Resources for journalists, analysts, and media covering AI security and agent infrastructure.
Complete walkthrough of AIM including agent registration, MCP server attestation, trust scoring, automatic MCP discovery, SDK integration, and API key management.
FOR IMMEDIATE RELEASE — December 2025
DENVER, CO — OpenA2A today announced the public launch of AIM (Agent Identity Management), an open-source platform that brings cryptographic identity and zero-trust security to AI agents. With a single line of code, developers can secure their AI agents against prompt injection attacks, agent impersonation, and unauthorized actions.
"AI agents are the new attack surface," said Abdel Sy Fane, Founder and CEO of OpenA2A. "The EchoLeak vulnerability demonstrated that AI agents in production face real security threats. AIM provides the security foundation that every AI agent needs—cryptographic identity, capability-based access control, and complete audit trails."
agent = secure("my-agent") — cryptographic identity, audit logging, and trust scoring with zero configurationAIM integrates with LangChain, CrewAI, AutoGen, and any MCP-compatible agent framework. The Python SDK auto-detects the framework in use and applies appropriate security controls.
As AI agents proliferate across enterprises, they create complex dependency chains with MCP servers, external APIs, and other agents. AIM addresses this supply chain risk with cryptographic attestation—every MCP server is verified before agents connect, with continuous monitoring for configuration drift. Organizations gain complete visibility into their agent-to-server dependency graph, ensuring that compromised or malicious servers cannot infiltrate their AI infrastructure. This is critical for regulated industries where third-party risk management and software supply chain security are compliance requirements.
Today, most organizations have no visibility into what MCP servers their engineers are deploying—it's shadow IT for the AI era. AIM brings order to this chaos with comprehensive MCP asset management: which MCP servers are in use, who registered them, which agents connect to them, and what capabilities each server exposes. A Postgres MCP server? AIM tracks that it has read/write database access. A filesystem MCP? AIM knows it can access local files. This visibility is essential for security teams to understand their AI attack surface and for compliance teams to audit agent capabilities.
AIM is available today under the AGPL-3.0 open-source license. Organizations can self-host for free or use AIM Cloud for managed infrastructure. Enterprise licensing will be available in 2026 for organizations requiring alternative licensing terms.
OpenA2A builds open-source security infrastructure for AI agents. Founded by cybersecurity veteran Abdel Sy Fane (17 years securing Fortune 500 companies, Executive Director of CSNP), OpenA2A brings enterprise security expertise to the AI agent ecosystem.
Media Contact: info@opena2a.org

Abdel Sy Fane
Founder & CEO
17 years cybersecurity • Fortune 500 experience • CTO of DevSecFlow • Executive Director of CSNP (12,000+ members)
High-resolution logos in PNG, SVG, and JPG formats with transparent backgrounds.
View Logos9 dashboard screenshots showing security policies, audit logs, and trust scoring.
View ScreenshotsTechnical diagrams showing AIM integration, security flow, and system architecture.
View Diagrams