NEW: Listen to our podcast -- MCP is Dead. Long Live MCPS.Listen on Spotify

Governance is not an afterthought

EU AI Act. OWASP Agentic Top 10. NIST AI RMF. IETF Internet-Draft. Every framework demands agent identity. AgentSign was built for this.

Regulatory Mapping

How AgentSign maps to every framework

Cryptographic proof, not just dashboards. Every pipeline stage, execution, and trust score decision is signed evidence.

The EU AI Act is here. Are your agents ready?

The EU AI Act (Regulation 2024/1689) came into force in August 2024, with enforcement beginning February 2025. It is the world's first comprehensive legal framework for AI systems -- and it applies to any AI agent operating within the EU or affecting EU citizens.

What the Act Requires

Article 9 mandates risk management systems. Article 12 requires automatic logging of AI operations. Article 13 demands transparency. Article 14 requires human oversight mechanisms. Article 15 requires accuracy, robustness, and cybersecurity. High-risk AI systems face the strictest requirements -- and autonomous agents making financial, hiring, or infrastructure decisions are squarely in scope.

Traditional AI governance tools focus on model evaluation and prompt testing. They don't address the identity, provenance, and execution integrity of autonomous agents. AgentSign does.

Every pipeline stage, every execution, every trust score decision is cryptographically recorded. That's not a dashboard metric -- it's evidence.

EU AI Act

Risk Management & Logging (Art. 9, 12)

AgentSign's identity pipeline is a risk management system. Every stage transition, security scan, and approval decision is signed and immutable. The execution ledger provides the automatic logging Article 12 demands -- not just what happened, but cryptographic proof it happened.

ISO 42001

AI Management System

ISO 42001 requires documented AI lifecycle management. AgentSign's 6-stage pipeline (INTAKE through ACTIVE) maps directly to the AI lifecycle. Trust scores, execution records, and passport history provide the continuous monitoring ISO 42001 expects.

SOC 2 Type II

Security & Availability Controls

MCPS maps to 23 SOC 2 Trust Service Criteria with cryptographic evidence — agent identity (CC5-CC6), message signing (PI1), audit events (CC7), and key protection (C1). See full SOC 2 mapping below.

NIST AI RMF

AI Risk Management Framework

NIST AI 600-1 (AI RMF) calls for governance, mapping, measuring, and managing AI risk. AgentSign's trust scoring (0-100) quantifies agent risk. Pipeline stages map agent maturity. Revocation provides the "manage" control when risk exceeds tolerance.

IETF Internet-Draft

MCPS: Cryptographic Security for MCP

draft-sharif-mcps-secure-mcp defines the cryptographic security layer for the Model Context Protocol -- agent identity passports, per-message ECDSA signing, tool integrity binding, and replay protection. Standards Track. FIPS 186-5 compliant.

How AgentSign maps to regulatory requirements

Art. 9 -- Risk Management
Identity Pipeline
6-stage vetting with security gates
Art. 12 -- Automatic Logging
Execution Ledger
Hash-chained, signed, tamper-evident
Art. 13 -- Transparency
Agent Passport
Self-contained, offline-verifiable identity
Art. 14 -- Human Oversight
Trust Gate
Policy enforcement + instant revocation
Art. 15 -- Cybersecurity
HSM Signing
PKCS#11, CloudHSM, FIPS 140-2
NIST AI RMF -- Measure
Trust Scoring
Cryptographic, tamper-proof 0-100 score
Agentic Compliance

OWASP Agentic Top 10 & MCP Top 10 Alignment

OWASP published dedicated risk frameworks for agentic AI and MCP ecosystems. AgentSign addresses the critical risks head-on.

ASI03 -- Identity & Privilege Abuse

Agents inherit unscoped credentials

Agents reuse human session tokens, escalate privileges across trust boundaries, and ride on inherited admin access with no audit trail.

AgentSign: Every agent gets its own cryptographic identity. Task-scoped permissions. No inherited sessions. Full audit of every action.
ASI02 -- Tool Misuse & Exploitation

Agents call tools with destructive parameters

Agents misuse legitimate tools through ambiguous prompts or manipulated input -- calling tools with destructive parameters, chaining tools in unexpected sequences.

AgentSign: Permission-based tool access via Trust Gate. Per-tool allowlisting. ALLOW/DENY on every MCP tool call.
ASI07 -- Insecure Inter-Agent Communication

Agents exchange messages without authentication

Multi-agent systems exchange messages across MCP and A2A channels without proper authentication, encryption, or validation. Enables spoofing and replay attacks.

