted summary", confidence=0.75)
    ts.write("reviewer", "Approved with edits", confidence=0.9)
    scores = ts.aggregate()  # per-agent + team trust

# Cross-platform agent identity
card = akf.create_agent_card(name="Research Bot", platform="claude-code",
                             capabilities=["search", "summarize"])
akf.verify_agent_card(card)  # SHA-256 hash verification

# Team certification (per-agent breakdown)
report = akf.certify_team("src/", min_trust=0.7)
# report.all_agents_certified — each agent must individually pass

CLI:

akf agent create --name "Bot" --platform claude-code --capabilities search,summarize
akf agent list
akf agent verify <id>
akf agent export-a2a <id> --output card.json   # A2A protocol bridge
akf agent import-a2a card.json
akf certify src/ --team                         # Per-agent breakdown

MCP Server

AKF ships an MCP server so any AI agent can create, validate, scan, and audit trust metadata.

# Install from the repo
pip install ./packages/mcp-server-akf
{
  "mcpServers": {
    "akf": {
      "command": "python",
      "args": ["-m", "mcp_server_akf"]
    }
  }
}

9 MCP tools: create_claim · validate_file · scan_file · trust_score · stamp_file · audit_file · embed_file · extract_file · detect_threats

Ambient Trust

AKF works where AI agents work. Drop a config file, and every AI-generated file carries trust metadata automatically.

AgentHow it works
Claude CodeReads CLAUDE.md — stamps every file it creates with confidence and evidence
CursorReads .cursorrules — stamps AI edits before you review
WindsurfReads .windsurfrules — stamps AI edits with trust metadata
GitHub CopilotReads .github/copilot-instructions.md (native) + shell hook for CLI
OpenAI CodexReads AGENTS.md — stamps files in cloud sandbox and local
Manus / Other AgentsMCP server + shell hook — works with any agent that supports MCP or CLI
Any MCP agent9 MCP tools — stamp, audit, embed, extract, detect, validate, scan, trust, create
Any CLI tooleval "$(akf shell-hook)" — intercepts claude, chatgpt, aider, openclaw, ollama, manus

The trust pipeline:

Agent writes code → Git commit stamped → CI runs akf certify → Team reviews with context

Set up in 60 seconds:

# 1. Agent stamps its own work (already in this repo)
cat CLAUDE.md        # or .cursorrules / .windsurfrules / AGENTS.md / .github/copilot-instructions.md

# 2. Git hooks stamp every commit
akf init --git-hooks

# 3. CI certifies trust on every PR
#    uses: HMAKT99/AKF/extensions/github-action@main

# 4. Shell hook intercepts AI CLI tools
eval "$(akf shell-hook)"

Skills

AKF provides agent skill files that AI agents can discover and use. Drop these into your agent's context:

SkillWhat it does
stamp.mdStamp trust metadata onto AI outputs
audit.mdAudit files for regulatory compliance
scan.mdSecurity scan files and directories
embed.mdEmbed trust metadata into Office/PDF/images
detect.mdRun 10 security detection classes
stream.mdStream trust metadata in real-time
git.mdTrust-annotated git workflows
convert.mdConvert between formats
delegateAgent-to-agent trust delegation
teamMulti-agent streaming sessions

Format at a Glance

Compact (~15 tokens — optimized for AI):

{"v":"1.0","claims":[{"c":"Revenue was $4.2B","t":0.98,"src":"SEC 10-Q"}]}

Descriptive (human-readable — same data):

{"version":"1.0","claims":[{"content":"Revenue was $4.2B","confidence":0.98,"source":"SEC 10-Q"}]}

Full (with provenance, decay, AI flags, security):

{"v":"1.0","by":"[email protected]","label":"confidential","inherit":true,
 "claims":[
   {"c":"Revenue $4.2B","t":0.98,"src":"SEC 10-Q","tier":1,"ver":true,"decay":90},
   {"c":"H2 will accelerate","t":0.63,"tier":5,"ai":true,"risk":"AI inference"}
 ],
 "prov":[
   {"hop":0,"by":"[email protected]","do":"created","at":"2025-07-15T09:30:00Z"},
   {"hop":1,"by":"copilot-agent","do":"enriched","at":"2025-07-15T10:15:00Z"}
 ]}

Works With Every Format

AKF embeds natively — no sidecars needed for most formats:

FormatHow It Works
.akfNative standalone knowledge file
.docx .xlsx .pptxOOXML custom XML part
.pdfPDF metadata stream
.htmlJSON-LD <script type="application/akf+json">
.mdYAML frontmatter
.png .jpgEXIF/XMP metadata
.jsonReserved _akf key
.mp4 .mov .webm .mkvSidecar .akf.json companion
.mp3 .wav .flac .oggSidecar .akf.json companion
Everything elseSidecar .akf.json companion
# One API for all formats
akf.embed("report.docx", claims=[...], classification="confidential")
meta = akf.extract("report.docx")
akf.scan("report.docx")

Zero-Touch Auto-Stamping

AKF can automatically stamp every file AI touches — no manual intervention needed.

