About This Project¶
🎯 Mission¶
Teach comprehensive security through hands-on adversarial demonstrations.
This project provides a progressive learning path from vulnerable to production-ready security implementations, using real working code that students can attack, break, and learn from.
🌟 What Makes This Different¶
Learn by Breaking Things¶
Unlike traditional security education that shows you what TO do, this project teaches through intentionally vulnerable code that you actively exploit:
- Stage 1: Attack a completely vulnerable system (5 successful attacks)
- Stage 2: Bypass partial security controls (4 sophisticated attacks succeed)
- Stage 3: Face production-grade defense (all attacks blocked)
Progressive Understanding¶
Stage 1 → Why security matters (100% attack success)
Stage 2 → Why "better" ≠ "secure" (45% attack success)
Stage 3 → How comprehensive succeeds (0% attack success)
Each stage builds on the previous, showing why each security layer is essential.
Production-Quality Code¶
This isn't toy code. Every module: - ✅ Uses industry-standard libraries (PyJWT, bcrypt, cryptography) - ✅ Includes comprehensive docstrings and type hints - ✅ Follows security best practices (in later stages) - ✅ Maps to real-world CWE/CVSS standards - ✅ References actual security incidents
⚠️ CRITICAL DISCLAIMER¶
This entire project is for educational and training purposes only.
Nothing in this repository should be considered production-ready or production-quality.
All code examples are deliberately simplified to illustrate concepts and security concerns.
📚 What's Included¶
🔴 Complete Learning Modules¶
1. Adversarial Agents - Stage 1 - Completely vulnerable multi-agent system - 5 working attack demonstrations - ~1,800 lines of code + documentation - CWE/CVSS mappings for all vulnerabilities - Status: ✅ 100% Complete
2. Adversarial Agents - Stage 2 - Partial security (JWT, RBAC, validation) - 4 bypass attack demonstrations - ~3,500 lines of code + documentation - Shows why partial security fails - Status: ✅ 100% Complete
3. Adversarial Agents - Stage 3 - Production-grade comprehensive security - Zero-trust architecture - Behavioral analysis and automated response - ~4,500 lines planned - Status: 🚧 In Development (Feb 2026)
4. Input Validation Mastery - 8-layer validation framework - Security checklist - Presentation materials - Status: ✅ 100% Complete
5. A2A Protocol Fundamentals - Agent-to-Agent communication basics - Working examples - Progressive learning path - Status: ✅ 85% Complete
6. MCP Integration Basics - Model Context Protocol examples - Tool integration patterns - Status: ✅ 80% Complete
🎓 Who This Is For¶
Security Educators¶
Perfect for: - University security courses - Corporate security training - Bootcamps and workshops - Self-paced learning programs
Provides: - Ready-to-use course materials - Attack demonstrations students can run - Progressive difficulty levels - Real-world context
Developers¶
Learning: - Multi-agent system security - Progressive security implementation - Attack/defense techniques - Production security patterns
Gaining: - Hands-on experience with attacks - Understanding of why security matters - Production-ready code patterns - Practical security skills
Security Professionals¶
Exploring: - Multi-agent security challenges - Behavioral analysis implementation - Zero-trust architecture patterns - Automated threat response
Expanding: - Teaching capabilities - Security demonstration library - Attack pattern catalog - Defense strategy toolkit
Students¶
Building: - Security fundamentals - Practical attack skills - Defense implementation - Professional portfolio
Achieving: - Real exploit experience - Industry-standard knowledge - Production code samples - Career readiness
🏗️ Project Philosophy¶
Education Over Perfection¶
We prioritize: - 📖 Clarity over complexity - 🎯 Understanding over coverage - 💡 Learning over feature-completeness - 🔍 Depth over breadth
Intentional Vulnerabilities¶
Stage 1 & 2 contain REAL vulnerabilities by design.
This is educational code that: - ⚠️ Should NEVER be used in production - ✅ Should be attacked and exploited - ✅ Teaches through failure - ✅ Shows consequences clearly
Progressive Disclosure¶
Each stage reveals more: - Stage 1: Why security is necessary - Stage 2: Why partial security is dangerous - Stage 3: How comprehensive security works
Students build intuition through experience, not memorization.
