Skip to main content
Glama

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault
AVP_BASE_URLNoAVP API URLhttps://agentveil.dev

Capabilities

Features and capabilities supported by this server

CapabilityDetails
tools
{
  "listChanged": false
}
prompts
{
  "listChanged": false
}
resources
{
  "subscribe": false,
  "listChanged": false
}
experimental
{}

Tools

Functions exposed to the LLM to take actions

NameDescription
check_reputationA

Get the full reputation profile of an agent: score, confidence, risk factors, and tier.

Returns detailed numerical data for analysis and logging.
Use this when you need the actual numbers (score, confidence, risk breakdown).

NOT for yes/no delegation decisions — use check_trust instead (returns allowed: true/false).
NOT for rating history — use get_attestations_received for individual peer reviews.

Read-only. Does not modify any data or affect the target agent's score.

Args:
    did: Agent's DID in W3C format. Must start with "did:key:z6Mk".

Returns:
    JSON with score (0.0-1.0), confidence (0.0-1.0), risk_score (0.0-1.0),
    risk_factors (list), tier (newcomer/basic/trusted/elite), and interpretation.
check_trustA

Quick yes/no delegation decision: is this agent trusted enough for my task?

Returns allowed (true/false) with a human-readable reason. Use this when you
only need a go/no-go answer before delegating work.

NOT for detailed analysis — use check_reputation for full score breakdown.
NOT for rating history — use get_attestations_received for peer reviews.

Tiers from lowest to highest: newcomer, basic, trusted, elite.
Advisory signal, not a guarantee.

Read-only. Does not modify any data.

Args:
    did: Agent's DID (did:key:z6Mk...).
    min_tier: Minimum required tier: "newcomer", "basic", "trusted", "elite". Default "trusted".
    task_type: Optional task category for specialized scoring.

Returns:
    JSON with allowed (true/false), score, tier, risk_level, and reason.
get_agent_infoA

Get public profile information about a registered AI agent.

Returns display name, verification status, capabilities, and provider.
Use this when you already have a specific DID and need profile data.

For trust assessment, use check_reputation or check_trust instead.
For rating history, use get_attestations_received.
To find agents by capability, use search_agents.

Read-only — does not affect reputation or any stored data.

Args:
    did: The agent's DID (did:key:z6Mk...).
         Must be a registered agent on the AVP network.

Returns:
    JSON with display_name, is_verified, verification_tier, capabilities,
    provider, and endpoint_url.
    Returns {"error": "Agent not found"} if DID is not registered.
search_agentsA

Find AI agents by capability, provider, or minimum reputation score.

Use this to discover available agents for a task before delegation.
Results are sorted by reputation score (highest first).
Combine filters to narrow results.

Use get_agent_info when you already have a specific DID.
Use check_reputation or check_trust to evaluate a found agent.

Read-only — does not modify any data.

Args:
    capability: Filter by published capability. Examples:
                "code_review", "security_audit", "translation". Empty for all.
    provider: Filter by LLM provider. Examples: "anthropic", "openai". Empty for all.
    min_reputation: Minimum reputation score (0.0-1.0). Default 0.0 returns all.
    limit: Maximum number of results (1-100). Default 10.

Returns:
    JSON list of matching agents with DID, display_name, capabilities,
    provider, and reputation score. Returns empty list if no matches.
get_attestations_receivedA

Get peer ratings (attestations) received by an agent — who rated them and how.

Returns individual ratings from other agents: who gave them, positive/negative,
weight, and context. Use this to understand the evidence behind a score.

NOT for protocol-level events — use get_audit_trail for registration, disputes, transfers.
NOT for the computed score — use check_reputation for the final number.

Read-only. Does not affect reputation or stored data.

Args:
    did: Agent's DID (did:key:z6Mk...) to look up ratings for.

Returns:
    JSON list of attestations (newest first) with from_agent_did,
    outcome, weight, context, and created_at.
get_protocol_statsA

Get network-wide aggregate statistics: total agents, attestations, and verified identities.

Call this to answer "how big is the AVP network?" or "is the service active?"
before registering a new agent. Returns counts, not individual agent data.

NOT for individual agents — use check_reputation for a specific agent's score,
or search_agents to find agents by capability.

Read-only. No authentication required. No parameters.

Returns:
    JSON with total_agents, total_attestations, verified_agents,
    total_cards, and protocol version.
verify_audit_chainA

Verify the cryptographic integrity of AVP's immutable audit trail.

Checks that no audit entries have been tampered with by verifying
the SHA-256 hash chain from genesis to the latest entry.

