fischer³ Agentic AI Security Education¶
Practical, hands-on education for building secure AI agent systems
Welcome to¶

AI agents are no longer a concept on the horizon — they are here, and they are talking to each other. The Agent-to-Agent (A2A) protocol, the Model Context Protocol (MCP), and the systems that tie them together represent a new frontier in software architecture. With that frontier comes a new set of security challenges that most existing resources barely touch.
This project exists because the security of agentic AI systems deserves the same rigorous, hands-on treatment we give to application security — but almost nobody is teaching it that way yet. You won't find a glossy overview and a "good luck" here. Instead, you'll find deliberately vulnerable code, real threat models, progressive security implementations, and the explanations that connect all the dots. Whether you're a developer building your first agent, a security professional evaluating an AI system, or an architect designing something that needs to work at production scale, this material was built with you in mind.
The core philosophy is simple: you learn security best by seeing what happens when it's missing. Every example in this project starts from an insecure baseline and evolves through increasingly robust implementations. By the time you reach the production-ready stages, you won't just know what to do — you'll understand why each control exists and what breaks without it.
What This Project Covers¶
-
A2A Protocol Security
The Agent-to-Agent protocol is the backbone of multi-agent communication. This project provides deep dives into A2A fundamentals, agent identity and discovery, authentication mechanisms, threat modeling, and a full eight-layer validation framework.
-
Model Context Protocol (MCP)
MCP is how agents connect to the tools and resources they need. Learn how the protocol works, how to build servers and clients, and how to think about security at the agent-tool boundary.
-
Integration & Architecture
A2A and MCP don't exist in isolation. Learn how these protocols work together, what architectural patterns emerge in real multi-agent systems, and where the security boundaries live.
-
Security Frameworks & Training
Professional presentation materials built around the eight-layer validation framework and a comprehensive three-stage security analysis. Designed for security reviews, team training, and executive briefings.
Where to Begin¶
The right starting point depends on your background and what you're trying to accomplish.
New to Agentic AI?¶
Start here if you're unfamiliar with how AI agents communicate and collaborate, or if you want a grounded understanding before diving into security specifics.
- A2A Overview — What agent-to-agent communication is and why it matters
- Core Concepts — The building blocks of A2A systems
- MCP Summary — How agents connect to tools
- Integration Summary — How A2A and MCP fit together
Estimated time: 2–3 hours
A Developer Ready to Build¶
You understand the basics and want to build agents that are secure from the start. This path gets you to production-ready patterns efficiently.
- A2A Overview — Quick orientation
- Security Best Practices — The controls that matter most
- Message Validation Patterns — Eight-layer defense in depth
- MCP Fundamentals — Protocol mechanics for tool integration
- Hands-On Examples — See it all in working code
Estimated time: 4–6 hours
A Security Professional Evaluating Agentic Systems¶
You need to understand the threat landscape, identify weaknesses, and know what good looks like. This path is built around exactly that workflow.
- Threat Model — What attacks actually look like against agent systems
- Authentication Tags — How cryptographic verification works in A2A
- Code Walkthrough — Vulnerable vs. secure, side by side
- Session State Security — A frequently overlooked attack surface
- Security Checklist — 200+ item audit tool
Estimated time: 6–8 hours
Not a Technical Professional¶
You don't write code, but you need to understand what's at stake when organizations deploy AI agents — and how to ask the right questions.
- AI Collaboration Fundamentals — No code required
- Security for Non-Technical Audiences — Risk in plain language
- Agent Security Article — The executive summary and business case sections
Estimated time: 2 hours
Hands-On Examples¶
Each example follows the same pattern: start with an intentionally vulnerable implementation, then progressively harden it stage by stage. By comparing stages, you see exactly what each security control buys you — and what happens without it.
-
Cryptocurrency Price Agent
A multi-agent system for querying crypto prices. Stage 1 has no security. Stage 2 adds a registry and basic authentication. Stage 3 reaches production-ready security. Clean and focused — great for learning the fundamentals.
-
Credit Report Agent
An agent that handles sensitive file-based data. Demonstrates file handling vulnerabilities, input validation, and secure data processing. Includes an AI integration stage that introduces prompt injection as an attack vector.
-
Task Collaboration System
A multi-agent task management system with 25+ documented vulnerabilities in Stage 1. Covers session management, distributed systems with Redis, and web framework integration with Flask and JWT. The most comprehensive single example in the project.
-
:material-robot-attack:{ .lg .middle } Adversarial Agent
An agent specifically designed to attack other agents. Stage 1 shows five attack types that succeed. Stage 2 adds partial defenses. Stage 3 implements automated threat detection and quarantine. Essential reading for anyone thinking about adversarial scenarios.
MCP Examples¶
-
MCP Client with SQLite
A complete MCP client and server example using a SQLite database for contact management. Uses the Gemini API and demonstrates the full MCP connection lifecycle in a practical context.
-
Your First MCP Server
A step-by-step tutorial for building your first MCP server. Includes a simple weather tool, a test client, and no API key required for initial testing. The best place to start if you're new to MCP.
The Eight-Layer Security Framework¶
A recurring theme throughout this project is defense in depth — the idea that no single security control is sufficient on its own. The eight-layer framework provides a structured way to think about this:
| Layer | Control | What It Prevents |
|---|---|---|
| 1 | Transport Security (TLS 1.3) | Eavesdropping and interception |
| 2 | Authentication | Impersonation and identity fraud |
| 3 | Session Management | Hijacking and state manipulation |
| 4 | Authorization (RBAC) | Unauthorized access to operations |
| 5 | Message Integrity (HMAC) | Tampering with messages in transit |
| 6 | Replay Protection | Reuse of captured messages |
| 7 | Rate Limiting | Brute-force and volume attacks |
| 8 | Input Validation | Injection, malformed payloads, and boundary violations |
The presentation materials provide extensive training content around this framework, including a 200+ item security checklist, slide decks for team training and executive briefings, and a detailed article walking through all eight layers with real-world examples.
Key Concepts at a Glance¶
Agent Card — A standardized identity declaration. Every agent in an A2A system publishes one, advertising its capabilities, supported protocols, and authentication requirements. Learn more in Agent Cards.
Agent Registry — A discovery service where agents register themselves and other agents look them up by capability. Central to how multi-agent systems find and coordinate with each other. Learn more in Registry Patterns.
MCP Server — A process that exposes tools and resources to AI agents via the Model Context Protocol. Think of it as a secure adapter between an agent and an external system. Learn more in MCP Fundamentals.
Session State Security — Managing the lifecycle and integrity of agent-to-agent sessions. This is one of the most overlooked attack surfaces in agentic systems, and one of the most thoroughly covered topics in this project. Learn more in Session State Security.
🤝 Contributing¶
Contributions are welcome and encouraged.
- Found a bug? Open an issue on GitHub
- Want to contribute content? Submit a pull request
- Have questions? Start a discussion
- Found a security issue? Report responsibly to robert@fischer3.org
Ways to help: improve documentation clarity, add new examples, report security findings, translate to other languages, or share your own implementations.
📝 License¶
This project is released under the MIT License.
📬 Contact¶
Project Maintainer: Robert Fischer
Email: robert@fischer3.org
Last Updated: January 2026
Version: 3.0
Status: Active Development