AgentSign: Cryptographic passports for inter-agent trust. Signed payloads. Tamper detection. Revocation kills rogue agents instantly.
ASI10 -- Rogue Agents

Compromised agents act while appearing legitimate

Misaligned agents act harmfully while appearing legitimate. May self-replicate, persist across sessions, or impersonate trusted agents.

AgentSign: Trust scoring (0-100) with continuous monitoring. Pipeline gates block untrusted agents. Instant revocation kill switch.
ASI04 -- Agentic Supply Chain

Dynamic dependencies fetched at runtime

Tools, MCP servers, and other agents are fetched dynamically at runtime. Any compromised component can alter behavior. Unlike traditional static supply chains, agentic supply chains are dynamic.

AgentSign: Agent inventory with provenance tracking. 6-stage pipeline vetting before ACTIVE. Trust Gate blocks unvetted agents from tool access.
MCP07 -- Insufficient Authentication & Authorization

No identity verification in MCP ecosystems

Weak identity verification and access control in MCP ecosystems expose critical attack paths. 41% of MCP servers have zero authentication of any kind (TapAuth scan, 518 servers).

AgentSign: THE GATE -- POST /api/mcp/verify. Every agent presents identity before accessing any MCP tool. Trust score + permission + stage checks.
MCP08 -- Lack of Audit & Telemetry

No logging of MCP server activities

Limited logging and monitoring of MCP server activities impede investigation and incident response. No record of which agent called which tool, when, or why.

AgentSign: Full audit log of every gate decision -- agent, tool, timestamp, decision, trust score. Cryptographically signed. Tamper-evident.
MCP02 -- Privilege Escalation via Scope Creep

Agent permissions expand over time

Loosely defined permissions within MCP servers expand over time, allowing agents excessive capabilities that enable unintended actions like data exfiltration.

AgentSign: Permission allowlist enforced on every call. Agents only access what they were explicitly granted. No implicit escalation.

Sources: OWASP Agentic Top 10 (Dec 2025)  |  OWASP MCP Top 10 (2025)  |  OWASP LLM Top 10 (2025)

DevSecOps SDLC

Security at every stage of the agent lifecycle

AgentSign integrates into your existing DevSecOps pipeline. Identity and trust checks are not bolted on -- they are the pipeline.

📝

INTAKE

Agent registered.
Identity created.

🔎

VETTING

Code scan.
Dependency audit.

TESTING

Behavioral tests.
Permission checks.

DEV_APPROVED

Dev review.
Trust gate pass.

🔒

PROD_APPROVED

Security sign-off.
Passport signed.

🚀

ACTIVE

Live production.
Continuous monitor.

Pre-Deployment Checks Shift Left

  • Agent identity created at registration
  • Permissions declared upfront (allowlist-only)
  • Code source and GitHub URL recorded
  • Dependency and framework audit
  • Agent name and description validation

Pipeline Gate Enforcement Zero Trust

  • Each stage requires explicit approval
  • Trust score computed from stage progression
  • Signed passport issued at each transition
  • REVOKED stage blocks all access instantly
  • Agents cannot skip pipeline stages

Runtime Protection Continuous

  • MCP Trust Gate: ALLOW/DENY on every tool call
  • Passport verification on every interaction
  • Trust score threshold enforcement
  • Full audit log of gate decisions
  • Usage metering per agent per endpoint
SOC 2 Compliance

How MCPS strengthens your SOC 2 posture

MCPS provides cryptographic controls that map directly to SOC 2 Trust Service Criteria — giving your auditor verifiable evidence, not just policies.

Cryptographic evidence for your SOC 2 audit

When a SOC 2 auditor asks "how do you verify the identity of agents accessing your system?" — the answer with MCPS is not "we check an API key". It's cryptographic proof: ECDSA P-256 passports, per-message signing with unique nonces, tool hash pinning, replay protection, and real-time revocation.

23 Criteria Mapped

MCPS controls map to 23 specific SOC 2 Trust Service Criteria across Security (CC1-CC9), Processing Integrity (PI1-PI5), Confidentiality (C1-C2), and Availability (A1-A2). Every control has corresponding cryptographic evidence.

For MCP gateway operators and enterprise platforms, integrating MCPS means your SOC 2 auditor can point to concrete cryptographic evidence for each control — mathematically verifiable proof, not just documentation.

Note: MCPS is not itself SOC 2 certified. It provides the cryptographic controls that help your platform satisfy SOC 2 requirements.