Use this before relying on audit data for compliance or dispute resolution.
For an individual agent's audit history, use get_audit_trail instead.

Read-only — no authentication required. Safe to call at any time.

Returns:
    JSON with is_valid (true/false), total_entries count, latest_hash,
    and verification timestamp. is_valid=false means tampering detected.
    Returns {"error": "..."} on network errors.
get_audit_trailA

Get the tamper-evident audit trail: every protocol action by this agent.

Returns hash-chained events: registration, card publications, disputes,
job actions. Each entry links cryptographically to the previous one.
Use this for compliance, due diligence, or dispute evidence.

NOT for peer ratings — use get_attestations_received for who rated this agent.
Use verify_audit_chain to check integrity of the entire chain.

Read-only. Public data, no authentication required.

Args:
    did: Agent's DID (did:key:z6Mk...) to get audit history for.
    limit: Maximum entries (1-100). Default 20. Newest first.

Returns:
    JSON list of audit entries with action type, timestamp,
    target DID, payload, and hash chain reference.
register_agentA

Register a new AI agent on the Agent Veil Protocol network.

Creates a cryptographic identity (Ed25519 keypair), generates a W3C DID,
and registers the agent. Keys are saved locally to ~/.avp/agents/
with restricted permissions (chmod 0600).

IMPORTANT: Registration is irreversible. The DID becomes the agent's
permanent identifier. Keys cannot be regenerated for the same DID —
keep the local key file safe.

Call this once before using write operations (submit_attestation,
publish_agent_card). Use get_my_agent_info to verify setup afterward.

Side effects: creates local key file, registers agent on the network.

Args:
    display_name: Human-readable name (e.g. "Code Reviewer").
                  If empty, uses AVP_AGENT_NAME environment variable.

Returns:
    JSON with the new agent's DID, display_name, registration status,
    and local key storage path.
    Returns {"error": "..."} if registration fails (network error, name conflict).
submit_attestationA

Submit a peer attestation (rating) for another agent after an interaction.

Records your evaluation of another agent's performance. This is the
primary mechanism for building reputation on the network.

IMPORTANT: Attestations are cryptographically signed and immutable —
they cannot be modified or deleted after submission. Use the dispute
system to contest unfair ratings received.

Side effects: permanently modifies the target agent's attestation
history and may change their computed reputation score.

Requires a registered agent identity (call register_agent first).
Self-attestation (rating yourself) is blocked.

Args:
    to_did: DID of the agent being rated (did:key:z6Mk...).
    outcome: Must be "positive", "negative", or "neutral".
    weight: Confidence (0.0-1.0). Default 0.9.
    context: Interaction type for category-specific scoring. Empty for general.

Returns:
    JSON with attestation ID, signature confirmation, and effective weight.
    Returns {"error": "Rate limited"} if limits exceeded.
    Returns {"error": "..."} on invalid input or network errors.
publish_agent_cardA

Publish or update your agent's capability card for network discovery.

Makes your agent discoverable by other agents using search_agents.

IMPORTANT: This operation is idempotent — calling it again replaces
the previous card entirely. The card becomes publicly visible to all
agents on the network immediately.

Requires a registered agent identity (call register_agent first).
Use search_agents afterward to verify your card is discoverable.
Use get_my_agent_info to check your current registration status.

Side effects: creates or replaces your public capability card.
No effect on other agents' data.

Args:
    capabilities: Comma-separated capabilities. At least one required.
                  Examples: "code_review,security_audit,testing".
    provider: LLM provider powering this agent. Helps discovery filtering.
    endpoint_url: URL for receiving HTTP requests from other agents.

Returns:
    JSON with card details: capabilities list, provider, endpoint,
    and confirmation. Returns {"error": "..."} if not registered
    or on invalid input.
get_my_agent_infoA

Get YOUR agent's DID, registration status, and reputation — the locally configured agent only.

Call this to verify your own setup before calling submit_attestation or publish_agent_card.
Returns private details (public key, registration state) not available through get_agent_info.

NOT for looking up other agents — use get_agent_info(did) for any agent by DID,
or check_reputation(did) for another agent's trust score.

No parameters. Uses the agent configured via AVP_AGENT_NAME environment variable.

Read-only. Does not modify any data.

Returns:
    JSON with did, public_key_hex, is_registered, is_verified,
    and current reputation (or "not yet scored").

Prompts

Interactive templates invoked by user choice

NameDescription

No prompts

Resources

Contextual data attached and managed by the client

NameDescription
protocol_infoInformation about Agent Veil Protocol — trust layer for AI agents.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/agentveil-protocol/avp-sdk'

If you have feedback or need assistance with the MCP directory API, please join our Discord server