Agent Gateway (Solo.io / Linux Foundation)
Open-source AI-native data plane for securing, connecting, and observing agent-to-agent (A2A) and agent-to-tool (MCP) communication. Linux Foundation project.
What it does
Open-source agent gateway created by Solo.io and donated to the Linux Foundation. Built from scratch in Rust (not retrofitted from legacy API gateways) to natively support MCP and A2A protocols. Provides drop-in security, observability, and governance for agent communication. Includes developer portal for tool discovery and monitoring. Enterprise version offers mTLS, multitenant access boundaries, context-aware model routing, and integration with Kubernetes via Ambient Mesh.
Security relevance
Provides RBAC for MCP servers, audit logging of all tool calls, agent identity via mTLS, and centralised policy enforcement for agent-to-agent and agent-to-tool traffic. Addresses MCP security concerns around unauthenticated tool access and lack of visibility. 300x better memory utilisation and 100x lower latency than alternative AI gateway implementations.
When to use it
Use when deploying multi-agent systems that communicate via MCP or A2A in production. Essential infrastructure for organisations that need centralised governance over agent connectivity across teams and environments.
OWASP coverage
Risks addressed — mapped to both OWASP Top 10 standards. 1 in LLM, 4 in Agentic.
The raw record
What Yuntona stores. Single source of truth — fork it on GitHub.
name: Agent Gateway (Solo.io / Linux Foundation) slug: agent-gateway-solo-io-linux-foundation type: Mixed category: AI Guardrails & Firewalls url: https://agentgateway.dev reviewed: 2026-04 added: 2026-04 updated: 2026-04 risks: llm: [LLM07] asi: [ASI01, ASI02, ASI04, ASI05] complexity: Plug & Play pricing: — audience: AppSec · Platform lifecycle: [deploy] tags: [A2A, Agent Security, Gateway, Linux Foundation, MCP, Observability, Open Source]