# Install the background watcher
akf install

# Or run in foreground
akf watch ~/Downloads ~/Desktop ~/Documents

The background watcher monitors directories for new and modified files and stamps them with trust metadata. Smart context detection automatically infers:

  • Git author — from git log history
  • Download source — from macOS extended attributes
  • Classification — from project .akf/config.json rules
  • AI-generated flag — from LLM tracking timestamps + content heuristics
  • Confidence score — dynamically adjusted based on available evidence

Shell Hook (intercept AI CLI tools)

# Add to ~/.zshrc or ~/.bashrc
eval "$(akf shell-hook)"

Automatically detects when you run claude, chatgpt, aider, openclaw, ollama, or other AI CLI tools, and stamps any files they create or modify. Also pre-stamps files before upload to content platforms (gws, box, m365, dbxcli, rclone) so trust metadata travels with the file. Use --no-upload-hooks to disable.

Project Rules

Create .akf/config.json in your project root:

{
  "rules": [
    {"pattern": "*/finance/*", "classification": "confidential", "tier": 2},
    {"pattern": "*/public/*", "classification": "public", "tier": 3}
  ]
}

Files matching these patterns are automatically classified when stamped.

CLI

# ── Quick start ──
akf                          # Welcome + quick start
akf quickstart               # Interactive demo
akf doctor                   # Check installation health

# ── Stamp & create ──
akf create report.akf \
  --claim "Revenue $4.2B" --trust 0.98 --src "SEC 10-Q" \
  --by [email protected] --label confidential

# ── Validate & inspect ──
akf validate report.akf
akf inspect report.akf
akf trust report.akf

# ── Certify (aggregate pass/fail gate) ──
akf certify report.akf                        # Trust + detection + compliance
akf certify src/ --min-trust 0.8              # Custom threshold
akf certify . --evidence-file results.xml     # Attach test evidence
akf certify . --format json --fail-on-untrusted  # CI-friendly output
akf certify src/ --team                       # Per-agent trust breakdown

# ── Compliance ──
akf audit report.akf                          # Compliance readiness check
akf audit report.akf --regulation eu_ai_act   # EU AI Act
akf audit report.akf --trail                  # Audit trail

# ── Universal format commands ──
akf embed report.docx --classification confidential \
  --claim "Revenue $4.2B" --trust 0.98
akf extract report.docx
akf scan report.docx
akf scan ./docs/ --recursive

# ── Auto-stamping ──
akf install                                   # Install background watcher
akf watch ~/Downloads ~/Documents             # Watch directories
akf shell-hook                                # Print shell hook code
akf shell-hook --no-upload-hooks              # Without content platform hooks
akf uploads                                   # View upload stamp log

# ── Git integration ──
akf stamp <file> --agent claude-code --evidence "tests pass"

# ── Agent identity & teams ──
akf agent create --name "Bot" --platform claude-code
akf agent list
akf agent verify <agent_id>
akf agent export-a2a <id> --output card.json  # A2A protocol bridge
akf agent import-a2a card.json

# ── Knowledge Base ──
akf kb stats ./kb
akf kb query ./kb --topic finance

Security Detections

10 built-in detection classes: AI content without review, trust below threshold, hallucination risk, knowledge laundering, classification downgrade, stale claims, ungrounded AI claims, trust degradation chain, excessive AI concentration, provenance gap.

from akf import run_all_detections
report = run_all_detections(unit)
for finding in report.findings:
    print(f"[{finding.severity}] {finding.detection}: {finding.message}")

Trust Computation

effective_trust = confidence × authority_weight × temporal_decay × (1 + penalty)
TierWeightExample
11.00SEC filings, official records
20.85Analyst reports, peer-reviewed
30.70News, industry reports
40.50Internal estimates, CRM data
50.30AI inference, extrapolations

Decision: score ≥ 0.7 → ACCEPT · ≥ 0.4 → LOW · < 0.4 → REJECT

Delegation ceiling: When an agent delegates to another, the delegate's output trust is capped at min(score, delegation_ceiling). This prevents trust inflation in multi-agent chains.

Integrations & Extensions

Framework integrations (install from repo via pip install ./packages/<name>):

PackageDescription
mcp-server-akfMCP server — create, validate, scan, trust
langchain-akfLangChain callback handler + document loader (experimental)
llama-index-akfLlamaIndex node parser + trust filter (experimental)
crewai-akfCrewAI tool for trust-aware agents (experimental)

Editor & CI extensions (source in repo):

ExtensionDescription
VS CodeSyntax highlighting, hover info, validation for .akf files
VS Code AI MonitorAuto-stamp files edited by Copilot, Cursor, and other AI tools
GitHub ActionCI trust gate — runs akf certify on PRs with optional PR comments
Google WorkspaceAdd-on for Docs, Sheets, Slides (preview)
Office Add-inAdd-in for Word, Excel, PowerPoint (preview)

For LLMs

Prompt with one example and LLMs produce valid AKF 95%+ of the time:

Output knowledge as AKF:
{"v":"1.0","claims":[{"c":"<claim>","t":<0-1>,"src":"<source>","tier":<1-5>,"ai":true}]}

See LLM-PROMPT.md for a full system prompt.

Documentation

DocDescription
Full SpecComplete format specification
JSON SchemaMachine-readable schema
Producing AKFQuick start for 8 languages
Trust ComputationScoring algorithm details
LLM IntegrationPrompting strategies
EU AI ActCompliance mapping
NIST AI RMFFramework mapping

Contributing

See CONTRIBUTING.md for development setup, testing, and PR process.

Free and Open — Forever

AKF is free and open source under the MIT license. The format specification will always be free. No feature will ever be gated behind a paid tier. AKF is a standard, and standards must be free to be universal.

License

MIT — use it everywhere, embed it in everything.

Related Servers