Security & Auth
A2A agents demonstrating authentication, authorization, and secure agent communication patterns.
Agents (8)
Headless Agent Auth (Official Sample)
A2A Project
Official A2A python sample agent: Headless Agent Auth
Magic 8 Ball Security (Official Sample)
A2A Project
Official A2A java sample agent: Magic 8 Ball Security
A2A Agents Secure Verification Poc
guerilla7
a Python proof-of-concept (PoC) application for security formal verification of LLM Agents using Google A2A (Agent-to-Agent) protocol.
Signing And Verifying (Official Sample)
A2A Project
Official A2A python sample agent: Signing And Verifying
Secure Rag Multi Agent
ssdeanx
Secure Retrieval-Augmented Generation (RAG) with role-based access control using Mastra AI orchestration, with JWT Secure, also Deep Research built with Cedar & Next.js. Gemini, OpenAI, Openrouter, & Gemini CLI usable. Also exposes tools, agents as MCP Server Also A2A Agent Cards
A2A Scanner
cisco-ai-defense
Scan A2A agents for potential threats and security issues
Ziran
taoq-ai
Ziran uses advanced attack methodologies including multi-phase trust exploitation and knowledge graph analysis to uncover vulnerabilities in AI agents before attackers do.
Capiscio SDK Python
capiscio
Runtime security middleware for A2A (Agent-to-Agent) protocol agents. Provides always-on validation, signature verification, and rate limiting for AI agent interactions.
Getting Started
Pick an agent to see setup instructions.