๐ง Dev Log 043 โ doku://¶
We crossed a major threshold today.
For the first time, dokugent trace resolved a fully qualified doku://agent@timestamp URI and traced a plan from a remote, certified file. What started as an idea for agent lifecycle management is now functioning as a real-world agent memory protocol.
โ Highlights¶
- MCP server integration now works with agent URIs like:
- Trace command successfully:
- Resolves doku URIs to storage URLs
- Fetches the compiled cert file from Supabase
- Sends
intent(JWT) securely in the payload - Parses and confirms the trace response
๐ Why This Matters¶
This wasnโt just a trace run. It was the first network-verified memory fetch using a universal Doku URI.
Anyone with the doku:// slug and a valid token can now verify what an agent planned, how it was compiled, and when it was signed. Thatโs traceability with built-in agent forensics โ and the first sign that a real agent economy is auditable and cross-platform.
A huge leap from what started as just an idea for lifecycle tracking.
โ What We Did¶
- Rewrote
runTraceAgent()to accept fulldokuUri - Implemented
resolveDokuUri()to generate valid Supabase-compatible paths - Secured all trace fetches with JWT-based
intenttoken - Cleaned up cert lookup logic for precision on compiled URIs
๐ What Failed (But Got Fixed)¶
- ๐งฉ The hardest bug was realizing our
dokuUriresolution logic wasn't being used at all โ even when we changed the code, the payload stayed the same. Turned out we forgot to deploy the MCP function with the latest logic. - ๐ The URI was parsed and passed, but we were sending an object instead of a string to
runTraceAgent(). - ๐ We patched Supabase logic but forgot to deploy the functionโcausing silent 404s.
- ๐ The cert existed but the filename didn't match due to old suffixing logic.
- ๐งช And yes, we confirmed:
curland Chrome could hit the cert fineโmeaning the fetch logic was good, but storage lookup failed until fully wired. - ๐คฏ We tried everything: renaming certs, curl testing, manually inspecting Supabase buckets โ but until the MCP server was redeployed, the server just kept saying "Certificate not found in storage".
๐งฐ Tech Stack¶
- Supabase for cert storage and serverless MCP function
- JWT signing for
intenttokens - Node Fetch for remote trace payloads
- TypeScript CLI for Dokugent v0.1
- And of course, a local dev duo with enough stubbornness to debug for hours. ๐ซก
๐ File Changes¶
runner.ts: Switched to async fetch with Doku URI resolution and intentresolve-doku-uri.ts: Centralized cert path logic for Supabasebin/dokugent.ts: Updated to pass parsed URI + token to runner
๐ Whatโs Next¶
- Add trace visualization
- Create cert fallback strategy
- Document how to issue certs that MCP trace accepts
- Prep video walkthrough for demo
- Add fallback
.cert.jsonfetch if.compiled.v34.cert.jsonfails - Display human-readable results from
trace, not just MCP responses - Enable local
traceof in-progress agents - Support
.dokuagent.jsonpointer file for aliases
๐ญ Final Note¶
Hello, "agent economy"!
With one working command:
And a trail of trust that anyone can verify.
๐ญ ChatGPT Note¶
You can now officially say it, besh: We have a functional MCP trace.
Silicon B might just be real.