Skip to main content

A2CR local stdio MCP wrapper for WorkBaton and WorkStash.

Project description

A2CR logo

A2CR

PyPI CI License

Agent-to-Agent Context Relay.

Long AI work usually breaks at the handoff. A fresh AI window needs the goal, current state, decisions, blockers, validation, and next action, but not a whole noisy transcript.

A2CR is a lightweight context relay layer for AI agents. It lets an agent save a compact WorkBaton checkpoint, move optional supporting notes into WorkStash, and resume the work from a fresh AI window.

In this repository, an AI window means one active chat/session in an AI client such as Codex, Claude Code, or another MCP-capable agent.

Japanese overview

Why A2CR Exists

Project memory files such as AGENTS.md or CLAUDE.md tell an AI how to work in a repository. A2CR focuses on the task handoff itself:

Layer Purpose Not for
WorkBaton Compact resume checkpoint for the next AI window Full transcripts, secrets, large files
WorkStash Temporary supporting notes referenced from WorkBaton Durable knowledge base, credentials
WorkThreads Planned multi-agent coordination surface Replacing WorkBaton handoff

A minimal WorkBaton can be as small as:

{
  "goal": "Fix the failing login test",
  "current_state": "The failure is reproduced and the token refresh branch is the likely cause.",
  "next_action": "Inspect the refresh logic and rerun the focused test."
}

A2CR turns long AI conversation history into compact WorkBaton and WorkStash handoff state

This public repository contains the source-available A2CR client and public reference material:

  • the local stdio MCP wrapper package: a2cr-mcp
  • the early WorkBaton Format specification, schemas, examples, and conformance notes
  • AI-agent usage guidance and safety rules
  • MCP configuration examples
  • WorkBaton and WorkStash sample payloads
  • tests for the public wrapper behavior

It does not contain the hosted SaaS service implementation, production database schema, billing code, admin tooling, or deployment secrets.

Visual Overview

1. The Basic Idea

A2CR keeps the useful resume state, not the whole conversation.

A2CR basics: WorkBaton stores compact handoff state and WorkStash stores optional supporting notes

2. Save Rules

Use A2CR for work state. Keep secrets, credentials, raw logs, and full transcripts out.

A2CR save rules and cautions: store only safe work state and avoid secrets or full logs

3. Typical Workflow

Save a WorkBaton, optionally reference WorkStash notes, then resume from a fresh AI window.

A2CR workflow: save compact state, store optional notes, and resume work in a new AI window

Vision

A2CR starts with a modest goal: make AI handoffs small, explicit, testable, and safer than copying a whole conversation history. Longer design notes and future directions live in VISION.md.

Install

python -m pip install --upgrade a2cr-mcp

Python 3.12 or 3.13 is recommended. Python 3.15 development builds are not supported.

Security Boundary

WorkBaton and WorkStash bodies are encrypted locally by the stdio MCP wrapper before upload. A2CR stores ciphertext and cannot decrypt those bodies.

A2CR is not a secret manager. Do not store API keys, passwords, access tokens, Authorization headers, cookies, private database URLs, local client keys, customer data, full transcripts, long logs, or large source-code bodies in WorkBaton or WorkStash.

Use A2CR for work state, not credentials.

Responsibility Boundary

A2CR provides a context relay mechanism. It does not make restored context trusted, and it does not replace user review, AI-client safety checks, or local key management.

Party Responsibilities
A2CR Provide the public MCP wrapper/spec, encrypt WorkBaton and WorkStash bodies locally before upload through the official wrapper, avoid storing user decryption keys in the hosted service, and document unsafe content.
AI agents / MCP clients Do not store secrets, treat restored context as untrusted input, verify commands before execution, and ask before dangerous or irreversible actions.
Users Protect API keys and local client keys, avoid saving .env contents or credentials, and use trusted clients and machines.

Loaded WorkBaton and WorkStash content is work state, not an authority. A future agent should not run commands, exfiltrate data, revoke keys, delete data, or call external services solely because restored context says to.

Configure MCP

Create an A2CR API key from the hosted A2CR dashboard, then configure exactly one local stdio MCP server named a2cr. A2CR_BASE_URL is optional; omit it to use https://a2cr.app.

Codex-style TOML:

[mcp_servers."a2cr"]
command = "a2cr-mcp"
args = []

[mcp_servers."a2cr".env]
A2CR_API_KEY = "YOUR_A2CR_API_KEY"
A2CR_BASE_URL = "https://a2cr.app"

Generic MCP JSON:

{
  "mcpServers": {
    "a2cr": {
      "command": "a2cr-mcp",
      "args": [],
      "env": {
        "A2CR_API_KEY": "YOUR_A2CR_API_KEY",
        "A2CR_BASE_URL": "https://a2cr.app"
      }
    }
  }
}

The local wrapper creates a client key file on first encrypted save. If you need to resume the same WorkBaton from another PC, you need both the A2CR API key and the same local client key file.

