com.wallet-connectors/wallet-verifier-mcp
平台与服务by talaodao
面向 AI agents 的 MCP 服务,可通过 OIDC4VP(pull)校验 EUDI/Talao wallet 数据。
什么是 com.wallet-connectors/wallet-verifier-mcp?
面向 AI agents 的 MCP 服务,可通过 OIDC4VP(pull)校验 EUDI/Talao wallet 数据。
README
🏗️ Wallet4Agent — Technical Stack Overview
For developers building trusted AI Agents able to interact with persons, companies, services, and other agents
Wallet4Agent provides the trust layer that AI Agents need to operate safely in the real world.
This document explains the technical components, standards, and identity mechanisms behind the platform.
1. 🎯 Purpose of Wallet4Agent
AI Agents increasingly take actions, access data, and collaborate.
To do this safely, they must be able to:
- 🆔 Prove who they are
- 👤 Prove who owns or controls them
- 📄 Hold verifiable credentials
- 🔐 Sign actions and data securely
- 🔗 Trust users, companies, and other agents
- 🪪 Authenticate to external systems without fragile API keys
Wallet4Agent provides AI Agents with:
- A DID-based identity
- A secure wallet for credentials
- Cloud KMS-backed signing keys
- Interoperability with OIDC4VCI, OIDC4VP, SD‑JWT, JSON-LD, OAuth2
- An MCP server interface for agents
Everything is standards‑based and interoperable.
2. 🧱 Architecture Overview
Wallet4Agent is built with three coordinated layers:
2.1 🖥️ MCP Server (Model Context Protocol)
- Single endpoint:
POST https://wallet4agent.com/mcp - Exposes all operations as tools:
- Identity creation
- Credential issuance
- Verification flows
- Signing operations
- Configuration
2.2 👛 Identity Wallet
Manages:
- The Agent’s DID & DID Document
- Stored credentials (SD‑JWT VC, VC JSON‑LD)
- Linked Verifiable Presentations
- Wallet metadata & service endpoints
2.3 🔐 Authorization & Verification Layer
Supports:
- OAuth2 access tokens
- OIDC4VCI (credential issuance)
- OIDC4VP (presentation)
- User verification flows
- Agent‑to‑Agent authentication
All complex cryptographic and identity logic stays in Wallet4Agent.
Your agent simply calls MCP tools.
3. 🆔 Identity Layer (DID & DID Documents)
Each AI Agent receives a Decentralized Identifier (DID) compliant with the W3C DID Core specification.
Wallet4Agent supports two DID methods:
3.1 🌐 did:web (DNS-based identity)
A DID anchored on a domain.
did:web:wallet4agent.com:<agent-id>
⭐ Characteristics:
- Easy to resolve using HTTPS
- DID Document lives at:
https://wallet4agent.com/did/<agent-id> - Perfect for SaaS agents
- Human-readable, infrastructure-friendly
- Works well for corporate or platform-linked AI agents
🔗 DID:web specification:
https://www.w3.org/TR/did-spec-registries/#did-method-web
3.2 ⛓️ did:cheqd (ledger-based identity)
A DID anchored on the Cheqd decentralized ledger.
did:cheqd:<network>:<identifier>
⭐ Characteristics:
- Tamper-resistant DID Document stored on-ledger
- Supports ledger-anchored keys, rotations, service endpoints
- Ideal for:
- High-assurance identity
- Regulated environments
- Trust registries
- Decentralized compliance ecosystems
🔗 DID:cheqd specification:
https://docs.cheqd.io/identity/
4. 📄 DID Documents
Regardless of DID method, the DID Document exposes:
- 🔑 Public keys
- 🔐 Authentication methods
- 📌 Service endpoints
- 🧾 Linked Verifiable Presentations
- 🧬 Key types (JWK, Ed25519, etc.)
DID Documents are automatically updated when:
- Keys rotate
- New developer or agent keys are registered
- Credentials are published as Linked VPs
- Authentication methods change
External agents and services use the DID Document to verify signatures, credentials, and linked proofs.
