📦 A2a Client — A2a 命令行工具ent

v1.2.0

Discover and 发送 tasks to A2A 代理s via the A2A API Gateway. Use when: (1) finding avAIlable 代理s or LLM 提供者s, (2) delegating tasks to other 代理s,...

0· 0·0 当前·0 累计
0
安全扫描
VirusTotal
Pending
查看报告
OpenClaw
可疑
medium confidence
该技能基本符合其宣称用途(发现/向本地 A2A gateway 发送任务),但存在若干实现不一致,并假设 gateway 会自动发放 admin JWT——这一不匹配及若干 bug 值得在安装前谨慎考虑。
评估建议
Before 安装ing, consider the following: - Trust the gateway: these scripts call <gateway_url>/v0/admin/bootstrap and use the returned admin JWT to 列出 代理s and submit tasks. Only use this 技能 agAInst gateways you fully trust and which are confined to your LAN/TAIl扩展/trusted network. - 检查 a2a.conf: the scripts source a local a2a.conf or 环境 variables (RAD_GATEWAY_URL, RAD_GATEWAY_API_KEY). 验证 that file content is safe and contAIns only intended gateway 设置tings. - API key mismatch: the code accepts an ...
详细分析 ▾
用途与能力
The scripts do what the name/description advertise: they discover 代理s, 发送 tasks, and poll task 状态 via the A2A gateway. They require curl and python3 as declared. Minor mismatch: 技能.md and scripts accept an API key (RAD_GATEWAY_API_KEY / --API-key) and mention a pre-配置d API key, but the scripts never actually 发送 the API key in 请求s (they obtAIn an admin JWT instead). This is inconsistent with the documented 角色 of the API key.
指令范围
The 运行time instructions and scripts automatically call the gateway's /v0/admin/bootstrap 端点 to 提取 an admin JWT without any local 凭证; that assumes the gateway exposes an un认证d admin bootstrap 令牌. If the gateway is external or mis配置d, this could grant broad 访问. The scripts only tar获取 the gateway and local a2a.conf, and they do not read unrelated 系统 files, but the implicit assumption that bootstrap is safe is a scope risk.
安装机制
Instruction-only 技能 with bundled shell scripts; there is no external 安装/下载 step. Nothing is written to disk beyond 运行ning the provided scripts, so 安装 risk is low.
凭证需求
No required 环境 variables are declared in registry metadata (and none are mandatory), but the scripts look for RAD_GATEWAY_URL and RAD_GATEWAY_API_KEY (via a2a.conf or env). Requiring a gateway URL is proportional; expecting an API key makes sense in principle, but the scripts don't use the API key when making 请求s — they rely solely on the admin JWT. This inconsistency could indicate sloppy implementation or a misunderstanding of auth flows.
持久化与权限
The 技能 does not 请求 permanent presence (always:false), does not modify other 技能s, and does not write persistent 系统-wide 设置tings. It 运行s only when invoked by the user or the 代理 (default behavior).
安全有层次,运行前请审查代码。

运行时依赖

🖥️ OSLinux · macOS

安装命令

点击复制
官方npx clawhub@latest install a2a-client
镜像加速npx clawhub@latest install a2a-client --registry https://cn.longxiaskill.com

技能文档

A2A 命令行工具ent — 代理-to-代理 Task Routing

Discover and interact with other 代理s through the A2A API Gateway's A2A (代理-to-代理) API. 发送 tasks, 检查 结果s, and 路由 work to the right 代理.

Sidecar Principle

This 技能 is strictly an OpenClaw sidecar — it talks TO the A2A API Gateway using the gateway's existing API 格式化. The gateway's 端点s are the contract; OpenClaw is just a participant. Never assume what the other end looks like — it could be MC2, another OpenClaw, or anything else that speaks A2A. These scripts consume the gateway's API as-is.

When to Use Discover 代理s/提供者s — Before 发送ing tasks, or when the user asks about avAIlable 代理s or LLM 提供者s 发送 tasks — When delegating work to another 代理 via the gateway, or when another 代理's capabilities are better suited 检查 task 结果s — When 追踪ing a previously sent task or retrieving completed 结果s 路由 to specific 代理s — When a task should be handled by a particular A2A 代理 (use --tar获取-代理) Authentication

All scripts automatically obtAIn an admin JWT from the gateway (获取 /v0/admin/bootstrap). The API key is used for 列出ener auth but gateway API calls use the JWT. No manual auth handling needed.

工具s

All scripts live in this 技能 directory. They default to the A2A API Gateway TAIl扩展 URL and a pre-配置d API key, but accept overrides via flags.

a2a-discover.sh — 列出 代理s & 提供者s ./a2a-discover.sh [--gateway-url URL] [--API-key KEY]

列出s registered A2A 代理s and all 配置d LLM 提供者s with their 模型s. Use 提供者 slugs as --代理 values when 发送ing tasks.

Always discover before 发送ing a task to confirm the tar获取 exists and is online.

# 列出 all 代理s and 提供者s (defaults) ./a2a-discover.sh

# Override gateway URL ./a2a-discover.sh --gateway-url http://GATEWAY_LAN_IP:8090

a2a-发送-task.sh — 发送 a Task ./a2a-发送-task.sh --代理 --message "task description" \ [--模型 auto] [--tar获取-代理 ] [--会话-id ] \ [--gateway-url URL] [--API-key KEY]

Flag Required Default Description --代理 ✅ — 提供者/代理 slug (e.g., groq, ozore, mistral) --message ✅ — Task instruction/message body --模型 ❌ auto 模型 preference (e.g., groq/llama-3.3-70b-versatile) --tar获取-代理 ❌ — A2A 代理 routing hint (directs task to a specific registered 代理) --会话-id ❌ auto Custom 会话 ID (auto-生成d if omitted) --gateway-url ❌ http://GATEWAY_IP:8090 Override gateway URL --API-key ❌ pre-配置d Override API key # 发送 a task with auto 模型 selection ./a2a-发送-task.sh --代理 groq --message "Analyze the Q3 sales data"

# Specific 模型 ./a2a-发送-task.sh --代理 mistral --message "Draft a b记录 post" --模型 mistral/mistral-small-latest

# 路由 to a specific A2A 代理 ./a2a-发送-task.sh --代理 ozore --message "Refactor the auth 模块" --tar获取-代理 coder

# Custom 会话 ID ./a2a-发送-task.sh --代理 groq --message "检查 记录s" --会话-id my-会话-001

a2a-获取-task.sh — 检查 Task 状态 ./a2a-获取-task.sh --task-id [--gateway-url URL] [--API-key KEY]

Retrieves the current 状态 and any 结果s of a previously sent task. Shows task metadata, 模型 used, 令牌 usage, and the LLM 响应.

./a2a-获取-task.sh --task-id 0566802a3e6931629df5a7baaba2d797

Typical 工作流 Discover → ./a2a-discover.sh to find avAIlable 提供者s and 模型s 发送 → ./a2a-发送-task.sh --代理 --message "..." to delegate work Poll → ./a2a-获取-task.sh --task-id to 检查 进度 (tasks often complete 同步hronously) Retrieve → Same 获取-task call returns 结果s when completed Configuration Defaults 设置ting Default Gateway URL http://GATEWAY_IP:8090 (TAIl扩展) API Key Pre-配置d in scripts Auth Method Auto-obtAIned admin JWT via /v0/admin/bootstrap 模型 auto (gateway default)

LAN fallback: http://GATEWAY_LAN_IP:8090

数据来源ClawHub ↗ · 中文优化:龙虾技能库