Version: 2026.1.0 Stack: Google ADK (Python), UCP, AP2, Kagent (Kubernetes), Gemini 2.5 Flash Status: Hackathon Prototype (Google AI Agent Labs Oslo 2026 — Team 6)
Aura is a multi-agent, cloud-agnostic procurement system designed to automate the B2B commerce lifecycle. Unlike traditional "shopping bots," Aura integrates Real-time Compliance (KYC/AML) and Verifiable Intent to allow agents to discover, negotiate, and settle transactions autonomously on behalf of an enterprise. It bridges the gap between modern AI agents and rigid Core Banking Systems (BMS).
Aura operates as a MAS (Multi-Agent System) using the Google ADK orchestration layer. Each agent is an independent entity that can be deployed as a Kubernetes Agent resource.
| Agent | Responsibility | Key Protocol/Tool |
|---|---|---|
| Architect | Root LlmAgent; parses user intent; manages sub-agent state. |
adk.LlmAgent |
| Scout | Discovers vendors via Universal Commerce Protocol (UCP). | ucp_tools.discover_vendors |
| Sentinel | Executes KYC/AML checks against core banking (BMS) logic. | compliance_tools.verify_vendor_compliance |
| Closer | Handles secure payment via Agent Payments Protocol (AP2). | ap2_tools.generate_intent_mandate + settle_cart_mandate |
- Action: The Scout agent must query
/.well-known/ucpendpoints of potential vendors. - Validation: It must parse the
dev.ucp.shoppingcapability manifest to find product pricing and availability. - Output: Return a structured list of
VendorEndpointobjects to the Architect.
- Action: Before a cart is finalised, the Sentinel must cross-reference the
VendorIDagainst the internal BMS (Core Banking) compliance database. - Requirement: Return a "Compliance Hash" for valid vendors; immediately block and flag vendors like "ShadowHardware" (mocked blacklist).
- Action: The Closer agent must generate an Intent Mandate (W3C Verifiable Credential).
- Execution: Simulate a secure checkout using a
Cart Mandatesigned via the AP2 protocol, ensuring the payment is routed through a compliant banking gateway.
- Platform: Deploy via Kagent (Cloud Native Agentic AI framework).
- Resiliency: Agents must be defined as
AgentCustom Resources (CRDs) to allow for cross-cloud portability (GCP/AWS/On-prem).
{
"type": "IntentMandate",
"id": "<uuid>",
"issued_at": 1741694400,
"vendor": {
"id": "v-001",
"name": "TechCorp Nordic"
},
"constraints": {
"max_amount": 5000.00,
"amount": 3897.00,
"currency": "USD",
"compliance_required": true,
"compliance_hash": "<64-char-hex>"
},
"proof": {
"type": "ecdsa-p256-signature",
"value": "MOCK_SIGNATURE_HASH",
"created": 1741694400
}
}- Runtime: Python 3.12 (FastAPI for A2A comms, port 8080)
- Orchestration:
google-adkwithSequentialAgentfor the main flow - Model: Vertex AI Gemini 2.5 Flash (
gemini-2.5-flash) - GCP Project:
ai-agent-labs-oslo-26-team-6 - Region:
us-central1 - Deployment:
kagentYAML withModelConfigtargeting Vertex AI
- Project Init: Scaffold with
agent-starter-pack,requirements.txt,.env,agents/andtools/folders. - The Sentinel Logic: Implement
verify_vendor_compliance(vendor_name)— reject "ShadowHardware", return 64-charComplianceHashfor others. - The Orchestrator: Chain Scout → Sentinel → Closer via
SequentialAgent. Flow proceeds to Closer only if Sentinel passes. - K8s Containerisation: Multi-stage
Dockerfile+kagent.yamlfollowingkagent.dev/v1alpha2spec.