AI agent security via MCP: C3 firewall, C4 immune system, C5 action guard, self-evolving prompts.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"io-github-gsepcore-gsep-mcp": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
AI agent security via MCP: C3 firewall, C4 immune system, C5 action guard, self-evolving prompts.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in ai-ml / security
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
An open-source AI agent that brings the power of Gemini directly into your terminal.
Just a Better Chatbot. Powered by Agent & MCP & Workflows.
MCP Security Weekly
Get CVE alerts and security updates for io.github.gsepcore/gsep-mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
The only MCP server that protects your AI agent instead of just extending it.
"me encanta saber que no borrará nada de mi pc" — First GSEP user, unprompted
| Metric | Value |
|---|---|
| MCP Tools | 10 |
| Prompt injection patterns (C3) | 53 |
| Destructive action patterns (C5) | 80+ |
| Behavioral immune checks (C4) | 6 |
| Chromosome layers | 6 (C0–C5) |
| LLM providers supported | 5 (Claude, GPT-4, Gemini, Ollama, Perplexity) |
| Transport modes | 2 (stdio + HTTP/SSE) |
| Setup time | < 2 minutes |
There are 9,400+ MCP servers. All of them give your agent new tools — Notion, GitHub, Slack, databases.
GSEP-MCP is different. It gives your agent security, safety, and self-improvement — without writing a single line of code.
OTHER MCP SERVERS GSEP-MCP
┌──────────────────┐ ┌──────────────────────────────┐
│ Give agent │ │ Protect agent from │
│ new tools │ vs │ prompt injection │
│ │ │ Block destructive actions │
│ More features │ │ Detect infected responses │
│ │ │ Self-evolving prompts │
└──────────────────┘ └──────────────────────────────┘
Works with: Claude Desktop, Cursor, Windsurf, Cline, Continue, n8n, Make, any MCP client.
GSEP-MCP supports two transports: stdio (for desktop apps and IDEs) and HTTP (for servers, backends, and automation platforms). Pick the one that matches your environment.
stdio is the simplest transport. The MCP client launches GSEP-MCP as a subprocess and communicates via stdin/stdout. No port, no server, no network.
Add to ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"gsep": {
"command": "npx",
"args": ["-y", "@gsep/mcp"],
"env": {
"ANTHROPIC_API_KEY": "sk-ant-..."
}
}
}
}
Restart Claude Desktop. Your agent is now protected.
Add to .cursor/mcp.json in your project (or global ~/.cursor/mcp.json):
{
"mcpServers": {
"gsep": {
"command": "npx",
"args": ["-y", "@gsep/mcp"],
"env": {
"ANTHROPIC_API_KEY": "sk-ant-..."
}
}
}
}
Add to ~/.codeium/windsurf/mcp_config.json:
{
"mcpServers": {
"gsep": {
"command": "npx",
"args": ["-y", "@gsep/mcp"],
"env": {
"ANTHROPIC_API_KEY": "sk-ant-..."
}
}
}
}
Add the same config block to your IDE's MCP settings file. GSEP-MCP is compatible with any client that implements the MCP protocol.
{
"mcpServers": {
"gsep": {
"command": "npx",
"args": ["-y", "@gsep/mcp"],
"env": {
"ANTHROPIC_API_KEY": "sk-ant-...",
"GSEP_PRESET": "full"
}
}
}
}
{
"mcpServers": {
"gsep": {
"command": "npx",
"args": ["-y", "@gsep/mcp"],
"env": {
"OLLAMA_HOST"
... [View full README on GitHub](https://github.com/gsepcore/gsep-mcp#readme)