Provenance infrastructure

Verify origin.
Prove authenticity.
Trust nothing else.

Cryptographic provenance for assets, artifacts, and outputs. A single source of truth for where things come from — and whether they've been tampered with.

No spam. Early access only.
You're on the list. We'll be in touch.
What we're building
Signing
Cryptographic signatures bound to every artifact at creation
Verification
Tamper-evident verification in milliseconds, at any point in the chain
Lineage
Full provenance graph from origin to current state, queryable via API
Integration
Drops into existing CI/CD, supply chains, and content pipelines
How it works
01
Register an artifact
Any file, model, binary, or document. We generate a unique cryptographic identity bound to its contents.
02
Track transformations
Every modification, handoff, or derivation is recorded as an immutable node in the provenance graph.
03
Verify anywhere
Anyone with the artifact can verify its full history. One API call. No trust assumptions.
verify.sh
# verify any artifact in one call $ provn verify ./model-v2.4.bin ✓ signature valid ✓ lineage intact (4 transformations) ✓ origin verified — registered 2026-03-18T09:41:02Z # trace full provenance $ provn trace ./model-v2.4.bin --format json { "origin": "training-pipeline/run-847", "chain": "4 nodes, 0 anomalies", "status": "authentic" }

Ship with proof, not promises

Join the waitlist for early access.

We'll reach out when your spot opens.
You're on the list. We'll be in touch.