Ecosystem

The Open Verifiable
Agent OS

Neutral brain for every frontend. Slopshop works as the persistent memory and tool layer for any AI agent framework — without replacing what you already use.

Add via MCP server • REST API • CLI

View Docs Verifiable Memory Credential Vault

Works with every major agent framework

Slopshop is backend-neutral. Whether your agents run in OpenClaw, GStack, a raw HTTP client, or inside Claude Computer-Use, the integration is the same REST or MCP interface.

MCP
OpenClaw
★ 250K
Adds verifiable memory across all OpenClaw skills. Every write returns a proof_hash and Merkle root so downstream skills can verify data provenance without re-querying.
# claude_desktop_config.json
{"mcpServers": {
  "slopshop": {
    "command": "npx",
    "args": ["@slopshop/mcp-server"],
    "env": {"SLOP_KEY": "sk-slop-..."}
  }}}
REST API
GStack
YC • 16K ★
Gives GStack agents persistent memory across runs — namespaced by project, agent ID, or user. Memory survives session restarts and agent handoffs.
# gstack agent config
tools:
  - name: slopshop_memory
    type: http
    base_url: https://api.slopshop.gg/v1
    auth: Bearer ${SLOP_KEY}
REST API
OpenFang
Rust OS
Minimal reqwest integration — no SDK needed. OpenFang's Rust agents call the memory and tool endpoints directly over HTTPS with a single API key header.
// Cargo.toml: reqwest = { features = ["json"] }
let res = client
  .post("https://api.slopshop.gg/v1/memory-set")
  .bearer_auth(&slop_key)
  .json(&payload).send().await?;
let proof = res.json::<MemProof>().await?;
Migration
Mem0
41K ★ • AWS exclusive
Mem0 is AWS-locked and closed-source. Slopshop is a self-hostable, proof-bearing alternative — export your Mem0 data and get verifiable memory with full audit trail and no cloud dependency.
# One-shot export + import
$ mem0 export --format json > mem0_data.json
$ slop memory import --file mem0_data.json
# Every imported entry gets a proof_hash
Native
Hermes A2A
SVID Identity
Slopshop's agent identity system issues SVID-compatible JWTs that Hermes A2A agents use for peer authentication. Combine with verifiable memory to get signed, attributable agent-to-agent messages.
// Request an SVID for your agent
POST /v1/identity/svid
{"agent_id": "researcher-01",
 "ttl": "1h"}
// Returns signed JWT for A2A auth
REST API
Qwen / Multimodal
Qwen3.5-Omni
Pair Qwen3.5-Omni's video input with Slopshop's verifiable session state. Each frame analysis is written to memory with a proof hash, so multimodal reasoning sessions are fully auditable and resumable.
# Write frame analysis to memory
POST /v1/memory-set
{"namespace": "session:qwen:vid-42",
 "key": "frame_0120",
 "value": "<qwen analysis>"}
// Returns proof_hash for that frame
Native Backend
Claude Computer-Use
Anthropic
Slopshop is the native backend for Claude Computer-Use sessions: persistent memory across browser tasks, pixel-diff screenshots, and the Credential Vault for injecting browser credentials without exposing them in the agent context.
# Start a Computer-Use session with Slopshop
POST /v1/computer-use/session
{"memory_namespace": "cu-session-01",
 "vault_id": "vlt_7f3a9c2e...",
 "pixel_diff": true}

3 ways to connect

Pick the integration method that fits your stack. All three give you the same memory, tools, vault, and identity APIs.

◎ MCP Server

Model Context Protocol

Add Slopshop as an MCP server to any MCP-compatible agent framework. Zero custom code — the framework calls memory and tool endpoints natively.

# Install
npm i -g @slopshop/mcp-server

# Add to your MCP config
{"slopshop": {
  "command": "slop-mcp",
  "env": {
    "SLOP_KEY": "sk-slop-..."
  }}}
▤ REST API

Direct HTTP Integration

Call the Slopshop API from any language using plain HTTP. No SDK required — just a Bearer token and JSON payloads.

# Write memory
curl -X POST \
 https://api.slopshop.gg/v1/memory-set \
 -H "Authorization: Bearer sk-slop-..." \
 -d '{"namespace":"x","key":"y","value":"z"}'

# Returns proof_hash + merkle_root
◆ CLI

Slopshop CLI

Manage memory, vault entries, and tool calls from the terminal. Useful for scripting, CI pipelines, and local development.

# Install
npm i -g @slopshop/cli

# Set API key
slop config set key sk-slop-...

# Write and verify memory
slop memory set --ns prod --key status \
  --value "healthy"
slop memory verify --key status

Self-host in 5 minutes. Clone the repo, set node server-v2.js, point your MCP config at localhost:3000. All memory, tools, and vault endpoints work identically on self-hosted and managed.

Full Documentation Verifiable Memory Credential Vault Security