Skip to content

πŸ” The complete Rust workspace for LogLine Protocol & JSON✯Atomic β€” 18 crates for verifiable, privacy-first systems

Notifications You must be signed in to change notification settings

LogLine-Foundation/logline-workspace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

14 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

πŸ” LogLine Workspace

Verifiable, privacy-first intelligence β€” data and actions that prove themselves.

MSRV no_std License Tests

The complete Rust workspace for the LogLine Protocol & JSON✯Atomic ecosystem


πŸ“– Docs Β· πŸ“¦ Crates.io Β· 🌐 Website


🧬 The Two Atoms

Same Semantics = Same Bytes = Same Hash.

LogLine is built on two cryptographic primitives that form the foundation for verifiable, auditable systems:

Atom Crate Description
Conceptual logline-core 9-field tuple describing who did what, when, with what consequences
Cryptographic json_atomic Canonical JSON + BLAKE3 CID + Ed25519 sealing for Signed Facts

Together: describe an action with logline-core, seal the fact with json_atomic. Auditable. Verifiable. Immutable.


πŸ“¦ Crate Ecosystem (18 crates)

logline-workspace/
β”œβ”€β”€ 🧠 Protocol Core
β”‚   β”œβ”€β”€ logline-core      β€” The Conceptual Atom (Paper I)
β”‚   β”œβ”€β”€ json_atomic       β€” The Cryptographic Atom (Paper II)  
β”‚   β”œβ”€β”€ lllv-core         β€” LLLV Capsule format (Paper III)
β”‚   └── lllv-index        β€” Capsule indexing & retrieval
β”‚
β”œβ”€β”€ πŸ”§ TDLN (Typed Declarative Logic Notation)
β”‚   β”œβ”€β”€ tdln-ast          β€” Abstract Syntax Tree
β”‚   β”œβ”€β”€ tdln-brain        β€” AI reasoning engine with LLM integration
β”‚   β”œβ”€β”€ tdln-compiler     β€” TDLN β†’ bytecode compilation
β”‚   β”œβ”€β”€ tdln-gate         β€” Policy gates & validation
β”‚   └── tdln-proof        β€” Proof generation & verification
β”‚
β”œβ”€β”€ βš›οΈ Atomic Family
β”‚   β”œβ”€β”€ atomic-types      β€” Shared IDs, time, error helpers
β”‚   β”œβ”€β”€ atomic-crypto     β€” BLAKE3, Ed25519, HMAC, key management
β”‚   β”œβ”€β”€ atomic-codec      β€” JSON✯Atomic canonical encode/decode
β”‚   β”œβ”€β”€ atomic-sirp       β€” Network capsule + receipt flow (HTTP)
β”‚   └── atomic-runtime    β€” DIM router/handlers with UBL logging
β”‚
└── 🏒 UBL (Unified Business Ledger)
    β”œβ”€β”€ ubl-ledger        β€” NDJSON writer with rotation & signing
    β”œβ”€β”€ ubl-mcp           β€” Model Context Protocol server
    └── ubl-office        β€” Business automation with AI agents

πŸš€ Quick Start

# Cargo.toml
[dependencies]
logline-core = "0.1"
json_atomic  = "0.1"
use json_atomic::{seal_value, verify_seal};
use ed25519_dalek::SigningKey;
use rand::rngs::OsRng;
use serde::Serialize;

#[derive(Serialize)]
struct Action { actor: String, verb: String }

fn main() {
    let key = SigningKey::generate(&mut OsRng);
    
    // Seal any serializable value β†’ Signed Fact
    let fact = seal_value(&Action { 
        actor: "alice".into(), 
        verb: "approved".into() 
    }, &key).unwrap();
    
    // Anyone can verify
    verify_seal(&fact).unwrap();
    
    println!("CID: {}", fact.cid_hex());  // BLAKE3 of canonical bytes
    println!("Sig: {}", fact.signature_hex());
}

πŸ”’ Security Model

  • Canonical Serialization β€” Same semantics = same bytes = same hash
  • BLAKE3 CIDs β€” Fast, secure content addressing
  • Ed25519 Signatures β€” Curve25519 EdDSA on CID, not raw JSON
  • no_std Support β€” Runs in constrained environments
  • Lifecycle Invariants β€” DRAFT β†’ PENDING β†’ COMMITTED | GHOST

🎯 Use Cases

Domain How LogLine Helps
Audit Trails Signed action logs with ex-ante consequences
Immutable Documents Every doc/message becomes a Signed Fact
Computable Contracts Policies that explain and prove themselves
AI/Data Provenance End-to-end verifiable content chains
Supply Chain Tamper-evident records with cryptographic proofs

πŸ› οΈ Development

# Clone
git clone https://github.com/LogLine-Foundation/logline-workspace
cd logline-workspace

# Build & test
cargo build --all-features
cargo test --all-features

# Quality checks
cargo fmt --all -- --check
cargo clippy --all-targets --all-features -- -D warnings

# Run benchmarks
cargo bench -p json_atomic

MSRV Policy

Minimum Supported Rust Version: 1.75+


πŸ“š Papers & Documentation

Paper Topic Crate
Paper I The Conceptual Atom β€” Verifiable Actions logline-core
Paper II JSON✯Atomic β€” Cryptographic Sealing json_atomic
Paper III LLLV β€” The Retrieval Atom lllv-core

Full papers available in docs/papers/.


🀝 Contributing

We welcome contributions! See CONTRIBUTING.md for guidelines.

  • πŸ› Bug Reports: Open an issue with reproduction steps
  • πŸ’‘ Feature Ideas: Discuss in issues first
  • πŸ”§ Pull Requests: Fork β†’ branch β†’ PR β†’ review

πŸ“„ License

Dual-licensed under your choice of:


πŸ” Security

Report vulnerabilities to: security@logline.foundation

See SECURITY.md for our security policy.


LogLine Foundation β€” data and actions that prove themselves ✨

Website Β· Crates.io Β· Docs

About

πŸ” The complete Rust workspace for LogLine Protocol & JSON✯Atomic β€” 18 crates for verifiable, privacy-first systems

Topics

Resources

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

No packages published