loading…
Search for a command to run...
loading…
MCP security scanner for AI agents - detects prompt injection, secrets, PII, and vets MCP servers before installation
MCP security scanner for AI agents - detects prompt injection, secrets, PII, and vets MCP servers before installation
Enterprise Security Suite for AI Agents
npm npm npm npm npm npm npm npm npm npm npm npm npm npm npm npm License
A TypeScript monorepo providing security, encryption, compliance, and governance tools for AI agent systems. Built for the Model Context Protocol (MCP) ecosystem.
Old English
tollere— the customs inspector who stood at the gate and examined every good crossing the boundary.
Catches typosquats, CVEs, compromised maintainers, Docker tag overwriting, IDE extension impersonation, and sandwich-pattern attacks before the install completes. Validated against the real-world Checkmarx KICS supply chain compromise (April 2026) — Tollere catches the v2.1.20 tag reassignment in real-time.
npx @weave_protocol/tollere scan # scan package.json
npx @weave_protocol/tollere docker checkmarx/kics:v2.1.20 # 🆕 Docker images
npx @weave_protocol/tollere ext ms-python.python vscode # 🆕 IDE extensions
npx @weave_protocol/tollere sandwich some-package # 🆕 sandwich pattern
Coverage: npm, PyPI, Cargo, Go, Maven, Docker Hub, VS Code Marketplace (covers Cursor + Windsurf), Open VSX (VSCodium/Gitpod), JetBrains Marketplace (IntelliJ/PyCharm/WebStorm/etc).
Real-time security monitoring UI bundled with the API package:
npx @weave_protocol/api
# → Open http://localhost:3000/dashboard
Live activity feed, threat intel status, compliance frameworks, MCP server reputation. See API README →
Security scanning for LlamaIndex applications:
from weave_protocol_llamaindex import WeaveSecurityHandler
from llama_index.core.callbacks import CallbackManager
from llama_index.core import Settings
Settings.callback_manager = CallbackManager([WeaveSecurityHandler()])
# All LlamaIndex operations now scanned - threats auto-blocked
Drop-in security for LangChain.js applications:
import { WeaveSecurityCallback } from '@weave_protocol/langchain';
const chain = new LLMChain({
llm: new ChatOpenAI(),
prompt,
callbacks: [new WeaveSecurityCallback({ action: 'block' })],
});
| Package | Version | Description |
|---|---|---|
| 🛡️ @weave_protocol/mund | 0.2.2 | Security scanner - secrets, PII, injection, MCP vetting, threat intel |
| 🏛️ @weave_protocol/hord | 0.1.6 | Encrypted vault with Yoxallismus cipher |
| ⚖️ @weave_protocol/domere | 1.3.4 | Compliance (PCI-DSS, ISO27001, SOC2, HIPAA, GDPR, CCPA) & verification |
| 👥 @weave_protocol/witan | 1.0.2 | Multi-agent consensus & governance |
| 🔍 @weave_protocol/hundredmen | 1.0.6 | Real-time MCP proxy - intercept, scan, gate tool calls |
| 🛂 @weave_protocol/tollere | 0.2.2 | Supply chain security - npm, Docker images, IDE extensions, sandwich pattern detection |
| 🔗 @weave_protocol/langchain | 1.0.1 | LangChain.js security callbacks & tool wrappers |
| 🐍 weave-protocol-llamaindex | 0.1.0 | Python/LlamaIndex security callbacks & tools |
| 🔌 @weave_protocol/api | 1.0.12 | REST API for all packages + dashboard |
Each package includes a SKILL.md file following the Claude Agent Skills specification. These teach AI agents how to use Weave Protocol tools effectively.
