Extend KYE™ with small, focused plugins.
The KYE Plugin Marketplace™ is for lightweight installable modules — MCP tools, webhook verifiers, policy adapters, evidence exporters, conformance fixtures, sandbox flows, dashboard widgets, SDK extensions, and approval workflows. Start small, plug into your stack, then scale into a full KYE™ Runtime Gateway deployment.
Connector Hub™ integrates KYE™. App Store™ productises KYE™. Plugin Marketplace™ extends KYE™.
Small surfaces, focused jobs.
Open-source starters shipping with the v1.1 marketplace.
Webhook verifiers in three languages ship today as standalone libraries. The full marketplace surface (categorisation, install gating, manifest signing, programme review) opens with v1.1.
- Webhook verifier — JS / TS ·
@kye-protocol/webhook-verifier· runs on Node / Cloudflare Workers / browser. Verifies signed KYE™ webhook envelopes against the publisher's JWKS. - Webhook verifier — Python ·
kye-signal-verifier· same surface, sync + async APIs. - Webhook verifier — Go ·
github.com/KYE-Protocol/webhook-verifier-go· zero-dependency, drop-in. - OPA policy pack — Core · ready-to-use Rego bundles for the Core profile.
- OPA policy pack — Payments · Rego for the Payments + Agent Purchasing profiles.
- Cerbos bundle — Core · Cerbos derived-roles + resource policies for the Core profile.
- Cedar bundle — Core · Cedar policy bundles for the Core profile.
- Evidence exporter — OSCAL · project a KYE™ evidence pack into OSCAL component-definition / SSP / assessment-results / POA&M.
- Evidence exporter — Splunk HEC · stream signed events into Splunk HTTP Event Collector.
- Evidence exporter — Microsoft Sentinel · same surface, Sentinel ingestion endpoints.
- MCP tool —
verify_evidence_pack· read-only MCP tool that verifies a pack offline using the published JWKS. - MCP tool —
explain_decision· read-only MCP tool that renders a Decision Map™ in natural language. - Dashboard widget — Decision Map™ · embeddable widget for any HTML host (the same engine used on this site).
- Dashboard widget — Authority Graph™ · embeddable graph viewer for actor / principal / capability nodes.
- Sandbox flow — agent-purchasing · synthetic test fixtures for the agent-purchasing profile.
- Sandbox flow — open-banking · synthetic test fixtures for the open-banking profile.
- Approval workflow — Slack · reusable Slack approval handler bound to
require_approvaldecisions. - Approval workflow — email · SMTP fallback for sites without Slack.
Founding plugins ship under Apache 2.0 from the public org.
Every plugin ships a kye.plugin_manifest.v1.
Plugin manifests declare the plugin's runtime, permission requirements, side-effect level, and OSS licence. Schema: https://kyeprotocol.com/schemas/plugin-manifest.json.
{
"schema_version": "kye.plugin_manifest.v1",
"plugin_id": "kye:plugin:webhook-verifier-js",
"name": "KYE Signal Verifier for JavaScript",
"plugin_type": "sdk_extension",
"category": "webhooks",
"version": "1.0.0",
"description": "Verifies KYE™ signed webhook payloads in JavaScript and TypeScript applications.",
"runtime": {
"language": "typescript",
"supported_environments": ["node", "cloudflare_workers", "browser"]
},
"permissions": {
"requires_secret_access": true,
"requires_network_access": false,
"side_effect_level": "read_only"
},
"oss_license": "Apache-2.0",
"status": "active"
}Plugins declare their blast radius.
Every plugin declares its side_effect_level from the manifest dictionary — read_only, audit_only, decision_only, write_internal, send_external_message, execute_transaction, move_money, modify_authority, admin_action, destructive. Higher levels require stricter install gates: tenant auth, idempotency, audit emission, optional step-up. The plugin runtime refuses to load a manifest whose declared permissions exceed the installer's allowlist.
Five steps from idea to marketplace.
Manifest schema, conformance harness, and signature flow are defined now. Submission and review go live with the v1.1 marketplace.
- P1Author the manifest. Fill in
plugin_type, runtime, permissions, side-effect level, OSS licence. - P2Write the plugin. One file or one package — small surface area is the point. Conformance harness checks shape and signature handling.
- P3Sign & submit. Programme verifies the manifest signature and runs an automated security review (no admin escalation, no hidden network access, no unsigned dependencies).
- P4Programme review. ~2 working days for read-only and audit-only plugins; ~5 days for write-side. Reviewer checks the security boundary you declared.
- P5Publish. Plugin lands in the public marketplace and is installable via SDK CLI.
Where to go next.
Ready to see your AI agents flagged?
Start in shadow mode. We’ll deliver your first Evidence Pack™ in 4–8 weeks.