opena2a status
Display aggregated security status for the current project.
Usage
opena2a status [options]Description
Collects and displays the security posture of the current project by aggregating data from multiple sources: Shield initialization state, ConfigGuard signed file integrity, and identity registration status. Each component reports its current state (active, inactive, or not configured), policy enforcement mode, and integrity status.
Status Components
| Component | Details |
|---|---|
| Shield | Initialization state, active protections, and overall status. |
| ConfigGuard | Number of signed files, tampered files, and policy mode. |
| Identity | Local identity presence, registration status, and trust score. |
Flags
| Flag | Description |
|---|---|
--dir <path> | Target directory (default: current directory). |
--format <text|json> | Output format. |
--ci | CI mode with deterministic output. |
--verbose | Show detailed status for each component. |
Examples
opena2a statusopena2a status --format jsonopena2a status --dir ./my-agent --verboseWhat It Shows
The status command provides a single-glance overview of your project security configuration by checking three subsystems. Each subsystem reports independently, so you can quickly identify which areas are configured and which need attention.
- Shield -- Whether the security orchestration layer is initialized, what protections are active (event log, policy engine, session tracking, LLM analysis), and the overall operational mode (monitor, enforce, or disabled).
- ConfigGuard -- The number of configuration files that have been signed, whether any signed files show tampering (hash mismatch), and the current policy mode (warn or block).
- Identity -- Whether a local Ed25519 identity exists, whether it has been registered with the Trust Registry, and the current trust score if registered.
Expected Output
$ opena2a status Project Security Status ======================== Directory: /home/user/my-agent Shield: Status: Active Protections: event-log, policy, sessions, integrity Mode: enforce ConfigGuard: Signed files: 4 Tampered: 0 Policy: warn Identity: Local key: Present (Ed25519) Registered: Yes Trust score: 78/100
Tool Detection
The status command automatically detects which OpenA2A tools are installed and their versions. When run with --verbose, it lists detected tools and shows additional details for each status component, including file paths, last-modified timestamps, and configuration values. This is useful for debugging configuration issues or verifying that all tools are correctly installed in a new environment.
Error Handling
The status command always succeeds (exit code 0) even when components are not configured. Unconfigured components are reported as "Not configured" rather than causing failures. This makes it safe to use in scripts and CI pipelines as a diagnostic step. In CI mode, the JSON output includes a configured boolean for each component, which you can use with jq to gate subsequent pipeline steps.