Press & Media

Resources for journalists, analysts, and media covering AI security and agent infrastructure.

Download Press Kit

Demo Video

AIM: Open Source Security Platform for AI Agents and MCP Servers - Full Demo

Complete walkthrough of AIM including agent registration, MCP server attestation, trust scoring, automatic MCP discovery, SDK integration, and API key management.

Watch on YouTube|7:41 duration
PRESS RELEASE

FOR IMMEDIATE RELEASE — December 2025

OpenA2A Launches AIM: Open-Source Identity Management for AI Agents

DENVER, CO — OpenA2A today announced the public launch of AIM (Agent Identity Management), an open-source platform that brings cryptographic identity and zero-trust security to AI agents. With a single line of code, developers can secure their AI agents against prompt injection attacks, agent impersonation, and unauthorized actions.

"AI agents are the new attack surface," said Abdel Sy Fane, Founder and CEO of OpenA2A. "The EchoLeak vulnerability demonstrated that AI agents in production face real security threats. AIM provides the security foundation that every AI agent needs—cryptographic identity, capability-based access control, and complete audit trails."

Key Features

  • One-Line Integration: agent = secure("my-agent") — cryptographic identity, audit logging, and trust scoring with zero configuration
  • MCP Server Attestation: Cryptographic verification of MCP server authenticity before connection, with continuous drift detection to catch unauthorized changes
  • Supply Chain Security: Complete visibility into agent-to-MCP server dependencies with attestation status, preventing compromised or malicious servers from entering your environment
  • MCP Asset Management: Know every MCP server in your organization—who registered it, which agents use it, and what it can access (database read/write, file system, APIs)
  • 8-Factor Trust Scoring: Real-time behavioral analysis with automatic trust adjustment
  • Compliance Ready: Complete audit trails for SOC 2, HIPAA, and GDPR requirements

Framework Support

AIM integrates with LangChain, CrewAI, AutoGen, and any MCP-compatible agent framework. The Python SDK auto-detects the framework in use and applies appropriate security controls.

Enterprise Supply Chain Security

As AI agents proliferate across enterprises, they create complex dependency chains with MCP servers, external APIs, and other agents. AIM addresses this supply chain risk with cryptographic attestation—every MCP server is verified before agents connect, with continuous monitoring for configuration drift. Organizations gain complete visibility into their agent-to-server dependency graph, ensuring that compromised or malicious servers cannot infiltrate their AI infrastructure. This is critical for regulated industries where third-party risk management and software supply chain security are compliance requirements.

MCP Asset Management

Today, most organizations have no visibility into what MCP servers their engineers are deploying—it's shadow IT for the AI era. AIM brings order to this chaos with comprehensive MCP asset management: which MCP servers are in use, who registered them, which agents connect to them, and what capabilities each server exposes. A Postgres MCP server? AIM tracks that it has read/write database access. A filesystem MCP? AIM knows it can access local files. This visibility is essential for security teams to understand their AI attack surface and for compliance teams to audit agent capabilities.

Availability

AIM is available today under the AGPL-3.0 open-source license. Organizations can self-host for free or use AIM Cloud for managed infrastructure. Enterprise licensing will be available in 2026 for organizations requiring alternative licensing terms.

About OpenA2A

OpenA2A builds open-source security infrastructure for AI agents. Founded by cybersecurity veteran Abdel Sy Fane (17 years securing Fortune 500 companies, Executive Director of CSNP), OpenA2A brings enterprise security expertise to the AI agent ecosystem.

Media Contact: info@opena2a.org

Fact Sheet

Key Statistics

AI Security Breach Rate
74%
of organizations experienced AI security breach in 2023
EchoLeak CVE Score
9.3 Critical
CVE-2025-32711 - Microsoft Copilot vulnerability
Average Data Breach Cost
$4.45M
IBM Cost of a Data Breach Report 2023

Product Information

Product Name
AIM (Agent Identity Management)
Company
OpenA2A
License
AGPL-3.0 (Open Source)
Primary Language
Python SDK
Cryptography
Ed25519 Signatures
Framework Support
LangChain, CrewAI, AutoGen, MCP
Deployment
Self-hosted or AIM Cloud

Key Differentiators

  • First open-source platform with cryptographic agent identity
  • One-line integration vs. complex configuration
  • MCP server attestation with drift detection—know when servers change
  • Supply chain visibility: full dependency graph of agents to MCP servers
  • MCP asset management: end shadow IT for AI with full inventory and capabilities
  • Behavioral trust scoring with automatic enforcement
  • Built by enterprise security veterans

Leadership

Abdel Sy Fane

Abdel Sy Fane

Founder & CEO

17 years cybersecurity • Fortune 500 experience • CTO of DevSecFlow • Executive Director of CSNP (12,000+ members)

Key Talking Points

On the Problem

  • "AI agents are the fastest-growing attack surface we've ever seen."
  • "Traditional security assumes human-in-the-loop. Agents operate autonomously."
  • "Every unverified agent is a potential insider threat with API access."

On the Solution

  • "Cryptographic identity means agents can't be impersonated."
  • "Capability-based access control stops attacks at the API layer."
  • "One line of code because security can't be a barrier to adoption."

On Supply Chain Security

  • "Every MCP server your agent connects to is a potential attack vector."
  • "Attestation means you know exactly what your agents are connecting to—and you'll know the moment something changes."
  • "For enterprises, supply chain security isn't optional—it's a compliance requirement. AIM makes it automatic."

On MCP Asset Management

  • "Most organizations have no idea what MCP servers their engineers are running—it's shadow IT for the AI era."
  • "AIM tells you exactly which MCPs are in use, who's using them, which agents connect to them, and what they can access."
  • "A Postgres MCP has database read/write access. A filesystem MCP can access local files. Security teams need to know this."

On Timing

  • "EchoLeak showed this isn't theoretical—it's happening now."
  • "Organizations are moving agents to production this quarter."
  • "We're open source because trust requires transparency."