AGA MCP Server

Cryptographic runtime governance for AI agents. 20 tools. Sealed policy artifacts, continuous measurement, tamper-evident proof. Ed25519 + SHA-256.

@attested-intelligence/aga-mcp-server v2.0.0

MCP Badge

MCP server implementing the Attested Governance Artifact (AGA) protocol - cryptographic compliance enforcement for autonomous AI systems.

What It Does

This server acts as a Portal (zero-trust Policy Enforcement Point) for AI agents. Every tool call is attested, measured against a sealed cryptographic reference, and logged to a tamper-evident continuity chain with signed receipts.

20 tools, 3 resources, 3 prompts, 159 tests

20 MCP Tools

#ToolDescription
1aga_server_infoServer identity, keys, portal state, framework alignment
2aga_init_chainInitialize continuity chain with genesis event
3aga_create_artifactAttest subject, generate sealed Policy Artifact
4aga_measure_subjectMeasure subject, compare to sealed ref, generate receipt
5aga_verify_artifactVerify artifact signature against issuer key
6aga_start_monitoringStart/restart behavioral monitoring with baseline
7aga_get_portal_stateCurrent portal enforcement state and TTL
8aga_trigger_measurementTrigger measurement with specific type
9aga_generate_receiptGenerate signed measurement receipt manually
10aga_export_bundlePackage artifact + receipts + Merkle proofs
11aga_verify_bundle4-step offline bundle verification
12aga_disclose_claimPrivacy-preserving disclosure with auto-substitution
13aga_get_chainGet chain events with optional integrity verification
14aga_quarantine_statusQuarantine state and forensic capture status
15aga_revoke_artifactMid-session artifact revocation
16aga_set_verification_tierSet verification tier (BRONZE/SILVER/GOLD)
17aga_demonstrate_lifecycleFull lifecycle: attest, measure, checkpoint, verify
18aga_measure_behaviorBehavioral drift detection (tool patterns)
19aga_delegate_to_subagentConstrained sub-agent delegation (scope only diminishes)
20aga_rotate_keysKey rotation with chain event

3 Resources

ResourceURIDescription
Protocol Specaga://specification/protocol-v2Full protocol specification with SPIFFE alignment
Sample Bundleaga://resources/sample-bundleSample evidence bundle documentation
Crypto Primitivesaga://resources/crypto-primitivesCryptographic primitives documentation

3 Prompts

PromptDescription
nccoe-demo4-phase NCCoE lab demo with behavioral drift
governance-reportSession governance summary report
drift-analysisDrift event analysis and remediation

CoSAI MCP Security Threat Coverage

The AGA MCP Server addresses all 12 threat categories identified in the CoSAI MCP Security whitepaper (Coalition for Secure AI / OASIS, January 2026).

CoSAI CategoryThreat DomainAGA Governance Mechanism
T1: Improper AuthenticationIdentity & AccessEd25519 artifact signatures, pinned issuer keys, TTL re-attestation, key rotation chain events
T2: Missing Access ControlIdentity & AccessPortal as mandatory enforcement boundary, sealed constraints, delegation with scope diminishment
T3: Input Validation FailuresInput HandlingRuntime measurement against sealed reference, behavioral drift detection
T4: Data/Control Boundary FailuresInput HandlingBehavioral baseline (permitted tools, forbidden sequences, rate limits), phantom execution forensics
T5: Inadequate Data ProtectionData & CodeSalted commitments, privacy-preserving disclosure with substitution, inference risk prevention
T6: Missing Integrity ControlsData & CodeContent-addressable hash binding, 10 measurement embodiments, continuous runtime verification
T7: Session/Transport SecurityNetwork & TransportTTL-based artifact expiration, fail-closed on expiry, mid-session revocation, Ed25519 signed receipts
T8: Network Isolation FailuresNetwork & TransportTwo-process architecture, agent holds no credentials, NETWORK_ISOLATE enforcement action
T9: Trust Boundary FailuresTrust & DesignEnforcement pre-committed by human authorities in sealed artifact, not delegated to LLM
T10: Resource ManagementTrust & DesignPer-tool rate limits in behavioral baseline, configurable measurement cadence (10ms to 3600s)
T11: Supply Chain FailuresOperationalContent-addressable hashing at attestation, runtime hash comparison blocks modified components
T12: Insufficient ObservabilityOperationalSigned receipts, tamper-evident continuity chain, Merkle anchoring, offline evidence bundles

Full mapping details available via the aga://specification resource.

Quick Start

npm install && npm run build && npm test

Connect to an MCP Client

Add to your MCP client config:

{
  "mcpServers": {
    "aga": { "command": "node", "args": ["/path/to/aga-mcp-server/dist/index.js"] }
  }
}

Architecture

MCP Client
    │ JSON-RPC over stdio
    ▼
src/server.ts - 20 tools + 3 resources + 3 prompts
    │
    ├── src/tools/          20 individual tool handlers
    ├── src/core/           Protocol logic (artifact, chain, portal, etc.)
    ├── src/crypto/         Ed25519 + SHA-256 + Merkle + canonical JSON
    ├── src/middleware/     Zero-trust governance PEP
    ├── src/storage/        In-memory + optional SQLite
    ├── src/resources/      Protocol docs + crypto primitives
    └── src/prompts/        Demo + report + analysis prompts

Test Coverage

SuiteTestsWhat
Crypto33SHA-256, Ed25519, Merkle, salt, canonical, keys
Core56Artifact, chain, portal, governance, behavioral, delegation, privacy, revocation, fail-closed
Tools25All 20 tool handlers
Integration38Bundle tamper, lifecycle, performance, NCCoE demo, crucible compatibility
Total159

License

MIT - Attested Intelligence Holdings LLC

Verwandte Server