Skip to main content

Forge Verify tools and callbacks for Google ADK — verify every agent action before execution

Project description

google-adk-forge

PyPI version License: MIT Python 3.10+

Forge tools and callbacks for Google ADK -- verify every agent action before execution.


Why Forge?

When AI agents act autonomously, you need a way to enforce rules that the agents themselves cannot override. Forge sits between your agents and their actions -- every sensitive operation is verified against your policies in real time, with a cryptographic proof trail. No more hoping the system prompt holds; Forge gives you external, tamper-proof verification that works even when agents delegate to other agents.


Install

pip install google-adk-forge

This installs forge_google_adk and its dependencies (veritera SDK and google-adk).


Prerequisites: Create a Policy

Before using Forge with Google ADK, create a policy that defines what your agents are allowed to do. You only need to do this once:

from veritera import Forge

forge = Forge(api_key="vt_live_...")  # Get your key at forge.veritera.ai

# Create a policy from code
forge.create_policy_sync(
    name="finance-controls",
    description="Controls for multi-agent financial operations",
    rules=[
        {"type": "action_whitelist", "params": {"allowed": ["trade.execute", "refund.process", "report.generate"]}},
        {"type": "amount_limit", "params": {"max": 10000, "currency": "USD"}},
    ],
)

# Or generate one from plain English
forge.generate_policy_sync(
    "Allow trades under $10,000, refund processing, and report generation. Block all account deletions and unauthorized data exports.",
    save=True,
)

A default policy is created automatically when you sign up -- it blocks dangerous actions like database drops and admin overrides. You can use it immediately with policy="default".

Tip: pip install veritera to get the policy management SDK. See the full policy docs.


Quick Start

import os
from google.adk import Agent
from forge_google_adk import ForgeVerifyTool, forge_before_tool_callback

os.environ["VERITERA_API_KEY"] = "vt_live_..."

# 1. Create a Forge verification tool
forge = ForgeVerifyTool(policy="finance-controls")  # create this policy first (see above) -- or use "default"

# 2. Give it to your agent as an explicit tool
agent = Agent(
    name="finance-bot",
    tools=[forge.as_tool()],
)

# Or use a callback to verify ALL tool calls automatically
agent = Agent(
    name="finance-bot",
    tools=[send_payment, check_balance],
    before_tool_callback=forge_before_tool_callback(policy="finance-controls"),
)

Every tool call is verified against your Forge policy. If an action is denied, the agent receives a denial message and adjusts its plan. The tool never executes.


Tutorial: Building a Verified Multi-Agent Workflow

This walkthrough builds a Google ADK agent where tools are protected by Forge -- with automatic verification catching unauthorized operations.

The Problem with Autonomous Agents

Google ADK agents make autonomous tool calls. But when agents act on their own:

  • System prompts drift -- the LLM may ignore or reinterpret safety instructions over long conversations.
  • Inline rules are invisible -- sub-agents and delegated tasks lose the original guardrails.
  • Chained actions compound risk -- a data lookup (harmless) feeds an analysis (maybe harmless) that triggers a payment (definitely not harmless).

Forge solves this by moving verification outside the agents. Every action hits the same external policy engine. No matter how the agent reasons, Forge catches violations.

Step 1 -- Set Up Your Environment

import os
from google.adk import Agent
from forge_google_adk import (
    ForgeVerifyTool,
    forge_before_tool_callback,
    forge_wrap_tool,
)

os.environ["VERITERA_API_KEY"] = "vt_live_..."
os.environ["GOOGLE_API_KEY"] = "..."

