Inspiration
MCP workflows move every task through four key steps — user → AI Agent → MCP server → tool. But there’s no unified layer to verify identity and permissions at each hop. A stolen token, cloned agent, rogue server, or silently updated tool can still execute tasks unchecked. Since tools and servers are constantly evolving, we need a centralized security layer that validates all identities on every request—and blocks the task if even one identity isn’t trusted.
What it does
AgenticTrust Identity Security Layer
- Authenticates the user, AI Agent, MCP server, and exact tool version on every call
- Authorizes the action based on simple policies (e.g., “sell max 50 shares”)
- Audits the full path—so teams always know who did what and when
- If any check fails, the task is blocked and a clear error message is returned
How we built it
- Identity Registry – a signed list of trusted users, agents, servers, and tool hashes
- Gateway – a lightweight proxy; every MCP call passes through for identity and policy checks (~80 ms overhead)
- Audit Ledger – an append-only log that captures user → agent → server → tool for every request
Demo highlights
We built a mock Robinhood MCP server exposing the following tools:
get_stock_price(), buy_stock(), sell_stock()
User asks the AI Agent for TSLA’s stock price
- Gateway verifies the
get_stock_pricetool → price (\$349) returned
- Gateway verifies the
User tells the agent to sell 50 TSLA shares
- Gateway validates all identities → request approved and logged
We silently modify the
sell_stocktool’s code to simulate a rogue update- Gateway detects tool hash mismatch → request blocked with “ACCESS DENIED”
Outcome: Normal actions pass. Silent code changes are blocked in real time—with virtually no user delay.
Challenges
- MCP is still evolving—thinking about tool identity as a dynamic security concern was not obvious at first
- Designing a clean demo to showcase layered identity checks
- Creating a realistic example that feels familiar and impactful
Accomplishments
- Live demo successfully blocks a silent tool update
- One-line error messages simplify debugging
- End-to-end working prototype built in under 8 hours
What we learned
- Securing MCP requires checking identity at every hop—user, agent, server, and tool
- A centralized registry is safer and simpler than leaving identity checks to each agent or MCP server
- Developers value security tools that are transparent, fast, and easy to debug
What’s next
- OpenID Connect for Agents (OIDC-A): signed ID cards for AI Agents with model metadata and attestation
- Granular task scopes: set precise limits (e.g., “sell ≤ 50 shares once”), enforced per request
- Agent-to-agent delegation: verify identity and permission during cross-agent task handoffs
- Registry sharing: allow trusted lists to be shared across companies so agents can collaborate safely
Built With
- next.js
- python
Log in or sign up for Devpost to join the conversation.