loading…
Search for a command to run...
loading…
EU AI Act compliance scanner for Python AI agents. Scans, analyzes, and remediates LangChain/CrewAI/AutoGen/OpenAI code across 6 articles with 10 tools includin
EU AI Act compliance scanner for Python AI agents. Scans, analyzes, and remediates LangChain/CrewAI/AutoGen/OpenAI code across 6 articles with 10 tools including prompt injection detection, risk classification, and trust layer integration. The only MCP compliance server that generates fix code, not just findings.
EU AI Act compliance scanning for Claude Desktop, Claude Code, Cursor, and any MCP-compatible client.
Unlike other compliance scanners that only report problems, AIR Blackbox also remediates — generating working code fixes, trust layer integrations, GDPR compliance checks, bias analysis, and full compliance reports. Under the hood, the scanning feeds into air-trust, a cryptographic audit chain (HMAC-SHA256) with Ed25519 signed handoffs that ensures compliance data integrity.
| Tier | Tool | What it does | Requires SDK |
|---|---|---|---|
| Scanning | scan_code |
Scan Python code string for all 6 EU AI Act articles | No |
| Scanning | scan_file |
Read and scan a single Python file | No |
| Scanning | scan_project |
Recursively scan all .py files in a directory | No |
| Analysis | analyze_with_model |
Deep analysis via local fine-tuned model (Ollama) | No |
| Analysis | check_injection |
Detect prompt injection attacks (15 patterns) | No |
| Analysis | classify_risk |
Classify tools by EU AI Act risk level | No |
| Remediation | add_trust_layer |
Generate trust layer integration code | No |
| Remediation | suggest_fix |
Get article-specific fix recommendations | No |
| Documentation | explain_article |
Technical explanation of EU AI Act articles | No |
| Documentation | generate_compliance_report |
Full markdown compliance report | No |
| GDPR | scan_gdpr |
GDPR-specific compliance scan | Yes |
| Bias | scan_bias |
Bias and fairness analysis | Yes |
| Validation | validate_action |
Validate agent actions before execution (Article 14) | Yes |
| History | compliance_history |
View past scans, trends, and compliance scores | Yes |
LangChain, CrewAI, AutoGen, OpenAI, Haystack, LlamaIndex, Semantic Kernel, Google ADK, Claude Agent SDK, and generic RAG pipelines.
pip install air-blackbox-mcp
Works standalone with just the lightweight built-in scanner.
pip install air-blackbox-mcp[full]
Installs the full air-blackbox SDK (v1.6.3+) for advanced compliance features.
Edit ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"air-blackbox": {
"command": "python3",
"args": ["-m", "air_blackbox_mcp"]
}
}
}
Restart Claude Desktop. The 14 tools will appear automatically.
Add to .cursor/mcp.json in your project:
{
"mcpServers": {
"air-blackbox": {
"command": "python3",
"args": ["-m", "air_blackbox_mcp"]
}
}
}
Or add to .claude/mcp.json for Claude Code.
In Claude Desktop, Claude Code, or Cursor, just ask:
send_email"The full air-blackbox SDK unlocks 4 additional tools:
GDPR Scanning (scan_gdpr)
Bias Analysis (scan_bias)
Action Validation (validate_action)
Compliance History (compliance_history)
For AI-powered analysis beyond regex patterns:
# Install Ollama
brew install ollama
# Pull the fine-tuned compliance model
ollama pull air-compliance-v2
# The analyze_with_model tool will automatically use it
Other MCP compliance tools only scan. AIR Blackbox:
The server uses a smart fallback pattern:
air-blackbox>=1.6.0 is installed, use the full compliance enginepip install air-blackbox-mcp (basic mode)[full] to unlock advanced featuresThis means the MCP server works standalone, but gets dramatically more powerful when the SDK is present.
This MCP server is part of the AIR Blackbox ecosystem:
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"airblackbox-air-blackbox-mcp": {
"command": "npx",
"args": []
}
}
}