| Package | Skill Name | Triggers |
|---|---|---|
| 🛡️ Mund | security-scanning |
scan, detect secrets, check injection, vet MCP server, threat intel |
| 🏛️ Hord | encrypting-data |
encrypt, decrypt, vault, Yoxallismus, protect |
| ⚖️ Domere | compliance-auditing |
audit, checkpoint, SOC2, HIPAA, PCI-DSS, GDPR, CCPA, blockchain |
| 👥 Witan | consensus-governance |
consensus, vote, approve, policy, escalate |
| 🔍 Hundredmen | security-inspection |
intercept, drift, reputation, approve, block, live feed |
| 🛂 Tollere | supply-chain-security |
npm install, docker pull, install extension, dependency check, typosquat, CVE, sandwich pattern |
| 🔗 Langchain | langchain-security |
LangChain, callback, secure tool, RAG security, PII redaction |
| 🔌 API | weave-api-calling |
REST API, HTTP endpoint, curl, fetch |
Installation:
git clone https://github.com/Tyox-all/Weave_Protocol.git
mkdir -p ~/.claude/skills/weave-protocol
cp Weave_Protocol/*/SKILL.md ~/.claude/skills/weave-protocol/
Once installed, Claude automatically invokes the appropriate skill for each task.
npm install @weave_protocol/mund @weave_protocol/hord @weave_protocol/domere @weave_protocol/hundredmen @weave_protocol/tollere @weave_protocol/langchain
Add to claude_desktop_config.json:
{
"mcpServers": {
"mund": { "command": "npx", "args": ["-y", "@weave_protocol/mund"] },
"hord": { "command": "npx", "args": ["-y", "@weave_protocol/hord"] },
"domere": { "command": "npx", "args": ["-y", "@weave_protocol/domere"] },
"hundredmen": { "command": "npx", "args": ["-y", "@weave_protocol/hundredmen"] },
"tollere": { "command": "npx", "args": ["-y", "@weave_protocol/tollere"] }
}
}
Real-time security scanning for AI agents.
| Category | Features |
|---|---|
| Secrets | API keys, tokens, passwords, certificates (30+ patterns) |
| PII | SSN, credit cards, emails, phone numbers, addresses |
| Injection | Prompt injection, jailbreak attempts, instruction override |
| Code | Dangerous patterns, eval/exec, SQL injection, XSS |
| MCP Servers | Malicious tool descriptions, typosquatting, dangerous permissions |
| Threat Intel | MITRE ATT&CK patterns, community feeds, auto-updates |
📄 Skill: security-scanning
Encrypted storage with the Yoxallismus dual-tumbler cipher.
| Category | Features |
|---|---|
| Encryption | AES-256-GCM, ChaCha20-Poly1305 |
| Key Derivation | Argon2id with configurable parameters |
| Yoxallismus | Dual-layer tumbler/deadbolt obfuscation |
| Memory Safety | Secure buffer handling, auto-zeroing |
📄 Skill: encrypting-data
Enterprise-grade verification, orchestration, compliance, and audit infrastructure.
| Category | Features |
|---|---|
| Verification | Intent tracking, drift detection, execution replay |
| Compliance | SOC2, HIPAA, PCI-DSS, ISO27001, GDPR, CCPA |
| Blockchain | Solana & Ethereum anchoring for immutable audit trails |
Blockchain Anchoring:
6g7raTAHU2h331VKtfVtkS5pmuvR8vMYwjGsZF1CUj2oBeCYVJYfbUu3k2TPGmh9VoGWeJwzm2hg2NdtnvbdBNCj0xAA8b52adD3CEce6269d14C6335a79df451543820📄 Skill: compliance-auditing
Multi-agent consensus and governance.
| Category | Features |
|---|---|
| Consensus | Unanimous, majority, weighted, quorum protocols |
| Policy | Rule enforcement, permission management, escalation |
| Communication | Agent bus, broadcast, point-to-point messaging |
📄 Skill: consensus-governance
Real-time MCP security proxy that intercepts, scans, and gates AI agent tool calls.
| Category | Features |
|---|---|
| Interception | Proxy all MCP tool calls in real-time |
| Drift Detection | "Said X, doing Y" - catch unauthorized actions |
| Reputation | Server trust scores, community reports |
| Manual Gates | Require approval for high-risk operations |
📄 Skill: security-inspection
Supply chain security for AI-generated code. Catches malicious packages, Docker images, and IDE extensions before they reach node_modules/, your container, or your editor.