Open Source, Open Learning¶
Everything is free and open: - 📖 All documentation public - 💻 All code on GitHub - 🎥 Video walkthroughs (coming) - 🤝 Community contributions welcome
🛠️ Technology Stack¶
Languages & Frameworks¶
- Python 3.10+ - Primary implementation language
- SQLite - Task queue storage
- Redis - Session/nonce storage (Stage 3)
Security Libraries¶
- PyJWT - JWT token generation/verification
- bcrypt - Password hashing
- cryptography - RSA and AES encryption (Stage 3)
Documentation¶
- MkDocs - Documentation site generator
- Material for MkDocs - Modern theme
- GitHub Pages - Free hosting
Development Tools¶
- Git - Version control
- GitHub - Repository hosting
- Python venv - Virtual environments
📊 Project Statistics¶
Code¶
- Total Lines: ~9,000+ (across all modules)
- Python Files: 50+
- Example Systems: 6 complete implementations
- Attack Demonstrations: 14 working exploits
Documentation¶
- Documentation Files: 30+
- Total Doc Lines: ~15,000+
- CWE Mappings: 15+ unique vulnerabilities
- CVSS Scores: Comprehensive ratings
Learning Materials¶
- Security Analyses: 3 comprehensive documents
- Presentation Decks: 2 complete
- Video Scripts: In development
- Checklists: 3 security checklists
🎯 Learning Outcomes¶
After completing this project, students will be able to:
Technical Skills¶
- ✅ Implement JWT authentication correctly
- ✅ Design RBAC authorization systems
- ✅ Build comprehensive input validation
- ✅ Apply cryptographic controls properly
- ✅ Implement behavioral analysis
- ✅ Design zero-trust architectures
Security Concepts¶
- ✅ Understand defense in depth
- ✅ Recognize common vulnerability patterns
- ✅ Apply the principle of least privilege
- ✅ Design fail-secure systems
- ✅ Implement comprehensive audit trails
Attack Techniques¶
- ✅ Execute data exfiltration attacks
- ✅ Perform privilege escalation
- ✅ Exploit injection vulnerabilities
- ✅ Bypass partial security controls
- ✅ Understand attacker methodology
Professional Practice¶
- ✅ Map vulnerabilities to CWE/CVSS
- ✅ Conduct security analyses
- ✅ Document security decisions
- ✅ Design secure multi-agent systems
- ✅ Communicate security trade-offs
🚀 Project Timeline¶
Completed ✅¶
November 2025: - Stage 1 (Adversarial Agents) complete - Input Validation module complete - Initial documentation structure
December 2025: - Stage 2 (Adversarial Agents) complete - Security analysis documentation - A2A protocol fundamentals - MkDocs site structure
January 2026: - Complete documentation overhaul - All three stage docs created - Launch preparation - Community outreach planning
In Progress 🚧¶
January 2026: - Stage 3 implementation beginning - Video content creation - Community building - Public launch (January 30)
Planned 📋¶
February 2026: - Stage 3 implementation complete - Additional MCP examples - More presentation materials - Conference submissions
March 2026+: - Advanced topics modules - Additional example systems - Community contributions - Continuous improvement
🤝 Contributing¶
This project welcomes contributions! See contributing.md for details.
We Need Help With¶
Content Creation: - Additional attack scenarios - More example systems - Use case documentation - Video walkthroughs
Code Development: - Stage 3 implementation - Test coverage - Performance optimization - Additional language implementations
Documentation: - Tutorial improvements - Translation to other languages - Accessibility enhancements - Diagram creation
Community: - Teaching this material - Sharing feedback - Bug reports - Feature suggestions
How to Contribute¶
- Star the repository ⭐
- Fork and experiment 🔧
- Submit pull requests 📝
- Share feedback 💬
- Spread the word 📢
👥 Team¶
Project Creator & Lead¶
Robert Fischer
📧 robert@fischer3.net
🔗 LinkedIn
🐙 GitHub
Background: - Security researcher and educator - Multi-agent systems specialist - Open-source advocate
Contributors¶
This project is currently solo-maintained but actively seeking: - Co-maintainers for Stage 3 - Security reviewers - Technical writers - Community managers
Want to join? See CONTRIBUTORS_WANTED.md
🏆 Recognition & Usage¶
Used By¶
This project is being adopted by: - 🎓 University security courses - 💼 Corporate training programs - 👨💻 Individual developers - 🏢 Security teams
Cited In¶
(Building citation list - if you use this project, let us know!)
Conference Presentations¶
- Planned submissions for 2026 security conferences
- Community meetup presentations
- Webinar series (planned)
📜 License & Legal¶
License¶
MIT License - See LICENSE
Educational Use Disclaimer¶
⚠️ IMPORTANT: This project contains intentionally vulnerable code for educational purposes.
Stage 1 and Stage 2 code should NEVER be used in production.