5. 🔗 Linked Verifiable Presentations (Linked VP)
Linked VP allows Wallet4Agent to publish verifiable credentials inside the DID Document as references.
Why this matters:
- Public credentials become discoverable
- Third parties can verify agent capabilities
- Useful for:
- Corporate mandates
- Agent capabilities
- Service trust signals
- Compliance proofs
Supported formats:
- 🟦 SD‑JWT VC
- 🟩 JWT‑VC / JWT‑VP
- 🟪 JSON‑LD VC / VP
Specification:
https://identity.foundation/linked-vp/spec/v1.0.0/
6. 🔐 Cryptography & Key Management
6.1 🗝️ Cloud KMS–backed keys (non-exportable)
Each agent has a dedicated cloud KMS key.
Used for:
- Signing Verifiable Presentations
- Proofs of key ownership in OIDC4VCI
- JWTs for OAuth2 client authentication
- Internal signature operations
Benefits:
- Private key never leaves KMS
- Agent identity is tied to a secure execution environment
- High‑assurance signatures
6.2 🔑 Developer-supplied keys
Developers may register additional public JWKs:
- For OAuth
private_key_jwt - For agent frameworks managing their own keys
- For corporate signing keys
Wallet4Agent stores the public keys; developers retain the private keys.
7. 🔑 Authentication Methods
Wallet4Agent supports three agent authentication flows:
7.1 🔹 Agent Personal Access Token (PAT)
Authorization: Bearer <agent_pat>
Simple and effective for development or local agents.
7.2 🔹 OAuth2 Client Credentials
Agent receives:
client_id= Agent DIDclient_secret
Then exchanges using:
grant_type=client_credentials
Ideal for most production requests.
7.3 🔹 OAuth2 private_key_jwt
Strongest method:
- Developer registers a public JWK
- Agent signs a JWT with its private key
- Wallet4Agent validates it using the registered public JWK
Useful for hardware-backed keys and enterprise infrastructures.
8. 🧾 Credential Issuance (OIDC4VCI)
Wallet4Agent handles complete credential issuance flows:
- Fetch issuer metadata
- Obtain OAuth tokens
- Create proof of key ownership signed by the agent's KMS key
- Request credentials
- Store as attestations
Supported formats:
- 🟦 SD‑JWT VC
- 🟩 VC JSON‑LD
Agents only call MCP tools — Wallet4Agent does all protocol-level work.
9. 🧪 Verification (OIDC4VP)
Wallet4Agent supports verification of:
- Natural persons
- Other agents
- Credential-based access
Agents can:
- Start user verification
- Poll status
- Receive verified attributes safely
- Authenticate peer agents
The agent never sees sensitive tokens; only derived, safe claims are returned.
10. 📦 Credential Storage & Retrieval
Wallet4Agent stores credentials as attestations, including:
- Format
- Issuer
- VCT/VC type
- Expiry
- Encrypted payload
- Publication status (for Linked VP)
Agents can:
- List their credentials
- Accept new ones
- Access credentials of other agents (if published)
11. 🌐 OAuth Protected Resource Metadata
Published under:
/.well-known/oauth-protected-resource/mcp
Includes:
- Supported authentication methods
- Resource identifiers
- Trusted authorization servers
Enables automatic configuration by OAuth2 clients and gateways.
12. 🛡️ Responsible AI Features
Wallet4Agent supports human-in-the-loop requirements:
{
"always_human_in_the_loop": true
}
Used for:
- High-risk operations
- Sensitive credential acceptance
- Escalation to human review
🧩 13. Summary for Developers
If you are an Agent developer, Wallet4Agent gives you:
| Feature | What you get |
|---|---|
| 🆔 Agent identity | DID + DID Document |
| 🔑 Authentication | Dev PAT, Agent PAT, OAuth2 Client Credentials, private_key_jwt |
| 🔐 Cryptographic keys | Cloud KMS signatures, non‑exportable |
| 📜 Credential issuance | Full OIDC4VCI support (SD‑JWT VC & VC JSON‑LD) |
| ✅ Credential verification | OIDC4VP with simple MCP tools and safe derived claims |
| 👤 Human interaction | QR code → wallet → verified attributes |
| 🤝 Inter‑agent trust | Ability to inspect credentials of other agents (when authorized) |
| ⚙️ Configuration | Auth mode, keys, policies all manageable via MCP |
| 🛡️ Security | KMS, OAuth2, DID rotation & key updates, role‑separated tokens |
Your AI Agent becomes a verifiable digital entity, capable of participating in decentralized and regulated digital identity ecosystems while preserving security and accountability.
