loading…
Search for a command to run...
loading…
A data governance agent that audits PostgreSQL databases through controlled MCP tools for schema inspection, null profiling, and anomaly detection.
A data governance agent that audits PostgreSQL databases through controlled MCP tools for schema inspection, null profiling, and anomaly detection.
Sentinel is a autonomous data governance agent that audits a PostgreSQL database through the Model Context Protocol (MCP). Instead of giving the LLM direct database access, the project exposes a controlled FastMCP bridge with purpose-built tools for schema inspection, null profiling, and anomaly detection.
The demo seeds an intentionally dirty raw_inventory table, asks an OpenAI-powered agent to inspect it through MCP tools, and writes a Markdown audit report to LATEST_AUDIT.md.
flowchart LR
U[User question] --> A[Python Agent<br/>MCP Client]
A -->|tools/list and tools/call| M[FastMCP Server<br/>Sentinel-Bridge]
M -->|SQLAlchemy queries| DB[(PostgreSQL 16<br/>raw_inventory)]
DB -->|schema and quality metrics| M
M -->|structured MCP tool results| A
A -->|OpenAI analysis or local fallback| R[LATEST_AUDIT.md]
inspect_schema() returns table names and column definitions for structural audits.
get_data_health_sample() returns 100 recent rows from raw_inventory for row-level review.
check_null_ratios(table_name="raw_inventory") returns null counts and percentages for every column.
find_logical_anomalies() returns rows with negative stock_count values and duplicated sku groups.
agent.py # MCP client and ReAct audit workflow
server.py # FastMCP server exposing database audit tools
seed_data.py # Faker-based dirty data generator
docker-compose.yml # PostgreSQL 16 local database
architecture.md # Mermaid architecture diagram
.env.example # Safe environment variable template
Requirements:
uvCreate your local environment file:
Copy-Item .env.example .env
Edit .env and replace placeholder values. Do not commit .env.
Install dependencies:
uv sync
Start PostgreSQL:
docker compose up -d
Seed the dirty inventory table:
uv run python seed_data.py
Run the MCP server directly:
uv run python server.py
In another terminal, run the autonomous audit agent:
uv run python agent.py
The agent writes its report to:
LATEST_AUDIT.md
docker exec -it sentinel_postgres psql -U sentinel_user -d sentinel_db -c "SELECT COUNT(*) AS negative_stock_rows FROM raw_inventory WHERE stock_count < 0;"
Expected result after seeding:
30
.env is ignored by Git and must never be committed..env.example contains placeholders only.MCP gives the LLM a constrained tool interface rather than unrestricted database access. The FastMCP server defines the allowed actions, making the governance boundary explicit and auditable. The same agent can later interoperate with catalogs, policy engines, warehouses, and observability systems through MCP without rewriting the agent around direct database connections.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"sentinel-mcp-data-governance-agent": {
"command": "npx",
"args": []
}
}
}