Nine open-source tools. One security lifecycle. Pick the stage you're in.
Identify risk across your AI agent surface
Protect credentials, access, and runtime behavior
Verify trust, benchmark compliance, train teams
Sets up identity, scans for credentials, detects scope drift, and gives you a trust score.
$ npx opena2a-cli init147 security checks, adversarial payloads, OASB compliance benchmark, and auto-fix.
$ npx hackmyagent secureUnderstand how tools fit together, then try the CLI on any project in 30 seconds.
Read the architectureEach tool works standalone or through the OpenA2A CLI unified interface.
Unified entry point that orchestrates all security tools through adapter commands
$ npx opena2a-cli init147 security checks, 55 adversarial payloads, auto-fix with rollback, OASB compliance
$ npx hackmyagent secureKeeps credentials out of AI context windows across Claude Code, Cursor, Copilot, and more
$ npx secretless-ai initCryptographic identity, capability policies, trust scoring, and audit logging for AI agents
$ docker compose up222 standardized attack scenarios across 8 vulnerability categories with compliance scoring
$ npx opena2a-cli benchmarkRuntime process, network, and filesystem monitoring with protocol-aware AI endpoint detection
$ npx opena2a-cli runtime startChrome extension that detects, monitors, and controls AI agents operating in your browser
$ Install from Chrome Web StoreDeliberately vulnerable AI agent platform with 10 agents, 18 CTF challenges, and 3 protocol types
$ docker pull opena2a/dvaaTrust verification CLI for AI packages. Queries the OpenA2A Registry for security scans, dependency risk, and known advisories.
$ npx ai-trust check <package>Map your threat model to the right tools. Every row is covered by at least two tools.
| Threat | CLI | HMA | Secretless | AIM | OASB | ARP | ai-trust | Guard | DVAA |
|---|---|---|---|---|---|---|---|---|---|
| Hardcoded credentials | — | ✓ | ✓ | — | ✓ | — | — | — | — |
| Prompt injection | — | ✓ | — | — | ✓ | — | — | — | ✓ |
| MCP config tampering | ✓ | ✓ | — | — | — | ✓ | ✓ | — | — |
| Scope drift | ✓ | — | ✓ | — | — | — | — | — | — |
| Unauthorized agent access | — | — | — | ✓ | — | ✓ | — | ✓ | — |
| Supply chain risk | ✓ | — | — | — | ✓ | — | ✓ | — | — |
| Data exfiltration | — | — | ✓ | — | ✓ | ✓ | — | — | — |
| Privilege escalation | — | ✓ | — | ✓ | ✓ | — | — | — | — |
All tools work standalone. The CLI orchestrates them together.
npx opena2a-cli