Step 2 -- Define Tools with Forge Verification

# Option A: Wrap individual tools with the decorator
@forge_wrap_tool(policy="finance-controls")
def send_payment(amount: float, recipient: str) -> str:
    """Send a payment to a recipient."""
    return f"Sent ${amount} to {recipient}"

@forge_wrap_tool(policy="finance-controls")
def delete_records(table: str, condition: str) -> str:
    """Delete records from a database table."""
    return f"Deleted records from {table} where {condition}"

def check_balance(account_id: str) -> str:
    """Check account balance (read-only, no verification needed)."""
    return f"Account {account_id}: $12,340.00"

Step 3 -- Build the Agent

agent = Agent(
    name="finance-bot",
    model="gemini-2.0-flash",
    tools=[send_payment, delete_records, check_balance],
)

Step 4 -- Run It

# Approved scenario
response = agent.run("Send $500 to vendor@acme.com")
# Forge APPROVED: send_payment -> executes normally

# Denied scenario
response = agent.run("Delete all records from the customers table")
# Forge DENIED: delete_records -> returns denial message, tool never executes

What Happens at Runtime

  1. Agent decides to call a tool (e.g., send_payment).
  2. Forge intercepts -- the wrapper sends a verification request to the Forge API.
  3. Policy evaluates -- Forge checks the action and parameters against your defined policies.
  4. Result returned -- APPROVED (tool executes) or DENIED (tool blocked, agent gets denial message).
  5. Audit trail -- every verification produces a proof_id linking to a permanent record.

Three Integration Points

1. ForgeVerifyTool -- Explicit Verification Tool

Give agents a tool they can call to check whether an action is allowed.

from forge_google_adk import ForgeVerifyTool
from google.adk import Agent

forge = ForgeVerifyTool(
    policy="finance-controls",
    agent_id="finance-bot",
    fail_closed=True,
)

agent = Agent(
    name="finance-bot",
    tools=[forge.as_tool()],
)

The agent calls forge_verify(action="payment.create", params='{"amount": 500}') and receives:

  • APPROVED: Allowed | proof_id: fp_abc123 | latency: 42ms -- proceed with the action.
  • DENIED: Amount exceeds $200 limit | proof_id: fp_def456 | Do NOT proceed with this action. -- the agent adjusts its plan.

2. forge_before_tool_callback -- Automatic Pre-Tool Verification

Intercepts every tool call automatically. No changes to your tools required.

from forge_google_adk import forge_before_tool_callback
from google.adk import Agent

agent = Agent(
    name="finance-bot",
    tools=[send_payment, check_balance, delete_records],
    before_tool_callback=forge_before_tool_callback(
        policy="finance-controls",
        agent_id="finance-bot",
        skip_actions=["check_balance"],  # read-only, no verification needed
        on_blocked=lambda action, reason: print(f"BLOCKED: {action} -- {reason}"),
    ),
)

When to use: Most cases. You want a security layer that works regardless of what the LLM decides to do.

3. forge_wrap_tool -- Decorator for Individual Tools

Wraps specific tool functions with verification. Only the wrapped tools are verified.

from forge_google_adk import forge_wrap_tool

@forge_wrap_tool(policy="finance-controls")
def send_payment(amount: float, recipient: str) -> str:
    """Send a payment to a recipient."""
    return process_payment(amount, recipient)

@forge_wrap_tool(policy="finance-controls")
def delete_records(table: str, condition: str) -> str:
    """Delete records from a database table."""
    return delete_from_table(table, condition)

When to use: When you want per-tool control, or when some tools need different policies than others.


Configuration Reference

Parameter Type Default Description
api_key str VERITERA_API_KEY env var Your Forge API key. Starts with vt_live_ (production) or vt_test_ (sandbox).
base_url str https://veritera.ai Forge API endpoint. Override for self-hosted deployments.
agent_id str "google-adk-agent" Identifier for this agent in Forge audit logs and dashboards.
policy str None Policy name to evaluate actions against. When None, the default policy for your API key is used.
fail_closed bool True When True, actions are denied if the Forge API is unreachable. When False, actions are allowed through on API failure.
timeout float 10.0 HTTP request timeout in seconds for the Forge API call.
skip_actions list[str] [] Tool names that bypass verification entirely. Use for read-only or low-risk tools.
on_verified Callable None Callback function (action: str, result) -> None called when an action is approved.
on_blocked Callable None Callback function (action: str, reason: str) -> None called when an action is denied.

