EVIDE MCP Server
- 1. The Identity Requirement
- 2. Architecture - Three Separated Layers
- 3. Setup
- 4. evide_intake - Standard Decision Deposit
- 5. evide_escalate - Evidentiary Crystallization
- 6. execution_identity and escalation_context
- 7. Boundary Readiness - Automatic Handling
- 8. Claude Desktop Configuration
- 9. The Governance Principle
Before an AI agent can deposit any record into EVIDE, its owner must complete a one-time identity setup. The API key and DAPI number must belong to the human or organization responsible for the agent - not to the agent itself.
The owner is responsible for it.
EVIDE makes that responsibility permanent and independently verifiable.
DAPI (Digital Authentication & Personal Identity) is the identity verification layer used by EVIDE to bind API access to a real, verifiable human or organizational identity. A DAPI number is a 10-digit verified identity code issued after completing the DAPI certification process. Every record deposited through the MCP server permanently embeds the owner's DAPI identity - making responsibility attribution independently verifiable by any third party.
DAPI certification: dapi-certification.com
The MCP server v1.1.0 introduces a clean three-layer identity separation that maps directly to the EVIDE evidentiary model:
Repository: github.com/emanuelcelano/evide-mcp
git clone https://github.com/emanuelcelano/evide-mcpcd evide-mcp && npm installRequires Node.js >= 18. DAPI identity and active EVIDE subscription required before use.
To request access to the MCP Server source and setup guide, contact: info@informaticainazienda.it
| Variable | Required | Description |
|---|---|---|
| EVIDE_API_KEY | ✅ | API key (starts with evd_). Belongs to agent owner. |
| EVIDE_DAPI_NUMBER | ✅ | DAPI number (10 digits). Verified identity of agent owner. |
| EVIDE_OWNER_ID | ✅ | Owner identifier in source system. Embedded in every deposit. |
| EVIDE_OWNER_ROLE | Declared role. Default: AI System Operator. | |
| EVIDE_AGENT_SYSTEM | Name of the agent system (e.g. CLARIXO). Used in execution_identity. | |
| EVIDE_AGENT_ID | Specific agent identifier within the system. Used in execution_identity. | |
| EVIDE_API_ENDPOINT | Override API endpoint. Default: production. |
EVIDE_API_KEY, EVIDE_DAPI_NUMBER, or EVIDE_OWNER_ID are missing. Active key validity is verified at first deposit. An agent without owner-bound identity cannot deposit into EVIDE.evide_escalate.source_reference, decision_type, decision_summaryOptional:
classification_status - stable | provisional | contested (default: stable)threshold_status - met | not_met | unknown | not_defined (default: not_defined)boundary_status - candidate | verified | verified_partial | unverifiable (default: candidate)unresolved_signals - required for verified_partial and unverifiablehuman_oversight_level - L1 | L2 | L3 (default: L2)rationale, trace_reference, fedis_requested
source_reference, agent_state_summary, escalation_trigger, escalation_reasonescalation_trigger values:
high_stakes_decision - contestable_state - legal_ambiguityregulatory_threshold - governance_uncertainty - semantic_instabilityhuman_review_required - authority_incoherenceOptional:
unresolved_signals (auto-populated if empty), boundary_status (verified_partial | unverifiable), trace_reference
Every deposit made through the MCP server includes an execution_identity block. This separates the accountable identity (owner) from the operational identity (agent) in a way that is preserved in the evidentiary record.
accountability_model: "owner_bound" declares that all responsibility for this agent's outputs converges on the DAPI-verified owner. This prevents agents from self-certifying and ensures that even fully autonomous agent populations remain bound to a finite, attributable accountability structure.
The server automatically constructs a valid boundary_readiness object for any status value. This prevents validation errors when passing non-candidate states.
scope_reference follows an evide:mcp:intake:{agent_system} namespace pattern. This introduces governance namespace and gate provenance tracking - making clear that the gate is the MCP server acting on behalf of the agent system.
macOS:
~/Library/Application Support/Claude/claude_desktop_config.jsonWindows:
%APPDATA%\Claude\claude_desktop_config.json
intake_hash against the live EVIDE registry using the canonicalization algorithm at docs/payload-canonicalization/.The owner is responsible.
EVIDE makes that responsibility permanent.
As agent populations grow and decision velocity increases, the accountability structure remains anchored at the owner level. One human or organization can own many agents. All their deposits converge on a single DAPI-verified accountability identity.
This is where the Decision Wave Compression (DWC) framework becomes relevant: as aggregate agent throughput grows, the pressure on the owner's accountability capacity may itself become a governance signal. The MCP server's accountability_model: owner_bound declaration is what makes that signal computable.
EVIDE API Documentation: app.certifywebcontent.com/docs/evide-intake-schema/
Payload Canonicalization: app.certifywebcontent.com/docs/payload-canonicalization/
DWC / FAC Framework: Decision Wave Compression - Technical Note v0.1
EVIDE Framework: certifywebcontent.com - Evidentiary Deposit
DAPI Identity Certification: dapi-certification.com
GitHub Repository: github.com/emanuelcelano/evide-mcp
Pricing & Service Conditions: app.certifywebcontent.com/pricing
API access: info@informaticainazienda.it
evide_intake - deposit a finalized decision
evide_escalate - crystallize a high-stakes boundary state
Both bound to the owner. Both independently verifiable.
"The agent produces. The owner is responsible.
EVIDE makes that responsibility permanent."