a2a-demos
by capiscio·★ 18·Score 43
Demo agents showcasing CapiscIO Agent Guard and MCP Guard with trust badges, identity verification, and tool-level authorization.
Overview
A2A-Demos is a collection of interactive examples demonstrating CapiscIO's trust infrastructure for AI agents. The repository contains three main demos: an Enforcement Demo showing MCP server identity verification and tool-level trust enforcement, a Policy Demo demonstrating runtime policy changes, and Agent Guard Demos showing integration with LangChain, CrewAI, and LangGraph frameworks. Each demo is designed to be self-contained with clear setup instructions and interactive walkthroughs.
Try asking AI
After installing, here are 6 things you can ask your AI assistant:
When to choose this
When building secure AI agents or MCP servers that require identity verification, trust badges, and policy-based access control.
When NOT to choose this
When you don't need security features or prefer not to rely on CapiscIO's registry for trust infrastructure.
Tools this server exposes
2 tools extracted from the READMEget_priceget_price(sku: str) -> strGet product price by SKU
place_orderplace_order(sku: str, quantity: int) -> strPlace an order for a product
Note: These tools are explicitly documented in the enforcement demo section with clear names, descriptions, and signatures.
Comparable tools
Installation
Installation
Each demo has its own setup process:
- **Enforcement Demo**:
cd enforcement-demo && ./setup.sh - **Policy Demo**:
cd policy-demo && ./setup.sh - **Agent Guard Demos**:
cd multi-agent-demo && ./setup.sh
Make sure you have Python 3.11+ and a CapiscIO account with API key. For integration demos, you'll also need an OpenAI API key.
Claude Desktop Configuration
Add this to your Claude Desktop configuration:
{
"mcpServers": {
"capiscio-guard": {
"command": "python",
"args": ["path/to/a2a-demos/enforcement-demo/server/main.py"]
}
}
}FAQ
- What is CapiscIO?
- CapiscIO is a trust infrastructure for AI agents, providing cryptographic identity, trust badges, and policy enforcement for MCP servers and A2A agents.
- Do I need an LLM to run these demos?
- Only the integration demos (Agent Guard Demos) require an LLM with API key. The concept demos (Enforcement and Policy) are self-contained and don't require an LLM.
- How does trust enforcement work?
- Trust enforcement uses cryptographic identity verification (DIDs), trust badges, and configurable policies. Servers can set minimum trust levels per tool, and clients must present valid badges to access restricted functionality.
Compare a2a-demos with
Last updated · Auto-generated from public README + GitHub signals.