| Surface | Coverage |
|---|---|
| Packages | npm, PyPI, Cargo, Go, Maven (typosquats, CVEs, maintainer reputation) |
| 🆕 Sandwich Pattern | Malicious code hidden between a clean "filling" version (Checkmarx attack pattern) |
| 🆕 Docker Images | Tag overwrite detection, phantom tags (Docker Hub) |
| 🆕 IDE Extensions | VS Code (Cursor, Windsurf), Open VSX (VSCodium, Gitpod), JetBrains (IntelliJ, PyCharm, WebStorm, etc.) |
npx @weave_protocol/tollere scan
npx @weave_protocol/tollere docker checkmarx/kics:v2.1.20
npx @weave_protocol/tollere ext ms-python.python vscode
📄 Skill: supply-chain-security
Security integration for LangChain.js applications.
| Category | Features |
|---|---|
| Callbacks | Drop-in WeaveSecurityCallback for any chain/agent |
| Tool Wrappers | Wrap tools with threat scanning and approval gates |
| Retrievers | Scan RAG documents, auto-redact PII |
📄 Skill: langchain-security
┌───────────────────────────────────────────────────────────────┐
│ AI Agent System │
├───────────────────────────────────────────────────────────────┤
│ │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐ │
│ │ 🛡️ Mund │ │ 🏛️ Hord │ │ ⚖️ Domere│ │ 👥 Witan │ │
│ │ Guardian │ │ Vault │ │ Judge │ │ Council │ │
│ └────┬─────┘ └────┬─────┘ └────┬─────┘ └────┬─────┘ │
│ │ │ │ │ │
│ Security Encryption Compliance Consensus │
│ │ │ │ │ │
│ └─────────────┴─────────────┴─────────────┘ │
│ │ │
│ ┌──────────────┐ ┌──────┴──────┐ ┌──────────────┐ │
│ │🔍 Hundredmen │ │ 🛂 Tollere │ │ 🔌 API │ │
│ │ Watchers │ │ Customs │ │ REST + UI │ │
│ └──────────────┘ └─────────────┘ └──────────────┘ │
│ │ │ │ │
│ Runtime Calls Supply Chain Universal Access │
│ │ │ │ │
│ └──────────────────┴──────────────────┘ │
│ │ │
│ ┌──────┴───────┐ │
│ │ 🔗 Langchain │ │
│ │ Bridge │ │
│ └──────────────┘ │
│ │
└───────────────────────────────────────────────────────────────┘
Defense-in-depth across the entire AI agent lifecycle:
| CORS Layer | Weave Package | Function |
|---|---|---|
| Supply Chain | 🛂 Tollere | Vets dependencies, images, extensions before install |
| Origin Validation | 🛡️ Mund | Validates input sources, detects injection |
| Context Integrity | 🏛️ Hord | Protects data integrity through encryption |
| Deterministic Enforcement | ⚖️ Domere | Ensures consistent policy application |
| Runtime Interception | 🔍 Hundredmen | Gates tool calls, detects drift |
git clone https://github.com/Tyox-all/Weave_Protocol.git
cd Weave_Protocol
# Build each package
for pkg in mund hord domere witan hundredmen tollere langchain api; do
(cd $pkg && npm install && npm run build)
done
weave init)@weave_protocol/browser)@weave_protocol/adversary)Bug reports and feature requests welcome via GitHub Issues.
For security issues, please see SECURITY.md.
For all other inquiries: [email protected]
See CONTRIBUTING.md for guidelines.
Apache 2.0 — See LICENSE
Built with ❤️ for the AI agent ecosystem.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"mund": {
"command": "npx",
"args": []
}
}
}Web content fetching and conversion for efficient LLM usage.
Retrieval from AWS Knowledge Base using Bedrock Agent Runtime.
Provides auto-configuration for setting up an MCP server in Spring Boot applications.
A very streamlined mcp client that supports calling and monitoring stdio/sse/streamableHttp, and can also view request responses through the /logs page. It also