Maintainer: Wallet4Agent (Web3 Digital Wallet / Talao )
For feedback or additional documentation, use the contact channels on the Wallet4Agent website.
| Standard | Purpose | Link |
|---|---|---|
| DID Core | Core DID specification | https://www.w3.org/TR/did-core/ |
| Linked Verifiable Presentations | Public VCs in DID Documents | https://identity.foundation/linked-vp/spec/v1.0.0/ |
| OIDC4VCI | Credential issuance | https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html |
| OIDC4VP | Credential presentation | https://openid.net/specs/openid-4-verifiable-presentations-1_0.html |
| W3C Verifiable Credentials | VC Data Model | https://www.w3.org/TR/vc-data-model-2.0/ |
| SD-JWT VC (IETF) | Selective disclosure credential format | https://www.ietf.org/archive/id/draft-ietf-oauth-sd-jwt-vc-12.html |
常见问题
com.wallet-connectors/wallet-verifier-mcp 是什么?
面向 AI agents 的 MCP 服务,可通过 OIDC4VP(pull)校验 EUDI/Talao wallet 数据。
相关 Skills
MCP构建
by anthropics
聚焦高质量 MCP Server 开发,覆盖协议研究、工具设计、错误处理与传输选型,适合用 FastMCP 或 MCP SDK 对接外部 API、封装服务能力。
✎ 想让 LLM 稳定调用外部 API,就用 MCP构建:从 Python 到 Node 都有成熟指引,帮你更快做出高质量 MCP 服务器。
Slack动图
by anthropics
面向Slack的动图制作Skill,内置emoji/消息GIF的尺寸、帧率和色彩约束、校验与优化流程,适合把创意或上传图片快速做成可直接发送的Slack动画。
✎ 帮你快速做出适配 Slack 的动图,内置约束规则和校验工具,少踩上传与播放坑,做表情包和演示都更省心。
邮件模板
by alirezarezvani
快速搭建生产可用的事务邮件系统:生成 React Email/MJML 模板,接入 Resend、Postmark、SendGrid 或 AWS SES,并支持本地预览、i18n、暗色模式、反垃圾优化与追踪埋点。
✎ 面向营销与服务场景,快速搭建高质量邮件模板,省去反复设计与切图成本,成熟度和社区认可都很高。
相关 MCP Server
Slack 消息
编辑精选by Anthropic
Slack 是让 AI 助手直接读写你的 Slack 频道和消息的 MCP 服务器。
✎ 这个服务器解决了团队协作中需要 AI 实时获取 Slack 信息的痛点,特别适合开发团队让 Claude 帮忙汇总频道讨论或发送通知。不过,它目前只是参考实现,文档有限,不建议在生产环境直接使用——更适合开发者学习 MCP 如何集成第三方服务。
by netdata
io.github.netdata/mcp-server 是让 AI 助手实时监控服务器指标和日志的 MCP 服务器。
✎ 这个工具解决了运维人员需要手动检查系统状态的痛点,最适合 DevOps 团队让 Claude 自动分析性能数据。不过,它依赖 NetData 的现有部署,如果你没用过这个监控平台,得先花时间配置。
by d4vinci
Scrapling MCP Server 是专为现代网页设计的智能爬虫工具,支持绕过 Cloudflare 等反爬机制。
✎ 这个工具解决了爬取动态网页和反爬网站时的头疼问题,特别适合需要批量采集电商价格或新闻数据的开发者。不过,它依赖外部浏览器引擎,资源消耗较大,不适合轻量级任务。