Skip to content
@actpkg

Agent Component Tools Package Registry

actpkg — components on the protocol

Curated WebAssembly components for the ACT toolchain. Each one is sandboxed by wasmtime, capability-bounded by an act:component manifest, and signed by GitHub Actions attestation on publish.

Browse, search, and inspect at actpkg.dev.

How it works

Every component in this org is published as a signed OCI artifact at ghcr.io/actpkg/<name>:<version>. Pull and run with:

npx -y @actcore/act run ghcr.io/actpkg/<name>:latest --mcp \
  --fs-policy allowlist --fs-allow /path/to/data

Each component declares the capabilities it needs (wasi:filesystem, wasi:http, etc.) inside its WASM custom section. The host reads that declaration without executing the component, intersects it with the operator's runtime grants, and enforces the result. A component asking for nothing gets nothing — even --http-policy open from the operator doesn't let it reach the network.

What's here

Data & state

  • sqlite — SQLite via rusqlite (also the sqlite-vec variant)
  • filesystem — Generic read / write / list / stat / delete
  • openwallet — OpenWallet-compatible local key vault

Network bridges

Utilities

  • crypto — SHA / HMAC / Ed25519 / X25519
  • encoding — Base64 / base32 / hex / URL-encoding / UUID
  • random — Cryptographic randomness, UUID v4 + v7
  • time — Clock access, timezone math

Language embedders

Publishing your own

External contributions land here after passing the quality + security gates we apply to first-party components:

  • Capability declaration in act.toml — what the component needs, structured.
  • CI publish workflow — signed via GitHub Actions attestation on every release tag.
  • Source repo linked — every artifact traceable back to the commit it was built from.
  • Permissive license — MIT-or-Apache-2.0.

The bar will rise as the registry grows: cosign signing, SBOM publication, dependency vulnerability scanning, and reproducible-build verification are on the roadmap.

To submit, open a PR adding your <name> to actpkg.dev/scripts/crawl-components.sh. Daily build picks it up.

License across the org: MIT-or-Apache-2.0.

Popular repositories Loading

  1. python-eval python-eval Public

    Python interpreter for evaluating user code — ACT component

    Hurl 1

  2. http-client http-client Public

    HTTP/S client, that uses wasi:http

    Rust

  3. mcp-bridge mcp-bridge Public

    Proxies a remote MCP server's tools as ACT tools — ACT component

    Rust

  4. openapi-bridge openapi-bridge Public

    Dynamically exposes OpenAPI endpoints as ACT tools — ACT component

    Rust

  5. time time Public

    Time, date, and timezone utilities — ACT component

    Just

  6. sqlite sqlite Public

    SQLite database operations — ACT component

    Rust

Repositories

Showing 10 of 13 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…