AGA MCP Server
Cryptographic runtime governance for AI agents. 20 tools. Sealed policy artifacts, continuous measurement, tamper-evident proof. Ed25519 + SHA-256.
AGA - Attested Governance Artifacts
Cryptographic runtime governance for AI agents and autonomous systems.
# Try it now
pip install aga-governance
python -m aga demo
python -m aga verify demo-bundle.json
What This Does
Every tool call an AI agent makes passes through the AGA gateway. Each call is evaluated against policy, and the decision (PERMITTED or DENIED) is recorded as a signed, hash-linked governance receipt. Receipts are collected into evidence bundles that any third party can verify offline using standard cryptography.
Record. Prove. Verify.
Use with Claude Desktop
Add to your Claude Desktop MCP config (claude_desktop_config.json):
{
"mcpServers": {
"aga": {
"command": "npx",
"args": ["-y", "@attested-intelligence/aga-mcp-server"]
}
}
}
Claude can then seal artifacts, measure integrity, generate evidence bundles, and verify compliance through natural language.
MCP Tools (20)
| Category | Tools |
|---|---|
| Identity | get_server_info, get_portal_state |
| Lifecycle | init_chain, attest_subject, revoke_artifact |
| Enforcement | measure_integrity, measure_behavior, verify_chain |
| Evidence | create_checkpoint, generate_evidence_bundle, verify_bundle_offline |
| Privacy | request_claim, list_claims |
| Delegation | delegate_to_subagent |
| Audit | get_receipts, get_chain_events |
Quick Start
Verify an evidence bundle (3 commands)
pip install aga-governance
curl -s https://aga-mcp-gateway.attestedintelligence.workers.dev/bundle -o evidence-bundle.json
python -m aga verify evidence-bundle.json
Or verify in your browser
Go to attestedintelligence.com/verify and click "Run Verification." Zero installs required.
How It Works
AI Agent AGA Gateway Verifier
| | |
|-- tools/call ----------->| |
| [Evaluate Policy] |
| [Sign Receipt] |
| [Chain to Previous] |
|<-- PERMITTED/DENIED -----| |
| | |
| [Export Bundle] |
| |--------- evidence.json ----->|
| | [Verify Signatures]
| | [Verify Chain]
| | [Verify Merkle Tree]
| | [PASS / FAIL]
MCP Governance Proxy
Run AGA as a transparent proxy between any MCP client and any MCP server. Every tool call gets evaluated against policy and produces a signed receipt.
# Start the proxy with an upstream MCP server
npx tsx src/proxy/index.ts start --upstream "npx -y @modelcontextprotocol/server-filesystem /tmp/test" --profile standard
# Export the evidence bundle
npx tsx src/proxy/index.ts export --output evidence.json
# Verify
npx tsx src/proxy/index.ts verify evidence.json
The proxy intercepts tools/call requests, evaluates them against a sealed policy artifact, and generates signed receipts. Permitted calls are forwarded to the downstream server. Denied calls return an MCP error. Every decision is hash-linked into a tamper-evident chain.
Three built-in policy profiles:
- permissive - log everything, block nothing (default)
- standard - rate limits + blocks destructive operations
- restrictive - explicit tool allowlist, all unknown tools denied
Verification (5 steps)
- Algorithm Check - Bundle declares Ed25519-SHA256-JCS, fail closed on anything else
- Receipt Signatures - Ed25519 over RFC 8785 canonical JSON (signature field excluded)
- Chain Integrity - Each receipt's
previous_receipt_hash= SHA-256 of the preceding receipt - Merkle Proofs - Walk siblings/directions to root, compare against bundle root
- Bundle Consistency - Proof count = receipt count, leaf hashes match receipt hashes
Cryptographic Primitives
| Primitive | Purpose |
|---|---|
| Ed25519 | Receipt signatures |
| SHA-256 | Hash chaining, Merkle trees, leaf computation |
| RFC 8785 (JCS) | Canonical JSON for deterministic signing |
| Merkle Trees | Binding all receipts to a single verifiable root |
Live Gateway
The demo gateway is deployed on Cloudflare Workers:
# Check status
curl https://aga-mcp-gateway.attestedintelligence.workers.dev/health
# Export evidence bundle
curl https://aga-mcp-gateway.attestedintelligence.workers.dev/bundle -o evidence-bundle.json
Python SDK
pip install aga-governance
from aga import AgentSession
with AgentSession(gateway_id="my-gateway") as session:
session.record_tool_call(
tool_name="search_web",
decision="PERMITTED",
reason="tool in allowlist",
request_id="req-1",
)
bundle = session.export_bundle()
result = session.verify()
assert result["overall_valid"]
Test Suite
355+ automated tests across TypeScript and Python:
- TypeScript MCP Server: 218 tests (vitest)
- Python SDK: 137 tests (pytest)
- Cross-language test vectors: 37 vectors across 9 categories
npm test # TypeScript tests
For the Python SDK, install aga-governance from PyPI: https://pypi.org/project/aga-governance/
Project Structure
src/ # Core protocol: artifacts, receipts, chain, Merkle, crypto, portal state machine
core/ # Governance primitives (artifact, receipt, chain, portal, bundle)
crypto/ # Ed25519, SHA-256, BLAKE2b, Merkle, JCS canonicalization
proxy/ # MCP governance proxy (transparent interception + policy enforcement)
tools/ # MCP tool handlers (20 tools)
middleware/ # Zero-trust governance enforcement wrapper
independent-verifier/ # Standalone verifier with zero AGA imports
scenarios/ # Deployment scenarios (SCADA, drone, AI agent)
tests/ # TypeScript test suite (218 tests)
Links
- Website
- Technology
- Live Verifier
- Trust and Scope
- Diligence Materials
- MCP Server (npm)
- Python SDK (PyPI)
Security
See SECURITY.md for vulnerability reporting.
Contributing
See CONTRIBUTING.md for development setup and guidelines.
License
Attested Intelligence Holdings LLC
관련 서버
DrainBrain MCP Server
Solana token rug-pull detection via ML ensemble (XGBoost + GRU temporal)
Ingero
eBPF-based GPU causal observability agent with MCP server. Traces CUDA Runtime/Driver APIs via uprobes and host kernel events via tracepoints to build causal chains explaining GPU latency. 7 MCP tools for AI-assisted GPU debugging and root cause analysis. <2% overhead, production-safe.
Cybersecurity Vulnerability Intel MCP
Real-time CVE lookup via NIST NVD 2.0, CISA KEV alerts, EPSS exploitation probability, and MITRE ATT&CK mappings. 7 tools for AI-powered vulnerability assessment.
NVD CVE MCP Server
The NVD CVE MCP Server is a powerful security research tool
Two Minute Reports MCP
Analyse SEO, PPC, E-Commerce from 30+ marketing sources
Skillbase/spm
npm for AI skills. Create, share, and discover reusable AI instructions for any model via MCP.
bioinformatics-mcp-server
Bioinformatics data for AI agents — gene search, protein structures, clinical variants, PubMed literature, and DNA sequences via NCBI and UniProt. No API key required.
CardRail
MCP server that lets AI agents make purchases with personal Visa/Mastercard cards and configurable guardrails. No LLC required.
PRH Finnish Company Registry MCP Server
MCP server for PRH (Finnish Patent and Registration Office). Free public API — look up any Finnish company by name, business ID, location, or industry. No auth required.
TengineAI
Run MCP tools in production without managing your own server — built-in retries, permissions, and observability.