Identity, permissions, and audit infrastructure for AI agents.
MCP-native drop-in middleware. The auth layer for the agent economy.
The MCP ecosystem has 97 million monthly SDK downloads and 15,983 public servers. We scanned all of them. 88% need authentication. 8.5% actually have it. The spec punts on authorization and says "left to the transport layer."
Meanwhile, agents are spawning subagents, subagents are calling tools, tools are touching databases and sending emails and deploying code — with no identity boundary between them. When something breaks, the audit log says "Claude did it."
- Identity — every agent gets a universal ID with a cryptographic token
- Permissions — deny-first rules with wildcards, schedules, rate limits, data-level scoping, approval gates
- Delegation — spawn child agents that can only narrow, never expand, parent scope
- Audit — tamper-evident hash-chained log of every tool call, including the full delegation chain
- Scanner — open-source grader for any MCP server, run
npx agentsid-scan <server>to see its grade
- agentsid — FastAPI server, SDKs (TypeScript, Python, Ruby, Java), CLI, dashboard, docs
- agentsid-scanner — open-source MCP security scanner, confidence-weighted grades, only A/100 in the registry
- agentsid-proxy — secrets-vault proxy execution for MCP tool calls
- shell-guard — MCP server for safe shell access; every command validated against per-agent rules
- pydantic-ai-toolguard — deny-first tool authorization for pydantic-ai agents
- permission-spec — the AgentsID Permission Specification v1.0, RFC-style
We publish deep original research on agent security. All free, all citable.
- The State of MCP Server Security 2026 — 15,983 servers scanned, classified, and graded
- Weaponized by Design — Toxic Flow taxonomy for MCP attacks
- The Multi-Agent Auth Gap — 4 structural gaps across 5 frameworks with live CVE evidence
- Invisible Ink — Unicode smuggling, GPT-5.4 follows invisible instructions 100% of the time
- MCP Injection Taxonomy — classification framework for MCP attacks
Read at agentsid.dev/research.
# Secure any MCP server in 3 lines
npm install @agentsid/sdkimport { withAgentsID } from "@agentsid/sdk";
const server = withAgentsID(mcpServer, { apiKey: process.env.AGENTSID_PROJECT_KEY });Full docs at agentsid.dev/docs.
- Reddit — r/AgentsID
- X — @agentsid
- Support — support@agentsid.dev
Building the permission, identity, and audit standards for the agent economy.