Important
Core Requirement: This project requires an Auth0 Account with the Auth0 for AI Agents Token Vault enabled. This is the central security mechanism for zero-secret storage and selective scope authorization.
Built for the Auth0 for AI Agents: Authorized to Act Hackathon, Guard Agent is a high-security, autonomous research and automation platform. It leverages the Auth0 for AI Agents Token Vault to bridge the gap between powerful LLM agents and secure enterprise/personal data.
Guard Agent operates on a stateful, multi-agent graph architecture that enforces human-in-the-loop consent at every sensitive step.
| Agent | Role | Responsibility |
|---|---|---|
| 1. IntentNode | Planner | Analyzes requests, researches topics (via Firecrawl), and determines tool-calling strategy. |
| 2. ContractNode | Safety Officer | Generates human-readable Action Contracts and provides granular resource selection. |
| 3. ExecutorNode | Secure Worker | Executes actions ONLY after verified consent, retrieving secrets from Auth0 Token Vault. |
sequenceDiagram
participant User as User (Browser)
participant Agent as Guard Agent (Backend)
participant Auth0 as Auth0 Token Vault
participant API as Third-Party API (Google Docs/Drive)
User->>Agent: "User Request (Research and save to Doc)"
rect rgb(30, 30, 30)
Note over Agent: IntentNode (Planning)
Agent->>Agent: Internal Research
end
rect rgb(50, 30, 30)
Note over Agent: ContractNode (Safety/Consent)
Agent->>Auth0: Fetch Resource Metadata
Auth0-->>Agent: Drive File Metadata
Agent-->>User: "Return Action Contract + File Selection UI"
end
Note over User, Agent: Execution Paused: Waiting for User Consent
User->>Agent: "Approve Contract (Files Selected: A, B)"
rect rgb(30, 50, 30)
Note over Agent: ExecutorNode (Secure Action)
Agent->>Auth0: Request Scoped Access Token
Auth0-->>Agent: OAuth Token
Agent->>API: "Execute Action (Document Created)"
API-->>Agent: Result
end
Agent-->>User: "Task Complete (Summarized output)"
The Action Contract is the cornerstone of our trust model. It is generated dynamically and includes:
- Human-Readable Intent: Clear goals (e.g., "Create a formatted Project Proposal").
- Step-by-Step Execution Plan: Detailed breakdown of actions.
- Risk Level Assessment: Categorizes actions (Low, Medium, High).
- Data Boundaries: Explicitly lists Data Used and Data NOT Used.
- Selective Resource Picker: Dynamic selection of exactly which files the agent can access.
We utilize the Auth0 Token Vault to eliminate local credential storage.
- Secret Management: Google OAuth tokens are stored exclusively in Auth0's encrypted backend vault.
- Short-Lived Access: The backend retrieves tokens only for the duration of an approved action.
SSA allows the user to grant access to exactly the resources needed for a specific task, ensuring the principle of least privilege.
- Orchestration: LangChain & LangGraph (Python).
- Inference: Groq (Llama 3 @ 70B) for ultra-low latency planning.
- Identity: Auth0 (OIDC) + Auth0 Token Vault (Secret Management).
- Frontend: Next.js (Tailwind + Framer Motion).
- Research: Firecrawl & Jina.
- Node.js: v20+
- Python: v3.11+
- Auth0 Account: With Auth0 for AI Agents enabled and a configured Token Vault.
-
Clone the repository:
git clone https://github.com/Niteesh57/GuardAgent.git cd GuardAgent -
Configure Environment Variables:
- Backend: Create
backend/.envfrombackend/.env.example. You'll needAUTH0_DOMAIN,AUTH0_MGMT_CLIENT_ID,AUTH0_MGMT_CLIENT_SECRET, andGROQ_API_KEY. - Frontend: Create
frontend/.env.localfromfrontend/.env.local.example.
- Backend: Create
-
Setup Backend (FastAPI):
cd backend python -m venv venv # Windows: .\venv\Scripts\activate # Mac/Linux: source venv/bin/activate pip install -r requirements.txt python -m uvicorn app.main:app --reload
-
Setup Frontend (Next.js):
cd ../frontend npm install npm run dev
The project is containerized using a multi-stage Dockerfile that orchestrates both the Python backend and Next.js frontend using Supervisord.
To deploy (e.g., on Railway or Render):
- Ensure all environment variables are set in your deployment dashboard.
- The
Dockerfilewill automatically build the frontend and serve both services.
This project is licensed under the MIT License.
We are delivering a comprehensive security framework for AI Agents for the Auth0 Authorized to Act Hackathon:
- Auth0 for AI Agents Token Vault Integration: Secure, off-browser secret management.
- Selective Scope Authorization (SSA): Granular, file-level consent for agent actions.
- Audit Logging: Immutable history of all agentic tasks.
- Technology Stack: FastAPI (LangGraph), Groq (Llama 3 @ 70B), and Next.js.
- 🎬 Video Demo: Watch on YouTube
- 📁 Public Repository: GitHub (Niteesh57/GuardAgent)
- 🔗 Production Link: Live Demo on Render
