a2a-samples/samples/python at main · a2aproject/a2a-samples

Sample Code

This code is used to demonstrate A2A capabilities as the spec progresses.

Samples are divided into 3 sub directories:

  • Common

  • Agents
    Sample agents written in multiple frameworks that perform example tasks with tools. These all use the common A2AServer.

  • Hosts
    Host applications that use the A2AClient. Includes a CLI which shows simple task completion with a single agent, a mesop web application that can speak to multiple agents, and an orchestrator agent that delegates tasks to one of multiple remote A2A agents.

Prerequisites

  • Python 3.13 or higher
  • UV

Running the Samples

Run one (or more) agent A2A server and one of the host applications.

The following example will run the langgraph agent with the python CLI host:

  1. Navigate to the agent directory:
    cd samples/python/agents/langgraph
  2. Run an agent:
  3. In another terminal, navigate to the CLI directory:
    cd samples/python/hosts/cli
  4. Run the example client

NOTE: This is sample code and not production-quality libraries.

Disclaimer

Important: The sample code provided is for demonstration purposes and illustrates the mechanics of the Agent-to-Agent (A2A) protocol. When building production applications, it is critical to treat any agent operating outside of your direct control as a potentially untrusted entity.

All data received from an external agent—including but not limited to its AgentCard, messages, artifacts, and task statuses—should be handled as untrusted input. For example, a malicious agent could provide an AgentCard containing crafted data in its fields (e.g., description, name, skills.description). If this data is used without sanitization to construct prompts for a Large Language Model (LLM), it could expose your application to prompt injection attacks. Failure to properly validate and sanitize this data before use can introduce security vulnerabilities into your application.

Developers are responsible for implementing appropriate security measures, such as input validation and secure handling of credentials to protect their systems and users.