loading…
Search for a command to run...
loading…
A security proxy and active firewall for the Model Context Protocol that protects host systems from malicious intent, prompt injection, and data exfiltration. I
A security proxy and active firewall for the Model Context Protocol that protects host systems from malicious intent, prompt injection, and data exfiltration. It acts as an interception layer between AI agents and tools, providing real-time verification and multi-layered defense mechanisms.
MCP (Model Context Protocol) lets AI agents interact with tools that can read files, execute commands, and access external systems. McpVanguard sits between the agent and the MCP server, inspecting traffic in real time and enforcing security policy before sensitive calls reach the underlying tool.
McpVanguard is designed to work in both:
Transparent integration. Existing MCP servers do not need to be rewritten.
The current release candidate is 2.0.0-rc1.
This release packages a major security and platform expansion around McpVanguard's gateway role:
/mcp support and stricter session handlinginitialize and tools/listserver_id traceabilitySee CHANGELOG.md for the full release summary and history.
Tests PyPI version License: MIT Python 3.11+
Part of the Provnai Open Research Initiative - Building the Immune System for AI.
pip install mcp-vanguard
Local stdio wrap:
vanguard start --server "npx @modelcontextprotocol/server-filesystem ."
Cloud security gateway:
export VANGUARD_API_KEY="your-secret-key"
vanguard sse --server "npx @modelcontextprotocol/server-filesystem ."
See the deployment docs for operational details and the changelog for the exact verified scope.
Bootstrap a local workspace:
# 1. Initialize safe zones and .env template
vanguard init
# 2. (Optional) Protect Claude Desktop server entries
vanguard configure-claude
# 3. Launch the local security dashboard
vanguard ui --port 4040
# 4. Run compliance/readiness checks
vanguard audit-compliance
Every tool call is inspected before it reaches the upstream MCP server.
| Layer | Purpose | Notes |
|---|---|---|
| L1 - Rules | Deterministic blocking using jail boundaries and signatures | Fast path |
| L2 - Semantic | Optional intent scoring | Async |
| L3 - Behavioral | Session and sequence-aware anomaly checks | Stateful |
┌─────────────────────────────────────────────────┐
AI Agent │ McpVanguard Proxy │
(Claude, GPT) │ │
│ │ ┌───────────────────────────────────────────┐ │
│ JSON-RPC │ │ L1 — Rules Engine │ │
│──────────────▶│ │ 50+ YAML signatures (path, cmd, net...) │ │
│ (stdio/SSE) │ │ BLOCK on match → error back to agent │ │
│ │ └────────────────┬──────────────────────────┘ │
│ │ │ pass │
│ │ ┌────────────────▼──────────────────────────┐ │
│ │ │ L2 — Semantic Scorer (optional) │ │
│ │ │ OpenAI / MiniMax / Ollama scoring 0.0→1.0│ │
│ │ │ Async — never blocks the proxy loop │ │
│ │ └────────────────┬──────────────────────────┘ │
│ │ │ pass │
│ │ ┌────────────────▼──────────────────────────┐ │
│ │ │ L3 — Behavioral Analysis (optional) │ │
│ │ │ Sliding window: scraping, enumeration │ │
│ │ │ In-memory or Redis (multi-instance) │ │
│ │ └────────────────┬──────────────────────────┘ │
│ │ │ │
│◀── BLOCK ─────│───────────────────┤ (any layer) │
│ (JSON-RPC │ │ ALLOW │
│ error) │ ▼ │
│ │ MCP Server Process │
│ │ (filesystem, shell, APIs...) │
└──────────────▶│──────────────────┬──────────────────────────────┘
│ │
│◀─────────────── response ────────┘
│
│ (on BLOCK)
└──────────────▶ VEX API ──▶ CHORA Gate ──▶ Bitcoin Anchor
(async, fire-and-forget audit receipt)
If a request is blocked, the agent gets a standard JSON-RPC error response and the underlying server never sees the call.
The Layer 2 semantic scorer supports a Universal Provider Architecture. Set the corresponding API keys to activate a backend — the first available key wins:
| Backend | Env Vars | Notes |
|---|---|---|
| Universal Custom | VANGUARD_SEMANTIC_CUSTOM_KEY, etc. |
Fast inference (Groq, DeepSeek). |
| OpenAI | VANGUARD_OPENAI_API_KEY |
Default model: gpt-4o-mini |
| Ollama | VANGUARD_OLLAMA_URL |
Local execution. No API key required |
read_file("~/.ssh/id_rsa") at Layer 1 (Rules Engine).[BLOCKED] event.VANGUARD_MODE=audit.[SHADOW-BLOCK].vanguard configure-claude.McpVanguard is local-first, but it also supports stronger hosted gateway controls.
VANGUARD_API_KEYThe current release candidate includes:
This should be described as server integrity, baseline verification, and trust verification, not as a full SBOM platform.
The current repository verification baseline is:
308 passedCoverage includes:
2.0.0-rc1 release scope: complete and verified| Phase | Goal | Status |
|---|---|---|
| Phase 1-8 | Foundation & Hardening | [DONE] |
| Phase 19-21 | Directory Submission & MCPB | [DONE] |
McpVanguard focuses on local processing. See our Privacy Policy for details on zero-telemetry and data handling.
MIT License - see LICENSE.
Built by the Provnai Open Research Initiative.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"mcpvanguard": {
"command": "npx",
"args": []
}
}
}