Demo Commands

Copy-paste command workflows for every OpenA2A tool. From install to output in under a minute.

# Get started in one command
npx opena2a-cli init

OpenA2A CLI

Docs

Unified entry point for all security tools. Assess, protect, and harden any project.

# Quick start (no install)
npx opena2a-cli init
# Install globally
npm install -g opena2a-cli
# Assess project security
opena2a init --verbose
# Semantic command search
opena2a ~drift
# Context-aware recommendations
opena2a ?

Credential Protection

Docs

Detect hardcoded credentials, migrate to env vars, and generate reports.

# Scan for credentials (preview)
opena2a protect --dry-run
# Migrate credentials to vault
opena2a protect
# Generate interactive HTML report
opena2a protect --dry-run --report report.html
# CI pipeline mode
opena2a protect --dry-run --ci --format json

The --report flag generates a self-contained HTML file with severity filtering, audience toggle, and donut chart.

Sample report: View a sample interactive HTML report generated by opena2a protect --report.

HackMyAgent

Docs

Security scanner with 147 security checks, attack simulation, and auto-fix.

# Quick security scan
npx hackmyagent secure
# Via CLI adapter
opena2a scan
# Scan with auto-fix
npx hackmyagent secure --fix
# Attack mode (red team)
npx hackmyagent attack http://localhost:3000
# CIS compliance report
npx hackmyagent secure --format json > report.json

Secretless AI

Docs

Keep secrets out of AI tool context windows. Supports Claude Code, Cursor, Copilot, Windsurf.

# Initialize protection
npx secretless-ai init
# Via CLI adapter
opena2a secrets init
# Verify configuration
npx secretless-ai verify
# Start credential broker
opena2a broker start

AIM (Agent Identity Management)

Docs

Identity, access control, and trust scoring for AI agents.

# Via CLI adapter
opena2a identity list
# Create an agent
opena2a identity create --name my-agent
# Check trust score
opena2a identity trust my-agent
# Start AIM server (Docker)
docker compose up aim-server -d

OASB (Open Agent Security Benchmark)

Docs

222 standardized attack scenarios across 10 MITRE ATLAS techniques.

# Run benchmark suite
opena2a benchmark run
# Run specific technique
opena2a benchmark run --technique T0015
# Generate compliance score
opena2a benchmark run --format json

ARP (Agent Runtime Protection)

Docs

Runtime security monitoring for OS-level and AI-layer activity.

# Generate ARP config
opena2a runtime init
# Start monitoring
opena2a runtime start
# View security events
opena2a runtime tail
# Check monitor status
opena2a runtime status

Shadow AI Discovery

Docs

Find unmanaged AI agents and MCP servers. Answer: what is running, and is it governed?

# Scan current directory
opena2a detect
# Scan specific project
opena2a detect --dir ./my-agent
# Verbose output
opena2a detect --verbose
# JSON for CI
opena2a detect --ci --format json

MCP Server Identity

Docs

Audit MCP configs, create Ed25519 identities, and verify signatures.

# Discover MCP servers
opena2a mcp
# Sign a server identity
opena2a mcp sign filesystem
# Verify a signed server
opena2a mcp verify filesystem
# Verbose audit
opena2a mcp audit --verbose

Interactive Demos

Docs

Run full AIM lifecycle and DVAA attack/defend walkthroughs in a sandbox.

# AIM lifecycle (22 to 87 trust score)
opena2a demo aim
# DVAA attack/defend (18 to 91)
opena2a demo dvaa
# Interactive mode
opena2a demo aim --interactive
# Keep sandbox for inspection
opena2a demo aim --keep

Config Guard

Docs

SHA-256 signing and tamper detection for config files.

# Sign all config files
opena2a guard sign
# Verify integrity
opena2a guard verify
# Show signature status
opena2a guard status

DVAA (Damn Vulnerable AI Agent)

Docs

Intentionally vulnerable AI agent for security training.

# Launch training lab
opena2a train start
# Via Docker directly
docker run -p 3000:3000 opena2a/dvaa

CryptoServe

Docs

Cryptographic inventory and post-quantum readiness assessment.

# Via CLI adapter
opena2a crypto scan
# Via pip directly
pip install cryptoserve && cryptoserve scan .

CI/CD Integration

All commands support --format json and --ci flags for pipeline integration.

# GitHub Actions example
- name: Security assessment
  run: npx opena2a-cli init --ci --format json > security-report.json

- name: Credential check
  run: |
    npx opena2a-cli protect --dry-run --ci --format json > cred-report.json
    jq -e '.totalFound == 0' cred-report.json

- name: Config integrity
  run: npx opena2a-cli guard verify --ci

Related