✨ From vibe coding to vibe deployment. UBOS MCP turns ideas into infra with one message.

Learn more

A2A MCP Server

A simple MCP server that provides Claude Desktop access to A2A protocol agents.

Developer friendly more than production ready, you can hack it to adapt to your needs and expand on whatever you need. But probably not the best idea to deploy into prod as-is.

Overview

This project was created to connect Claude Desktop with A2A (Agent-to-Agent) protocol agents, particularly those built with pcingola/a2a_min and fast-agent. It was developed as a personal project to assist with agent development and for fun.

Tools

The server provides three MCP tools:

  1. a2a_server_registry - Register or remove A2A servers

    {
      "action": "add", 
      "name": "security_audit", 
      "url": "http://localhost:8000"
    }
    
  2. list_agents - List all registered agents with their capabilities

    {}
    
  3. call_agent - Send a prompt to an agent and get its response

    {
      "agent_name": "security_audit",
      "prompt": "regismesquita/DevControlMCP"
    }
    

Workflow

The typical workflow is:

  1. Register an A2A server with a2a_server_registry
  2. List available agents with list_agents
  3. Call an agent with call_agent whenever needed

Local Testing

This server has been tested locally with a security audit agent built on fast-agent and a2a_min. It successfully enables Claude Desktop to communicate with A2A agents.

Purpose

This bridge allows Claude Desktop to interact with any A2A-compatible agent, extending Claude’s capabilities through the MCP tools interface.

Screenshot

image

Featured Templates

View More
AI Assistants
Talk with Claude 3
158 1522
AI Agents
AI Video Generator
250 2006 5.0
AI Assistants
Image to text with Claude 3
151 1365
Verified Icon
AI Assistants
Speech to Text
137 1881

Start your free trial

Build your solution today. No credit card required.

Sign In

Register

Reset Password

Please enter your username or email address, you will receive a link to create a new password via email.