AI personality diagnosis based on your real coding data.
16 dog breeds. Meme radar. Shareable cards. No quiz.
curl -fsSL https://raw.githubusercontent.com/PunkGo/punkgo-jack/main/install.sh | bash
punkgo-jack roast --pngOh, and it also does cryptographic audit receipts for every AI action. Ed25519 signatures, Merkle trees, RFC 3161 timestamps. The boring stuff that matters when things go wrong.
Contents: Roast · Quick Start · How It Works · Verify · Trust Layers · CLI · Config · Supported Tools · Evolution
Your AI has a personality. We proved it with math.
punkgo-jack roast # terminal meme radar
punkgo-jack roast --png # shareable card → ./punkgo-roast.png
punkgo-jack roast --svg # vector card → ./punkgo-roast.svg
punkgo-jack roast --today # today's vibe only
punkgo-jack roast --week # last 7 days
punkgo-jack roast help # all options16 MBTI-mapped personalities — Philosopher, Commander, Ghost, Speedrunner, Intern... each with a dog breed, a catchphrase, and a set of quips selected from your actual coding data.
Six-axis meme radar: Yapping · Googling · Grinding · Shipping · Tunnel Vision · Plot Armor
Config-driven. All 16 personalities live in a single TOML file — add your own or override at ~/.punkgo/roast.toml.
See all 16 breeds → punkgo.ai/roast
curl -fsSL https://raw.githubusercontent.com/PunkGo/punkgo-jack/main/install.sh | bash
punkgo-jack setup claude-code # or: punkgo-jack setup cursorTwo commands. Your next AI session is recorded with Ed25519 signatures and RFC 3161 timestamps.
punkgo-jack receipt # session summary + anchor time
punkgo-jack verify <ID> # cryptographic proofUpgrade: punkgo-jack upgrade. Uninstall: punkgo-jack unsetup claude-code.
Windows (PowerShell)
irm https://raw.githubusercontent.com/PunkGo/punkgo-jack/main/install.ps1 | iex
punkgo-jack setup claude-codeOr manually: cargo install punkgo-jack && cargo install punkgo-kernel. Requires Rust toolchain.
Your AI agent just deleted your production database. Your .env. It happens every week — and nobody can prove what went wrong, because the session is already gone.
PunkGo Jack is a dashcam for AI coding. Not a log file you can delete. Not a summary the AI writes about itself. A cryptographic receipt — append-only, Ed25519-signed, RFC 3161 timestamped. You can't backdate it, you can't delete it, you can't forge it.
Who is this for? If you use Claude Code or Cursor for client work, team projects, or anything where you need to show what your AI actually did.
Hook fires → jack transforms → kernel commits to Merkle tree + Ed25519 signs → receipt sealed. Daemon down? Auto-started. Still down? Buffered to spillover, replayed later.
punkgo-jack verify a1b2c3 # Merkle proof + TSA status
punkgo-jack verify-tsr 42 # verify stored TSA token
punkgo-jack receipt # session summary + anchor timestamp
punkgo-jack show a1b2c3 --json # raw proof for any RFC 6962 verifierCross-language verification: export proof JSON, verify with Go's sumdb/tlog — see examples/verify-go/.
"Trust me bro" is not a cryptographic primitive.
| Layer | Proves | Mechanism |
|---|---|---|
| Merkle | "this event is in the tree, the tree is append-only" | RFC 6962 |
| Ed25519 | "this kernel instance signed this checkpoint" | RFC 8032 |
| TSA | "this checkpoint existed before time T" | RFC 3161 |
A root operator with the signing key could rebuild the tree — this is the single-machine trust boundary. TSA adds time binding: you cannot backdate a timestamped checkpoint. See PIP-003 for the full architecture.
| Command | Description |
|---|---|
roast |
AI personality roast (try: roast help) |
setup <tool> |
Install hooks (claude-code, cursor) |
history |
Recent events table |
show <ID> |
Event details + Merkle proof + TSA status |
receipt |
Session receipt with anchor timestamp |
verify <ID> |
Offline Merkle + TSA verification |
verify-tsr <N> |
Verify stored TSA token |
anchor |
Anchor latest checkpoint to TSA |
presence |
Energy heatmap across agents |
export |
Export events as markdown or JSON |
serve |
MCP server (7 tools for agent self-query) |
upgrade |
Self-update (no re-setup needed) |
TSA anchoring is on by default (free DigiCert public service, rate-limited to once per 5 minutes). To customize, create ~/.punkgo/config.toml:
[tsa]
# enabled = true # default: true
# url = "http://timestamp.digicert.com" # default
# timeout_secs = 10 # default
# min_interval_secs = 300 # 0 for CI burst modeDisable TSA: set enabled = false or PUNKGO_TSA_ENABLED=false. Other env vars: PUNKGO_TSA_URL, PUNKGO_TSA_MIN_INTERVAL_SECS.
| Tool | Status | Setup |
|---|---|---|
| Claude Code | Supported | setup claude-code — 10 hooks + statusline |
| Cursor | Supported | setup cursor — 9 hooks |
| MCP | Built-in | serve — 7 tools for agent self-query |
| Windsurf, Cline | Planned | — |
Dual-Tool Coexistence: Claude Code + Cursor
If you use both, each tool gets its own hooks. Cursor's Third-party Skills reads Claude Code's settings.json — PunkGo handles this automatically: --source claude-code hooks inside Cursor are silently skipped. No duplicate events.
Setup: punkgo-jack setup claude-code && punkgo-jack setup cursor
Leave Cursor's Third-party Skills enabled — PunkGo deduplicates automatically.
| Version | What changed |
|---|---|
| v0.5.4 | Roast — AI personality diagnosis, 16 MBTI dog breeds, shareable cards |
| v0.5.3 | Fix setup hang on macOS |
| v0.5.2 | 10 hook events, Cursor BOM fix, semantic TSA rate limit |
| v0.5.1 | TSA on by default, Windows install fix |
| v0.5.0 | RFC 3161 TSA anchoring, verify-tsr, config system |
| v0.4.1 | Cursor IDE support, dual-tool coexistence |
| v0.4.0 | Verify, export, presence heatmap, MCP server |
Every AI action gets a receipt.
punkgo.ai
