| Crates.io | fuse-checkers |
| lib.rs | fuse-checkers |
| version | 1.2.0 |
| created_at | 2026-01-02 19:34:16.798391+00 |
| updated_at | 2026-01-02 19:34:16.798391+00 |
| description | Compliance checker implementations for VCE protocol |
| homepage | |
| repository | https://github.com/Mikebrown0409/project-fuse |
| max_upload_size | |
| id | 2019078 |
| size | 113,766 |
Reference implementations of compliance checkers for the VCE protocol.
This crate provides example checkers that demonstrate how to implement procedural verification logic for various use cases. These are reference implementations — downstream systems (like Witness) will build their own checkers.
fuse-checkers contains example implementations of the ComplianceChecker trait. These checkers are used by the FUSE CLI tools and serve as documentation for how to build custom checkers.
Add to your Cargo.toml:
[dependencies]
fuse-checkers = "1.2.0"
fuse-core = "1.2.0"
use fuse_checkers::{CheckerRegistry, ComplianceChecker};
use fuse_core::{ComplianceSpec, ComplianceResult};
let registry = CheckerRegistry::new();
let checker = registry.get_checker("C2PA signature verification")?;
let result = checker.check(&spec, &system_data)?;
Implement the ComplianceChecker trait:
use fuse_core::{ComplianceSpec, ComplianceResult, Result};
use fuse_checkers::ComplianceChecker;
pub struct MyCustomChecker;
impl ComplianceChecker for MyCustomChecker {
fn check(&self, spec: &ComplianceSpec, system_data: &str) -> Result<ComplianceResult> {
// Your verification logic here
Ok(ComplianceResult::Pass)
}
}
These checkers are examples only. Production systems should implement their own checkers based on their specific requirements and trust models.
Licensed under the Apache License 2.0. See the main Project FUSE repository for details.