Sovereign MCP Gateway — 64 governed tools with Merkle transparency log. EU AI Act ready.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"com-obligationsign-mcp-agts-mcp": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Sovereign MCP Gateway — 64 governed tools with Merkle transparency log. EU AI Act ready.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in other
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Official Miro MCP server - Supports context to code and creating diagrams, docs, and data tables.
MCP server for using the GitLab API
MCP Security Weekly
Get CVE alerts and security updates for com.obligationsign.mcp/agts-mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Sovereign MCP Gateway — Governed Tool Invocation for Autonomous Agents
Model Context Protocol server that turns tool calls into cryptographically authorized, verifiable actions. 64 governed tools across 6 layers — hybrid Ed25519 + SLH-DSA signed and Merkle-anchored. Designed to support EU AI Act, GDPR, SOC 2, ISO 27001, DORA, NIS2, and FINRA compliance.
https://agts-mcp.obligationsign.com/mcp
| Transport | URL | Status |
|---|---|---|
| Streamable HTTP (primary) | https://agts-mcp.obligationsign.com/mcp | Active |
| SSE (deprecated) | https://agts-mcp.obligationsign.com/mcp/sse | Deprecated |
The gateway requires a Bearer token issued through the ObligationSign platform. All requests must include an Authorization header.
To obtain a token, register at obligationsign.com/start/.
Add to your MCP configuration:
{
"mcpServers": {
"agts": {
"url": "https://agts-mcp.obligationsign.com/mcp",
"headers": {
"Authorization": "Bearer YOUR_TOKEN"
}
}
}
}
curl -X POST https://agts-mcp.obligationsign.com/mcp \
-H "Content-Type: application/json" \
-H "Authorization: Bearer YOUR_TOKEN" \
-d '{
"jsonrpc": "2.0",
"id": 1,
"method": "tools/list",
"params": {}
}'
AGTS (Autonomous Governance Transparency Standard) is a transparency-backed governance protocol that converts validated machine decisions into append-only cryptographic records, independently verified by a network of witnesses and monitors.
decision → record → immutable history → verifiable truth
Every tool call passes through a five-gate firewall (Statistical, Causal, Regression, Evidence, Human-Compatible Explanation) before execution. Admitted actions are Merkle-anchored into an append-only transparency log and signed with hybrid post-quantum cryptography.
| Tool | Description |
|---|---|
create_tunnel | Establish an attested VPN tunnel (WireGuard/IPSec/TLS) |
tunnel_status | Monitor uptime, transfer bytes, and attestation status |
disconnect_tunnel | Terminate session and log the event |
dns_query | Secure DNS resolution through the Sovereign resolver |
| Tool | Description |
|---|---|
system_health | Probe all mesh workers for status and latency |
check_alerts | Fetch the monitor alert timeline |
subscribe_alerts | Webhook subscription for real-time alerts |
check_equivocations | Fetch conflicting Signed Tree Head proofs |
gossip_status | Current state of gossip protocol and monitor identity |
| Tool | Description |
|---|---|
send_sovereign_mail | Send encrypted (internal) or plaintext (external) messages |
list_inbox | List message metadata from an inbox |
read_message | Retrieve full message content by ID |
lookup_recipient_keys | Retrieve public keys (ECDH P-384 / ML-KEM-512) |
| Tool | Description |
|---|---|
upload_file | Client-side encrypted upload with integrity anchoring |
list_files | List file metadata, sizes, and sharing status |
download_file | Retrieve ciphertext for client-side decryption |
share_file | Share files using ECDH key wrapping |
delete_file | Remove a file and create a death leaf in the log |
| Tool | Description |
|---|---|
register_claw | Create a cryptographic Claw Passport and identity keys |
scan_skill | Scan agent skills through the five-gate firewall |
claw_status | Return trust score, governance history, and quota |
export_passport | Sec |