By using this project, you acknowledge: - This is educational material - Vulnerabilities are intentional - Code requires security review for production use - No warranty is provided - You assume all risk
Responsible Disclosure¶
If you discover unintentional security issues: 1. Do NOT exploit in real systems 2. Email robert@fischer3.net privately 3. Allow reasonable time for fix 4. Coordinated disclosure encouraged
🌐 Resources¶
Official Links¶
- 🏠 Website: learn-a2a-security.fischer3.net
- 🐙 GitHub: robertfischer3/fischer3_a2a_introduction
- 💬 Discussions: GitHub Discussions
- 🐛 Issues: GitHub Issues
External Resources¶
Community¶
- 🗣️ Discussions Forum
- 📧 Mailing List (planned)
- 💬 Discord Server (planned)
- 🐦 Twitter Updates (planned)
💡 Philosophy¶
Why This Matters¶
Multi-agent AI systems are the future: - Personal AI assistants - Collaborative robots - Distributed autonomous systems - Agent-based marketplaces
Security can't be an afterthought in these systems.
Our Approach¶
Learning Through Failure:
"The best way to learn why security matters is to successfully exploit a vulnerable system, then fail to exploit a secure one."
Progressive Complexity:
"Start simple, add layers, understand each step. Don't jump to comprehensive security without understanding why each piece matters."
Production Context:
"Toy examples teach toy lessons. Production-quality code teaches production-quality security."
📞 Contact¶
General Inquiries¶
📧 Email: robert@fischer3.net
💬 GitHub Discussions: Ask a question
For Educators¶
Interested in using this in your course? - 📧 Email for course materials - 💬 Join educator discussions - 🤝 Share your syllabus integration
For Contributors¶
Ready to contribute? - 🐙 Fork the repository - 💬 Join discussions - 📝 Review CONTRIBUTING.md - 🤝 Introduce yourself
For Organizations¶
Want to sponsor development or create custom modules? - 📧 Email for partnership inquiries - 💼 Corporate training customization available - 🏢 On-site workshops can be arranged
🙏 Acknowledgments¶
Inspiration¶
This project builds upon the work of: - The security education community - OWASP contributors - Academic researchers - Open-source security tools
Special Thanks¶
- Early testers and reviewers
- The Anthropic team (Model Context Protocol)
- Security educators providing feedback
- Open-source community
Tools & Technologies¶
Built with and inspired by: - Python community - MkDocs and Material theme - GitHub and GitHub Pages - Security research community
🎯 Next Steps¶
For Learners¶
- Start with Stage 1: Adversarial Agents - Vulnerable
- Run the attacks: Clone and execute
- Understand the code: Read and experiment
- Progress to Stage 2: See partial security
- Master Stage 3: Learn production patterns
For Educators¶
- Review the materials: Explore all modules
- Try the demos: Run attack demonstrations
- Contact us: Discuss course integration
- Contribute: Share your syllabus ideas
- Spread the word: Tell other educators
For Contributors¶
- Star the repo: Show your support ⭐
- Read CONTRIBUTING.md: Understand the process
- Pick an issue: Find something to work on
- Submit a PR: Make your contribution
- Join the community: Help others learn
📊 Project Metrics¶
Repository Stats: - ⭐ Stars: Growing - 👀 Watchers: Active community - 🔱 Forks: Multiple contributors - 📝 Issues: Responsive maintenance
Usage Stats: - 🎓 Educational institutions: Building - 👨💻 Individual learners: Growing - 🏢 Corporate adoption: Beginning - 🌍 Global reach: Expanding
Development Activity: - 📅 Last Updated: January 2026 - 🚀 Active Development: Yes - 🔄 Release Frequency: Monthly - 📈 Contribution Activity: Growing
❓ Frequently Asked Questions¶
Is this really free?¶
Yes! MIT license means: - ✅ Free to use - ✅ Free to modify - ✅ Free to distribute - ✅ Free for commercial use (with attribution)
Can I use this in production?¶
⚠️ Stage 1 & 2: NO! Intentionally vulnerable
✅ Stage 3: Yes, with proper security review
How long does it take to complete?¶
- Stage 1: 2-3 hours
- Stage 2: 4-6 hours
- Stage 3: 8-12 hours
- Complete journey: 15-22 hours
Do I need security experience?¶
No! Designed for: - ✅ Complete beginners - ✅ Intermediate developers - ✅ Security professionals - ✅ Educators
What if I get stuck?¶
- 💬 Ask in GitHub Discussions
- 📧 Email the maintainer
- 🐛 Check existing issues
- 📖 Review documentation
Can I translate this?¶
Yes! Contributions welcome: - 🇪🇸 Spanish - 🇫🇷 French - 🇩🇪 German - 🇯🇵 Japanese - And more!
Thank you for your interest in this project!
Together, we can make security education accessible, practical, and effective. 🚀🔐
Last Updated: January 2026
Version: 2.0
Status: Active Development
License: MIT