AGA MCP Server

Cryptographic runtime governance for AI agents. 20 tools. Sealed policy artifacts, continuous measurement, tamper-evident proof. Ed25519 + SHA-256.

@attested-intelligence/aga-mcp-server v2.0.0

MCP Badge

MCP server implementing the Attested Governance Artifact (AGA) protocol - cryptographic compliance enforcement for autonomous AI systems.

What It Does

This server acts as a Portal (zero-trust Policy Enforcement Point) for AI agents. Every tool call is attested, measured against a sealed cryptographic reference, and logged to a tamper-evident continuity chain with signed receipts.

20 tools, 4 resources, 3 prompts, 159 tests

20 MCP Tools

#ToolNIST/Patent RefDescription
1aga_server_info-Server identity, keys, portal state, framework alignment
2aga_init_chainClaim 3aInitialize continuity chain with genesis event
3aga_create_artifactClaims 1a-1dAttest subject, generate sealed Policy Artifact
4aga_measure_subjectClaims 1e-1gMeasure subject, compare to sealed ref, generate receipt
5aga_verify_artifactClaim 10Verify artifact signature against issuer key
6aga_start_monitoringNIST-2025-0035Start/restart behavioral monitoring with baseline
7aga_get_portal_state-Current portal enforcement state and TTL
8aga_trigger_measurementClaims 1e-1gTrigger measurement with specific type
9aga_generate_receiptV3 PromiseGenerate signed measurement receipt manually
10aga_export_bundleClaim 9Package artifact + receipts + Merkle proofs
11aga_verify_bundleSection J4-step offline bundle verification
12aga_disclose_claimClaim 2Privacy-preserving disclosure with auto-substitution
13aga_get_chainClaim 3cGet chain events with optional integrity verification
14aga_quarantine_statusClaim 5Quarantine state and forensic capture status
15aga_revoke_artifactNCCoE 3bMid-session artifact revocation
16aga_set_verification_tier-Set verification tier (BRONZE/SILVER/GOLD)
17aga_demonstrate_lifecycleAllFull lifecycle: attest, measure, checkpoint, verify
18aga_measure_behaviorNIST-2025-0035Behavioral drift detection (tool patterns)
19aga_delegate_to_subagentNCCoEConstrained sub-agent delegation (scope only diminishes)
20aga_rotate_keysClaim 3Key rotation with chain event

4 Resources

ResourceURIDescription
Protocol Specaga://specification/protocol-v2Full protocol specification with SPIFFE alignment
Sample Bundleaga://resources/sample-bundleSample evidence bundle documentation
Crypto Primitivesaga://resources/crypto-primitivesCryptographic primitives documentation
Patent Claimsaga://resources/patent-claims20 patent claims mapped to tools

3 Prompts

PromptDescription
nccoe-demo4-phase NCCoE lab demo with behavioral drift
governance-reportSession governance summary report
drift-analysisDrift event analysis and remediation

CoSAI MCP Security Threat Coverage

The AGA MCP Server addresses all 12 threat categories identified in the CoSAI MCP Security whitepaper (Coalition for Secure AI / OASIS, January 2026).

CoSAI CategoryThreat DomainAGA Governance Mechanism
T1: Improper AuthenticationIdentity & AccessEd25519 artifact signatures, pinned issuer keys, TTL re-attestation, key rotation chain events
T2: Missing Access ControlIdentity & AccessPortal as mandatory enforcement boundary, sealed constraints, delegation with scope diminishment
T3: Input Validation FailuresInput HandlingRuntime measurement against sealed reference, behavioral drift detection
T4: Data/Control Boundary FailuresInput HandlingBehavioral baseline (permitted tools, forbidden sequences, rate limits), phantom execution forensics
T5: Inadequate Data ProtectionData & CodeSalted commitments, privacy-preserving disclosure with substitution, inference risk prevention
T6: Missing Integrity ControlsData & CodeContent-addressable hash binding, 10 measurement embodiments, continuous runtime verification
T7: Session/Transport SecurityNetwork & TransportTTL-based artifact expiration, fail-closed on expiry, mid-session revocation, Ed25519 signed receipts
T8: Network Isolation FailuresNetwork & TransportTwo-process architecture, agent holds no credentials, NETWORK_ISOLATE enforcement action
T9: Trust Boundary FailuresTrust & DesignEnforcement pre-committed by human authorities in sealed artifact, not delegated to LLM
T10: Resource ManagementTrust & DesignPer-tool rate limits in behavioral baseline, configurable measurement cadence (10ms to 3600s)
T11: Supply Chain FailuresOperationalContent-addressable hashing at attestation, runtime hash comparison blocks modified components
T12: Insufficient ObservabilityOperationalSigned receipts, tamper-evident continuity chain, Merkle anchoring, offline evidence bundles

Full mapping details available via the aga://specification resource.

Quick Start

npm install && npm run build && npm test

Connect to Claude Desktop

Add to %APPDATA%\Claude\claude_desktop_config.json:

{
  "mcpServers": {
    "aga": { "command": "node", "args": ["C:/Users/neuro/AIH/aga-mcp-server/dist/index.js"] }
  }
}

Architecture

MCP Client (Claude Desktop)
    │ JSON-RPC over stdio
    ▼
src/server.ts - 20 tools + 4 resources + 3 prompts
    │
    ├── src/tools/          20 individual tool handlers
    ├── src/core/           Protocol logic (artifact, chain, portal, etc.)
    ├── src/crypto/         Ed25519 + SHA-256 + Merkle + canonical JSON
    ├── src/middleware/     Zero-trust governance PEP
    ├── src/storage/        In-memory + optional SQLite
    ├── src/resources/      Protocol docs + patent claims
    └── src/prompts/        Demo + report + analysis prompts

Test Coverage

SuiteTestsWhat
Crypto33SHA-256, Ed25519, Merkle, salt, canonical, keys
Core56Artifact, chain, portal, governance, behavioral, delegation, privacy, revocation, fail-closed
Tools25All 20 tool handlers
Integration38Bundle tamper, lifecycle, performance, NCCoE demo, crucible compatibility
Total159

License

MIT - Attested Intelligence Holdings LLC

Related Servers