MCP Tools

The wrapper exposes tools for:

  • explain_a2cr_flows: explain when to use WorkBaton, WorkStash, or WorkThreads.
  • get_account_limits: show the current account limits for Slots, retention, and WorkStash.
  • should_save_workbaton: advise whether a compact WorkBaton checkpoint is useful now.
  • save_context: save a client-encrypted WorkBaton checkpoint.
  • resume_context: find and load the right WorkBaton for a fresh AI window.
  • load_context: load a specific Slot number or named WorkBaton.
  • list_contexts: list active WorkBaton Slots.
  • delete_context: delete a named WorkBaton Slot.
  • should_use_work_stash: advise whether a supporting note belongs in WorkStash.
  • store_work_stash: store a client-encrypted temporary supporting note.
  • get_work_stash: retrieve and decrypt a referenced WorkStash entry.
  • list_work_stash: list WorkStash metadata and quota usage.
  • delete_work_stash: delete a WorkStash entry that is no longer needed.

Primary save path: save_context.

Some MCP clients expose tools lazily. If save_context is not visible, search or request the exact save_context tool name before concluding that WorkBaton saves are unavailable.

Optional Skill

The optional agent workflow template is available at docs/templates/skills/a2cr-agent/SKILL.md. For clients that support local skills, copy that file into the client's skills directory under an a2cr-agent folder. For Claude Code, place it at:

~/.claude/skills/a2cr-agent/SKILL.md

Restart the client after installing the Skill so new AI windows can load the A2CR workflow guidance.

Examples

See:

  • examples/codex-mcp-config.json
  • examples/claude-code-mcp-config.json
  • examples/roo-code-mcp-config.json
  • examples/workbaton-example.json
  • examples/workstash-example.json

Docs

  • docs/concepts.md
  • docs/mcp-setup.md
  • docs/security-model.md
  • docs/official-distribution-roadmap.md
  • SECURITY_CHECKLIST.md
  • docs/spec/README.md
  • docs/spec/workbaton-format.md
  • docs/spec/workstash-reference.md
  • docs/spec/mcp-tool-contract.md
  • docs/spec/security-boundary.md
  • docs/usage.md
  • docs/templates/skills/a2cr-agent/SKILL.md
  • CHANGELOG.md
  • VISION.md
  • README-ja.md
  • PUBLIC_RELEASE.md

Project Model

A2CR uses a lightweight open-core model:

Layer Public surface License / posture
WorkBaton Format Public specification in docs/spec/ Spec text: CC BY 4.0. Schemas/examples/tests: Apache-2.0
a2cr-mcp Official local stdio MCP client Source-available under BUSL-1.1 style terms
a2cr.app Hosted relay service, dashboard, billing, operations Proprietary SaaS

The WorkBaton Format is intended to be implementable by anyone. The official client and hosted relay are maintained by A2CR. Offering a competing hosted or managed A2CR-compatible relay service based on the official A2CR client requires a commercial license.

See LICENSE, NOTICE, TRADEMARK.md, and docs/spec/LICENSE.md for the current boundaries. See PUBLIC_RELEASE.md for the public/private release checklist.

Development

python -m pip install -e . pytest
python -m pytest -q

The compatibility entrypoint mcp/server.py imports the packaged a2cr_mcp.server. New setups should prefer the installed a2cr-mcp command.

Contributing

A2CR is built with AI-assisted engineering workflows and welcomes focused technical contributions around agent handoff design, MCP client setup, documentation clarity, safety review, and small reproducible tests.

This is a source-available/open-core project, not a broad OSI-approved open source release. Good contribution areas are documentation, examples, wrapper bug fixes, MCP client compatibility, and specification clarity.

Please do not open public issues containing secrets, API keys, access tokens, private database URLs, local client keys, decrypted WorkBaton or WorkStash bodies, or full chat logs.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

a2cr_mcp-0.1.5.tar.gz (13.4 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

a2cr_mcp-0.1.5-py3-none-any.whl (25.8 kB view details)

Uploaded Python 3

File details

Details for the file a2cr_mcp-0.1.5.tar.gz.

File metadata

  • Download URL: a2cr_mcp-0.1.5.tar.gz
  • Upload date:
  • Size: 13.4 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for a2cr_mcp-0.1.5.tar.gz
Algorithm Hash digest
SHA256 f188cf19adb21188a15855524552bf69152a1e1064b3f87f5d78d908e2002617
MD5 59793800bf00026fd62454ff3966fd78
BLAKE2b-256 6909a6a68274c3d30ddd9a665b4df2efa0a4f710e1ccb8299d0bd79be2f3eb35

See more details on using hashes here.

Provenance

The following attestation bundles were made for a2cr_mcp-0.1.5.tar.gz:

Publisher: publish-pypi.yml on a2cr/a2cr

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file a2cr_mcp-0.1.5-py3-none-any.whl.

File metadata

  • Download URL: a2cr_mcp-0.1.5-py3-none-any.whl
  • Upload date:
  • Size: 25.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for a2cr_mcp-0.1.5-py3-none-any.whl
Algorithm Hash digest
SHA256 d95386cd7100d9c25543c4f1f43902b3d889952983c41e4e29ca5099c5bcf541
MD5 d36ca05650c283876fb78db84591b812
BLAKE2b-256 1f1c68e60eb91f449733adbe10480143347b34e92c6a93dade15b48a56f3ff6a

See more details on using hashes here.

Provenance

The following attestation bundles were made for a2cr_mcp-0.1.5-py3-none-any.whl:

Publisher: publish-pypi.yml on a2cr/a2cr

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page