Back to Agenda Intelligence MD
Card snapshot
agenda-intelligence-a2a.vassiliy-lakhonin.workers.dev
·
2026-05-22 11:57:41 UTC
·
671f32d3f53efa1dcca406adcad76dbc3d42d11e930e58f61d74dab8365bc73b
This is a frozen copy of the agent's agent-card.json as we observed it at the timestamp above. We capture a new snapshot every time the card's content hash changes. Useful for: forensic drift analysis, verifying downstream callers see the right version, reproducing routing decisions made historically.
{
"protocolVersion": "1.0",
"name": "Agenda Intelligence MD",
"description": "Live discovery wrapper for Agenda Intelligence MD, an evidence-discipline MCP layer for strategic-risk agents. The hosted wrapper supports A2A/JSON-RPC discovery and routing responses; full analysis, memo validation, evidence audit, and source-coverage diagnostics remain available through the installable stdio MCP package.",
"url": "https://agenda-intelligence-a2a.vassiliy-lakhonin.workers.dev",
"provider": {
"organization": "Vassiliy Lakhonin",
"url": "https://vassiliylakhonin.github.io/"
},
"version": "0.9.2",
"documentationUrl": "https://github.com/vassiliylakhonin/agenda-intelligence-md/blob/main/MCP.md",
"supportedInterfaces": [
"JSONRPC"
],
"protocolVersions": [
"1.0"
],
"capabilities": {
"streaming": false,
"pushNotifications": false,
"stateTransitionHistory": false,
"extendedAgentCard": false
},
"defaultInputModes": [
"application/json",
"text/plain",
"text/markdown"
],
"defaultOutputModes": [
"application/json",
"text/markdown"
],
"skills": [
{
"id": "agenda-analyze",
"name": "Strategic-risk memo assembly",
"description": "Routes strategic-risk questions to the relevant geography and sector modules, then points callers to the installable MCP analyze tool for full memo assembly and schema validation.",
"tags": [
"strategic-risk",
"policy-analysis",
"geopolitics",
"memo",
"mcp"
],
"examples": [
"Analyze how Red Sea shipping disruption changes risk for a Central Asia logistics corridor.",
"Prepare a structured sanctions-risk memo with uncertainties and watch-next signals."
],
"inputModes": [
"application/json",
"text/plain"
],
"outputModes": [
"application/json",
"text/markdown"
]
},
{
"id": "agenda-validate-memo",
"name": "Memo contract validation",
"description": "Describes the packaged validate_memo MCP tool, which validates Agenda memos against the agenda-memo JSON schema and returns validation errors where present.",
"tags": [
"schema-validation",
"memo-validation",
"quality-gate",
"strategic-risk"
],
"examples": [
"Validate this strategic-risk memo before it is sent to an analyst workflow."
],
"inputModes": [
"application/json"
],
"outputModes": [
"application/json"
]
},
{
"id": "agenda-audit-claims",
"name": "Claim/evidence audit",
"description": "Describes the packaged audit_claims MCP tool, which checks claim-level evidence-audit structure, support-level distribution, orphan evidence references, and listed unsupported claims.",
"tags": [
"evidence-audit",
"claim-support",
"provenance",
"quality-gate",
"strategic-risk"
],
"examples": [
"Audit whether each claim in this memo is linked to evidence ids and labelled by support level."
],
"inputModes": [
"application/json"
],
"outputModes": [
"application/json"
]
},
{
"id": "agenda-source-coverage",
"name": "Source coverage diagnostics",
"description": "Describes the packaged source_coverage MCP tool, which diagnoses whether an evidence pack covers category-specific must-check source types for sanctions, trade, regulation, energy, conflict, cyber, ESG, and technology AI.",
"tags": [
"source-planning",
"evidence-coverage",
"sanctions",
"trade",
"regulation"
],
"examples": [
"Check whether this sanctions evidence pack covers the required source categories."
],
"inputModes": [
"application/json"
],
"outputModes": [
"application/json"
]
},
{
"id": "agenda-quote-verification",
"name": "Local quote presence check",
"description": "Describes the packaged verify_quotes MCP tool, which checks whether cited quote fragments appear in caller-supplied source text. It does not discover sources or verify factual truth.",
"tags": [
"quote-checking",
"evidence-discipline",
"local-verification",
"provenance"
],
"examples": [
"Confirm that each quoted excerpt appears in the provided source text."
],
"inputModes": [
"application/json",
"text/plain"
],
"outputModes": [
"application/json"
]
},
{
"id": "agenda-signals",
"name": "Signal archive lookup",
"description": "Describes the packaged list_signals and get_signal MCP tools, which expose strategic-risk signal archive entries vendored from the Global Think Tank Analyst method snapshot.",
"tags": [
"signals",
"strategic-intelligence",
"archive",
"watch-next",
"policy-analysis"
],
"examples": [
"List available signal records relevant to a regional-risk workflow."
],
"inputModes": [
"application/json",
"text/plain"
],
"outputModes": [
"application/json",
"text/markdown"
]
}
],
"x_agenda_intelligence": {
"hosted_wrapper": true,
"wrapper_scope": "A2A/JSON-RPC discovery and routing response only",
"jsonrpc_endpoint": "https://agenda-intelligence-a2a.vassiliy-lakhonin.workers.dev/message/send",
"repository": "https://github.com/vassiliylakhonin/agenda-intelligence-md",
"package": "https://pypi.org/project/agenda-intelligence-md/",
"mcp": {
"transport": "stdio",
"server_command": "agenda-intelligence-mcp",
"install": "pip install agenda-intelligence-md"
},
"boundaries": [
"No payments or wallet rails.",
"No autonomous live source retrieval.",
"No factual-truth verification.",
"No legal, financial, compliance, investment, or trading advice."
]
}
}