Signed receipts and Cedar policies for AI agent tool calls. Claude Code hooks, MCP gateway.
{
"mcpServers": {
"com-scopeblind-protect-mcp": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Signed receipts and Cedar policies for AI agent tool calls. Claude Code hooks, MCP gateway.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 2 days ago. 4 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Dynamic problem-solving through sequential thought chains
A Model Context Protocol server for searching and analyzing arXiv papers
An open-source AI agent that brings the power of Gemini directly into your terminal.
The official Python SDK for Model Context Protocol servers and clients
MCP Security Weekly
Get CVE alerts and security updates for com.scopeblind/protect-mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Enterprise security gateway for MCP servers and Claude Code hooks. Signed receipts, Cedar policies, and swarm-aware audit trails.
Integrated into Microsoft Agent Governance Toolkit | IETF Internet-Draft | Live demo: acta.today/wiki
Two commands. Every tool call is receipted.
# 1. Generate hooks, keys, Cedar policy, and /verify-receipt skill
npx protect-mcp init-hooks
# 2. Start the hook server
npx protect-mcp serve
Open Claude Code in the same project. Every tool call is now intercepted, evaluated, and signed.
init-hooks creates| File | Purpose |
|------|---------|
| .claude/settings.json | Hook config (PreToolUse, PostToolUse, + 9 lifecycle events) |
| keys/gateway.json | Ed25519 signing keypair (auto-gitignored) |
| policies/agent.cedar | Starter Cedar policy — customize to your needs |
| protect-mcp.json | JSON policy with signing + rate limits |
| .claude/skills/verify-receipt/SKILL.md | /verify-receipt skill for Claude Code |
Claude Code → POST /hook → protect-mcp (Cedar + sign) → response
↓
.protect-mcp-log.jsonl
.protect-mcp-receipts.jsonl
| Method | Path | Description |
|--------|------|-------------|
| POST | /hook | Claude Code hook endpoint |
| GET | /health | Server status, policy info, signer info |
| GET | /receipts | Recent signed receipts |
| GET | /receipts/latest | Most recent receipt |
| GET | /suggestions | Auto-generated Cedar policy fix suggestions |
| GET | /alerts | Config tamper detection alerts |
# Inside Claude Code:
/verify-receipt
# From terminal:
curl http://127.0.0.1:9377/receipts/latest | jq .
npx protect-mcp receipts
# Check policy suggestions:
curl http://127.0.0.1:9377/suggestions | jq .
Wrap any stdio MCP server as a transparent proxy:
# Shadow mode — log every tool call, enforce nothing
npx protect-mcp -- node my-server.js
# Enforce mode with policy
npx protect-mcp --policy protect-mcp.json --enforce -- node my-server.js
# Generate keys + config template
npx protect-mcp init
protect-mcp evaluates every tool call against a policy (JSON, Cedar, or external PDP), signs the decision as an Ed25519 receipt, and logs the result.
Two integration modes:
| Mode | Transport | Use Case |
|------|-----------|----------|
| Hook Server | HTTP (npx protect-mcp serve) | Claude Code, agent swarms |
| Stdio Proxy | stdin/stdout (npx protect-mcp -- ...) | Claude Desktop, Cursor, any MCP client |
Three policy engines:
| Engine | Config | Notes | |--------|--------|-------| | JSON | `--policy