Security (CC)

Identity, Auth & Access Controls

Agent passports with ECDSA P-256 identity (CC5.1). Per-message signatures with nonce + timestamp binding (CC5.2). Trust level enforcement and origin binding (CC5.3, CC6.6). Fail-closed design — unsigned messages rejected (CC6.8).

Security (CC)

Monitoring & Incident Response

Structured audit events for SIEM integration — Splunk, Datadog, ELK (CC7.1-CC7.2). Alert priority matrix for replay attacks and signature failures (CC7.3). Passport revocation within seconds via Trust Authority (CC7.4).

Processing Integrity

Message Integrity & Accuracy

Per-message SHA-256 hash of full JSON-RPC body (PI1.1). 5-minute timestamp window prevents stale messages (PI1.2). RFC 8785 canonicalization ensures cross-platform consistency (PI1.3). Mutual authentication — server responses are also signed (PI1.5).

Confidentiality & Availability

Key Protection & Recovery

Private keys never leave the signer — HSM support via PKCS#11 (C1.1). Nonce garbage collection and passport TTL expiration (C1.2). Zero dependencies = minimal failure surface (A1.1). Key rotation enables rapid compromise recovery (A1.2).

View Full SOC 2 Mapping
Case Study

The agent identity crisis is real

We audited the MCP ecosystem and major agent platforms. The results are alarming: zero agent identity across the board.

41%
MCP servers with zero authentication
1,422
MCP tools accessible without any auth
0%
MCP servers with agent identity
100%
AgentSign coverage

"Weak identity verification and access control enforcement in MCP ecosystems expose critical attack paths across multiple agents, users, and services."

-- OWASP MCP Top 10, MCP07: Insufficient Authentication & Authorization

Agent Identity Audit: Every Major Platform Fails

Platform / Project Scale User Auth? Agent Identity? Execution Signing? Trust Verification?
MCP Official Reference Servers80K+ starsPartial
awesome-mcp-servers (200+ servers)82K+ stars59% have some
Official MCP Registry (518 scanned)518 servers59% have user auth
FastMCP23K+ starsNone by default
GitHub MCP Server27K+ starsOAuth/PAT
AutoGPT182K starsPartial
LangChain / LangGraph100K+ starsPartial
CrewAI45K+ starsPartial
Microsoft AutoGen50K+ starsPartial
OpenAI Agents SDK19K+ starsAPI key
Google ADK / Vertex AI15K+ starsIAM
AgentSignOSS

"41% of 518 MCP servers scanned have zero authentication of any kind. 1,422 MCP tools are accessible to anyone who connects -- send campaigns, abort CI/CD builds, process payments, post tweets. No identity check. No signing. No trust."

-- TapAuth MCP Security Scan, 2026

"Agents inherit user identities that are unintentionally reused, escalated, or passed across agent boundaries. SSH keys cached in agent memory. Cross-agent delegation without scoping. Confused deputy scenarios everywhere."

-- OWASP Agentic Top 10, ASI03: Identity & Privilege Abuse

Real-World MCP Security Incidents

Documented CVEs and breaches in the MCP ecosystem -- not hypotheticals:

CVE-2025-6514 (CVSS 9.6)
mcp-remote RCE, 437K downloads
CVE-2025-49596 (CVSS 9.4)
MCP Inspector unauthenticated RCE
Smithery.ai Breach
3,243 servers, API keys exposed
Asana Cross-Tenant
1,000 customers exposed 34 days

The root cause in every case: no agent identity, no message signing, no trust verification. MCP has no security layer.

AgentSign adds the missing identity layer. No valid passport = no access. Revoked = instant kill switch.

The pattern is clear

Every framework authenticates the user. None authenticate the agent. User auth answers "who is the developer?" Agent identity answers "is this agent who it claims to be?" These are fundamentally different questions.

Give Your Agents an Identity
Timeline

EU AI Act Enforcement

Key dates every enterprise running AI agents needs to know.

August 2024

AI Act enters into force

Regulation 2024/1689 becomes EU law. 24-month transition begins.

February 2025

Prohibited practices enforced

Unacceptable risk AI systems banned. Penalties up to 35M EUR or 7% global turnover.

August 2026

Full enforcement begins

High-risk AI systems must comply with Articles 9-15. Autonomous agents making financial, hiring, or infrastructure decisions are in scope. This is the deadline.

August 2027

Extended obligations

Additional requirements for AI systems integrated into regulated products.

Ready for August 2026?

Deploy AgentSign today. Be compliant before the deadline hits.

Get Started Free View on GitHub