Find. Fix. Prove.
Open-source identity, testing, and compliance for AI agents and MCP servers.
From the founders of CyberSecurity NonProfit (12,000+ security professionals)
Agents operate without cryptographic identity. You can't verify who did what.
Your agents connect blindly to untrusted services. No attestation, no verification.
No audit trail. No logs. You find out about breaches weeks later.
AI agents are the fastest-growing class of non-human identity — but they're invisible to traditional IAM and NHI tools.
Six open-source tools that cover every OASB control — from identity to testing to compliance.
Agent Identity Management — cryptographic identity, access control, audit logging for AI agents.
$ pip install aim-sdkSecurity scanner and red-team toolkit. 147 checks, 55 attack payloads, auto-fix with rollback.
$ npx hackmyagent secureBlocks AI coding tools from reading credentials. PreToolUse hooks, 20+ file patterns, 12 secret detectors.
$ npx secretless-ai initDamn Vulnerable AI Agent — 10 intentionally vulnerable agents, 8 attack classes, CTF challenges.
$ docker run -p 3000:3000 opena2a/dvaaOpen Agent Security Benchmark — 46 controls, 3 maturity levels, SOC 2 / ISO 27001 / NIST CSF mapping.
$ npx hackmyagent secure --benchmark oasb-1Agent Runtime Protection — process, network, and filesystem monitoring with zero-latency interception.
$ npm install @opena2a/arp$ pip install aim-sdkagent = secure("my-agent")Python, Java, and TypeScript SDKs with LangChain, CrewAI, Spring AI, and MCP integrations
from aim_sdk import secure
# One line - cryptographic identity, audit logging, trust scoring
agent = secure("my-agent")
# Wrap any action with capability enforcement
@agent.perform_action("db:read", resource="users")
def get_user_data(user_id: str):
return database.query(user_id)
# MCP servers auto-discovered and attested
# All actions logged with full audit trail
# Trust score updated in real-timeThe Open Agent Security Benchmark defines 46 controls across 10 categories. Here is which OpenA2A tool covers each.
Ed25519 + ML-DSA post-quantum keypairs, ownership registry, agent bill of materials
Capability-based access control, JIT access grants, runtime enforcement
75 attack payloads across 7 categories, runtime prompt interception
Output validation, exfiltration detection, runtime output scanning
49 credential patterns, MCP vault protection, context window isolation
SkillGuard hash pinning, SignCrypt signing, registry trust verification
Mutual authentication, 10 A2A attack payloads, trust boundaries
Context manipulation testing, runtime memory isolation
147 configuration checks, process/network/filesystem monitoring
8-factor trust scoring, behavioral anomaly detection, kill switch
Subscribe to our newsletter for weekly insights, vulnerability alerts, and best practices