← Pistachio docs

Pistachio v0.18.0

May 11, 2026

The biggest release since v0.12. Pistachio is now fully independent, cryptographically verified, and loaded with new testing tools. Here's what changed.

Alpha software. Pistachio is closed source and requires a wallet private key for on-chain transaction signing. There are no warranties, expressed or implied. Use at your own risk. Your MOR stake is real and interacts with live smart contracts on Base mainnet. DRM3 Labs Corp. is not responsible for any loss of funds, failed transactions, or service interruptions.

Install

brew tap drm3labs/drm3 && brew install pistachio

curl -fsSL https://drm3.network/install.sh | sh



Decoupled from Cashew

Pistachio no longer depends on Cashew for Morpheus network data. Starting with v0.18, sessions, marketplace bids, provider listings, and wallet balances are all read directly from the Morpheus smart contracts on Base via RPC. No intermediary, no shared database, no relay between you and the chain.

NFT pass capacity is checked through the DRM3 Explorer, which reads from the DRM3 Pass contract (a separate DRM3 contract on Base, not a Morpheus contract). That capacity response is now cryptographically signed and verified.

This was a multi-release effort that started in v0.15 and is now complete. The last Cashew dependency (session data) was removed entirely. Pistachio boots from zero using only your wallet key and a Base RPC endpoint.


Signed Capacity Verification

Every NFT capacity response from the DRM3 Explorer is now cryptographically signed with Ed25519 using the DRM3 provenance protocol. Pistachio verifies the signature, checks the signer's public key against a pinned value, validates the queried wallet in the input hash, and enforces a 5-minute freshness window.

Unsigned or tampered responses are rejected. Pistachio falls back to its cached value and never trusts unverified data. This closes a theoretical MITM vector on the capacity check that gates session creation.


Canary Testing

The new Canary Test page lets you fire a single inference request at every provider and model on the network. See which models actually respond, measure per-stage latency (TCP init vs prompt delivery), and identify dead providers before you stake on them.

Results feed directly into the Model Health dashboard. Run a canary sweep before committing MOR to a model and you'll know exactly what's working.


Load Testing

Built-in stress testing with configurable concurrency, request counts, and load presets (Steady, Saturate, Burst, Stress). Fire hundreds of requests at your staked sessions to measure throughput, identify bottlenecks, and test provider reliability under pressure. Per-request traces let you drill into every success and failure.


Model Blacklist

Persistently exclude models that don't work for you. Blocked models are hidden from inference (403), canary tests, and load tests. Managed from Settings with a per-provider view and health indicators. No more wasting stake on models that consistently fail.


Parallel Session Reclaim

Expired session reclaims now run concurrently. What used to take 45+ seconds for a batch of 60 sessions now completes in under 3 seconds. Provider reports are fetched in parallel with a 180-second deadline. Your MOR comes back faster.


Canary Redesign

Per-stage timing shows exactly where latency lives: TCP init vs prompt response. Editable prompts with easy/medium/hard presets. Probe endpoint toggle and auto-blacklist for dead providers. Full history tab for tracking provider reliability over time.


New Model Support

The Morpheus network continues to grow. Notable additions available through Pistachio:

67 unique models from 9 providers are currently available on the network. The :web suffix indicates models with integrated web search and citation capabilities.


Model Health Dashboard

Aggregated reliability data from canary sweeps, load tests, and chat interactions. Per-model success rates, average latency, test counts, and time-series history. Filter by provider, test source, or search by name. See at a glance which models are healthy, degraded, or broken.


Pistachio Pass GEN 9

The DRM3 Pass NFT contract has been redeployed to GEN 9 on Base mainnet. Existing pass holders are auto-airdropped at each generation roll. The pass gates your inference capacity: Free (20 MOR), Bronze (+200), Silver (+1,000), Gold (+5,000), Diamond (+20,000). Claim a free pass at nft.drm3.xyz.


Ed25519 Provenance on Everything

Every inference response, every release binary, and now every capacity check is signed with Ed25519 via the DRM3 provenance protocol. Public keys are published at each service's /.well-known/ endpoint. The trust chain runs from the DRM3 root signer through service-level keys to per-instance signers. Verify anything, trust nothing.


Upgrade

brew upgrade pistachio

Or reinstall:

curl -fsSL https://drm3.network/install.sh | sh

Desktop app users will receive an auto-update prompt on next launch.

Alpha software. Pistachio is closed source and requires a wallet private key for on-chain transaction signing. Provided "as is" without warranty of any kind, expressed or implied. Use at your own risk. MOR staking involves real tokens on Base mainnet. DRM3 Labs Corp. is not responsible for any loss of funds, failed transactions, or service interruptions.