May 11, 2026
The biggest release since v0.12. Pistachio is now fully independent, cryptographically verified, and loaded with new testing tools. Here's what changed.
brew tap drm3labs/drm3 && brew install pistachio
curl -fsSL https://drm3.network/install.sh | sh
Pistachio no longer depends on Cashew for Morpheus network data. Starting with v0.18, sessions, marketplace bids, provider listings, and wallet balances are all read directly from the Morpheus smart contracts on Base via RPC. No intermediary, no shared database, no relay between you and the chain.
NFT pass capacity is checked through the DRM3 Explorer, which reads from the DRM3 Pass contract (a separate DRM3 contract on Base, not a Morpheus contract). That capacity response is now cryptographically signed and verified.
This was a multi-release effort that started in v0.15 and is now complete. The last Cashew dependency (session data) was removed entirely. Pistachio boots from zero using only your wallet key and a Base RPC endpoint.
Every NFT capacity response from the DRM3 Explorer is now cryptographically signed with Ed25519 using the DRM3 provenance protocol. Pistachio verifies the signature, checks the signer's public key against a pinned value, validates the queried wallet in the input hash, and enforces a 5-minute freshness window.
Unsigned or tampered responses are rejected. Pistachio falls back to its cached value and never trusts unverified data. This closes a theoretical MITM vector on the capacity check that gates session creation.
The new Canary Test page lets you fire a single inference request at every provider and model on the network. See which models actually respond, measure per-stage latency (TCP init vs prompt delivery), and identify dead providers before you stake on them.
Results feed directly into the Model Health dashboard. Run a canary sweep before committing MOR to a model and you'll know exactly what's working.
Built-in stress testing with configurable concurrency, request counts, and load presets (Steady, Saturate, Burst, Stress). Fire hundreds of requests at your staked sessions to measure throughput, identify bottlenecks, and test provider reliability under pressure. Per-request traces let you drill into every success and failure.
Persistently exclude models that don't work for you. Blocked models are hidden from inference (403), canary tests, and load tests. Managed from Settings with a per-provider view and health indicators. No more wasting stake on models that consistently fail.
Expired session reclaims now run concurrently. What used to take 45+ seconds for a batch of 60 sessions now completes in under 3 seconds. Provider reports are fetched in parallel with a 180-second deadline. Your MOR comes back faster.
Per-stage timing shows exactly where latency lives: TCP init vs prompt response. Editable prompts with easy/medium/hard presets. Probe endpoint toggle and auto-blacklist for dead providers. Full history tab for tracking provider reliability over time.
The Morpheus network continues to grow. Notable additions available through Pistachio:
deepseek-v4-pro and deepseek-v4-pro:web (with web search).kimi-k2.6 and kimi-k2.6:web.67 unique models from 9 providers are currently available on the network. The :web suffix indicates models with integrated web search and citation capabilities.
Aggregated reliability data from canary sweeps, load tests, and chat interactions. Per-model success rates, average latency, test counts, and time-series history. Filter by provider, test source, or search by name. See at a glance which models are healthy, degraded, or broken.
The DRM3 Pass NFT contract has been redeployed to GEN 9 on Base mainnet. Existing pass holders are auto-airdropped at each generation roll. The pass gates your inference capacity: Free (20 MOR), Bronze (+200), Silver (+1,000), Gold (+5,000), Diamond (+20,000). Claim a free pass at nft.drm3.xyz.
Every inference response, every release binary, and now every capacity check is signed with Ed25519 via the DRM3 provenance protocol. Public keys are published at each service's /.well-known/ endpoint. The trust chain runs from the DRM3 root signer through service-level keys to per-instance signers. Verify anything, trust nothing.
brew upgrade pistachio
Or reinstall:
curl -fsSL https://drm3.network/install.sh | sh
Desktop app users will receive an auto-update prompt on next launch.