How It Works

User message
    |
    v
Google ADK Agent decides to call a tool
    |
    v
Forge verification layer (callback / wrapper / explicit tool)
    |
    +---> Is tool in skip_actions?
    |         YES --> Execute tool normally
    |         NO  --> Call Forge /v1/verify
    |                     |
    |                     +---> APPROVED
    |                     |         --> Execute tool normally
    |                     |         --> Call on_verified callback
    |                     |
    |                     +---> DENIED
    |                     |         --> Return denial message
    |                     |         --> Call on_blocked callback
    |                     |         --> Tool NEVER executes
    |                     |
    |                     +---> API ERROR
    |                               --> fail_closed=True?  --> Deny
    |                               --> fail_closed=False? --> Execute tool
    v
Agent receives tool result (or denial message)
    |
    v
Agent responds to user

Each verification call sends the following to Forge:

  • action -- the tool name (e.g., "send_payment")
  • agent_id -- which agent is making the call
  • params -- the tool arguments as a dictionary
  • policy -- which policy to evaluate against

Forge evaluates the action and returns a verdict with a proof_id for audit trail purposes.


Error Handling

Forge API Unreachable

Controlled by fail_closed:

# fail_closed=True (default) -- deny the action when Forge is unreachable
forge = ForgeVerifyTool(policy="controls", fail_closed=True)

# fail_closed=False -- allow the action through when Forge is unreachable
forge = ForgeVerifyTool(policy="controls", fail_closed=False)

Invalid Parameters

If the agent passes malformed JSON as params, the tool wraps it safely:

# Agent calls: forge_verify(action="test", params="not valid json")
# Tool parses it as: {"raw": "not valid json"} and proceeds with verification

Logging

All verification decisions are logged via Python's logging module under the forge_google_adk logger:

import logging
logging.getLogger("forge_google_adk").setLevel(logging.DEBUG)

Log output:

DEBUG:forge_google_adk:Forge APPROVED: send_payment (proof=fp_abc123)
WARNING:forge_google_adk:Forge DENIED: delete_records -- Destructive operations blocked
ERROR:forge_google_adk:Forge verify error for send_email: Connection timed out

Environment Variables

Variable Required Description
VERITERA_API_KEY Yes (unless passed directly) Your Forge API key. Get one at veritera.ai/dashboard.
GOOGLE_API_KEY For Gemini models Required if using Gemini models via Google ADK.

You can also pass the API key directly to avoid environment variables:

forge = ForgeVerifyTool(api_key="vt_live_...", policy="my-policy")

Other Forge Integrations

Forge works across the major agent frameworks. Use the same policies and audit trail regardless of which framework you choose.

Framework Package Install
Google ADK google-adk-forge pip install google-adk-forge
OpenAI Agents SDK openai-forge pip install openai-forge
LangGraph langchain-forge pip install langchain-forge
CrewAI crewai-forge pip install crewai-forge
LlamaIndex llamaindex-forge pip install llamaindex-forge
Python SDK veritera pip install veritera

Resources


License

MIT -- Forge by Veritera AI

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

google_adk_forge-0.1.1.tar.gz (15.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

google_adk_forge-0.1.1-py3-none-any.whl (12.4 kB view details)

Uploaded Python 3

File details

Details for the file google_adk_forge-0.1.1.tar.gz.

File metadata

  • Download URL: google_adk_forge-0.1.1.tar.gz
  • Upload date:
  • Size: 15.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.1

File hashes

Hashes for google_adk_forge-0.1.1.tar.gz
Algorithm Hash digest
SHA256 f4a27b3aff0922ca6fbd90663e364046ae5ec1b1b9d99bfb6b0db4225ffc851e
MD5 93aeae6ba4e13626128c044a08746c3d
BLAKE2b-256 8087e299abc45e26b88cf4287811993d927f17d614334d4a1d1e29b6054cf8e0

See more details on using hashes here.

File details

Details for the file google_adk_forge-0.1.1-py3-none-any.whl.

File metadata

File hashes

Hashes for google_adk_forge-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 b8cc211168dc978814e5263e477f9f225263de020f6a9814a2b2a1b3d74601a1
MD5 d18d2fa25c70b3d6ca8ea661cb58a973
BLAKE2b-256 ac0387ad617da66c2c9f37992e7e1f23aeea528c566ca22b0b7bcd6aaec2e8b9

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page