Agentra LabsAgentra Labs DocsPublic Documentation

AgenticContract

MCP Resources

MCP resource endpoints for AgenticContract

AgenticContract exposes 12 resources via the MCP protocol using the acon:// URI scheme. Resources provide read-only access to contract data.

Resource List

URINameMIME TypeDescription
acon://policiesAll Policiesapplication/jsonComplete list of policies
acon://policies/globalGlobal Policiesapplication/jsonPolicies with global scope
acon://policies/sessionSession Policiesapplication/jsonSession-scoped policies
acon://risk-limitsRisk Limitsapplication/jsonAll limit definitions and values
acon://risk-limits/exceededExceeded Limitsapplication/jsonLimits currently over threshold
acon://approvalsApproval Requestsapplication/jsonAll approval requests
acon://approvals/pendingPending Approvalsapplication/jsonRequests awaiting decision
acon://obligationsObligationsapplication/jsonAll tracked obligations
acon://obligations/overdueOverdue Obligationsapplication/jsonObligations past deadline
acon://violationsViolationsapplication/jsonAll recorded violations
acon://violations/criticalCritical Violationsapplication/jsonCritical/fatal violations
acon://statsContract Statisticsapplication/jsonSummary statistics

URI Scheme

All resources use the acon:// prefix. This follows the Agentra convention where each sister has its own URI scheme (amem:// for memory, avis:// for vision, atmp:// for time, acb:// for codebase, aid:// for identity).

Concrete Resources

acon://policies

Returns all policies regardless of scope or status.

{
  "policies": [
    {
      "id": "550e8400-e29b-41d4-a716-446655440000",
      "label": "No production deploys without approval",
      "scope": "global",
      "action": "require_approval",
      "status": "active",
      "tags": ["deployment", "production"],
      "created_at": "2026-02-27T10:30:00Z"
    }
  ],
  "count": 1
}

acon://policies/global

Returns only policies with scope: global.

acon://policies/session

Returns only policies with scope: session.

acon://risk-limits

Returns all risk limits with current usage values.

{
  "limits": [
    {
      "id": "660e8400-e29b-41d4-a716-446655440001",
      "label": "API budget",
      "limit_type": "budget",
      "current_value": 42.50,
      "max_value": 100.0,
      "usage_ratio": 0.425,
      "remaining": 57.50,
      "window_secs": null
    }
  ],
  "count": 1
}

acon://risk-limits/exceeded

Returns only limits where current_value >= max_value.

acon://approvals

Returns all approval requests with their current status.

{
  "requests": [
    {
      "id": "770e8400-e29b-41d4-a716-446655440002",
      "rule_id": "880e8400-e29b-41d4-a716-446655440003",
      "action_description": "deploy to production",
      "requestor": "deploy-agent",
      "status": "pending",
      "created_at": "2026-02-27T14:00:00Z"
    }
  ],
  "count": 1
}

acon://approvals/pending

Returns only requests with status: pending.

acon://obligations

Returns all obligations with deadline and status.

{
  "obligations": [
    {
      "id": "990e8400-e29b-41d4-a716-446655440004",
      "label": "Weekly compliance report",
      "assignee": "compliance-agent",
      "deadline": "2026-03-07T17:00:00Z",
      "status": "pending"
    }
  ],
  "count": 1
}

acon://obligations/overdue

Returns only obligations where the deadline has passed and status is still pending.

acon://violations

Returns all recorded violations.

{
  "violations": [
    {
      "id": "aa0e8400-e29b-41d4-a716-446655440005",
      "description": "API budget exceeded by $12.50",
      "severity": "critical",
      "actor": "data-agent-3",
      "detected_at": "2026-02-27T15:30:00Z"
    }
  ],
  "count": 1
}

acon://violations/critical

Returns only violations with severity critical or fatal.

acon://stats

Returns summary statistics for the entire contract store.

{
  "policies": 12,
  "risk_limits": 5,
  "approval_rules": 3,
  "approval_requests": 8,
  "conditions": 4,
  "obligations": 6,
  "violations": 9,
  "total_entities": 47,
  "file_path": "$HOME/<path>",
  "file_size_bytes": 24576,
  "last_modified": "2026-02-27T14:15:00Z"
}

Cross-Sister Resources

AgenticContract resources can be referenced by other Agentra sisters:

  • AgenticIdentity: Links approval decisions to identity trust grants via aid:// resources
  • AgenticMemory: Stores contract decisions as memory nodes accessible via amem:// resources
  • AgenticTime: Contract events carry temporal metadata compatible with atmp:// resources
  • AgenticVision: Visual observations can reference contract violations via avis:// resources
  • AgenticCodebase: Code analysis can reference contract conditions via acb:// resources

Reading Resources Programmatically

MCP Client

Resources are read through the standard MCP resources/read method:

{
  "method": "resources/read",
  "params": {
    "uri": "acon://stats"
  }
}

CLI

acon stats          # Equivalent to acon://stats
acon policy list    # Equivalent to acon://policies
acon violation list # Equivalent to acon://violations