Oscar Six 雷达 – 具有原生 A2A(代理到代理)支持的漏洞扫描器
大家好,我是 Randy,Oscar Six Security 的创始人。我们为小型企业和管理服务提供商(MSP)开发漏洞扫描工具。
今天我想分享一件让我非常兴奋的事情:我们在 Radar 扫描器中推出了对谷歌 A2A(Agent-to-Agent)协议的原生支持。以下是这在实际操作中意味着什么:
一个 AI 代理——无论是基于谷歌 ADK、LangChain、CrewAI 还是任何兼容 A2A 的框架——现在可以:
1. 通过我们的代理卡在 /.well-known/agent.json 发现 Radar 的功能
2. 通过 Stripe SPT 或已保存的支付方式发起支付(无需人工输入信用卡)
3. 提交域名进行扫描
4. 查询结果并接收结构化的漏洞报告
整个漏洞扫描生命周期,无需人工介入。
在任何扫描运行之前,我们会处理域名验证——DNS 挑战或基于网页的备用方案——代理可以通过编程方式解决。一级预验证域名完全跳过验证。
为什么现在要构建这个?我们认为安全工具即将快速转向代理原生。如果您的安全运营中心(SOC)自动化或合规流程依赖于 AI 代理,那么必须切换到浏览器门户进行扫描的体验是一个用户体验的悬崖。我们正在消除这个悬崖。
扫描费用为 99 美元。A2A 端点今天已上线。
技术细节:JSON-RPC 2.0,代理卡在 /.well-known/agent.json,分级域名验证(预验证 / DNS 挑战 / 网页备用)。
完整技术流程的博客文章:
https://blog.oscarsixsecurityllc.com/blog/oscar-six-radar-a2a-agent-to-agent-vulnerability-scanning?utm_source=hackernews&utm_medium=social&utm_campaign=a2a_announcement
平台:
https://radar.oscarsixsecurityllc.com/?utm_source=hackernews&utm_medium=social&utm_campaign=a2a_announcement
欢迎深入讨论实施细节、A2A 规范或域名验证设计。请随时提问。
查看原文
Hey HN,<p>I'm Randy, founder of Oscar Six Security. We build vulnerability scanning tools for small businesses and MSPs.<p>Today I'm sharing something I'm genuinely excited about: we shipped native support for Google's A2A (Agent-to-Agent) protocol in our Radar scanner. Here's what that actually means in practice:<p>An AI agent — anything built on Google ADK, LangChain, CrewAI, or any A2A-compatible framework — can now:<p>1. Discover Radar's capabilities via our agent card at /.well-known/agent.json
2. Initiate payment via Stripe SPT or saved payment method (no human credit card entry)
3. Submit a domain for scanning
4. Poll for results and receive a structured vulnerability report<p>The entire vulnerability scanning lifecycle, with no human in the loop.<p>We handle domain verification before any scan runs — DNS challenge or web-based fallback — which an agent can resolve programmatically. Tier 1 pre-verified domains skip verification entirely.<p>Why build this now? We think security tooling is about to go agent-native fast. If your SOC automation or compliance pipeline runs on AI agents, having to context-switch to a browser portal to run a scan is a UX cliff. We're removing that cliff.<p>Scans are $99. The A2A endpoint is live today.<p>Technical details: JSON-RPC 2.0, agent card at /.well-known/agent.json, tiered domain verification (pre-verified / DNS challenge / web fallback).<p>Blog post with full technical walkthrough:
https://blog.oscarsixsecurityllc.com/blog/oscar-six-radar-a2a-agent-to-agent-vulnerability-scanning?utm_source=hackernews&utm_medium=social&utm_campaign=a2a_announcement<p>Platform:
https://radar.oscarsixsecurityllc.com/?utm_source=hackernews&utm_medium=social&utm_campaign=a2a_announcement<p>Happy to go deep on the implementation, the A2A spec, or the domain verification design. Ask anything.