Security, cost, and health governance proxy for MCP infrastructure
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"io-github-rudraneel93-mcp-guardian": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Security, cost, and health governance proxy for MCP infrastructure
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in devops
MCP server for using the GitLab API
Yunxiao MCP Server provides AI assistants with the ability to interact with the Yunxiao platform. It provides a set of tools that interact with Yunxiao's API, allowing AI assistants to manage Codeup repository, Project, Pipeline, Packages etc.
Enhanced MCP server for GitLab: group projects listing and activity tracking
MCP server for Komodo - manage Docker containers, servers, stacks, and deployments via AI
MCP Security Weekly
Get CVE alerts and security updates for io.github.rudraneel93/mcp-guardian and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Runtime security, cost governance, and health monitoring proxy for MCP infrastructure.
v2.8.1 ships per-block instant attack learning on proxy policy blocks — rolling stats and attack-pattern suggestions in a sliding window while traffic is active (GUARDIAN_AI_INSTANT_LEARNING, GUARDIAN_AI_ATTACK_MIN_BLOCKS, GUARDIAN_AI_INSTANT_WINDOW_MS; debounced batch cycles remain for full AI review). Repo eval numbers below come from reports/attack-learning-eval/metrics.json (reproducible CI). sca/ adds a separate synthetic 180-minute escalation sim — use repo metrics when numbers must match CI.
pnpm eval:attack-learning:long — 5003 simulated blocked tools/call events, ~4.9h attack stream (2–5s inter-arrival, 30s batch debounce). Source: metrics.json.
| Metric | Instant learning | Batch-only (debounced) |
|---|---|---|
| Suggestions queued | 5 | 5 |
| Avg blocks to first suggestion | 3.0 | 1000.6 |
| Median time-to-suggestion | 41 s | ~4.9 h |
Verdict: Same suggestion throughput, but instant discovers repeat (rule, tool) clusters during the stream; batch-only defers until debounce quiet periods, pushing median discovery toward session end. Deep dive: Attack learning evaluation · summary.md · docs/AI_LEARNING.md.
flowchart LR
B[Policy block] --> I[Instant rolling stats]
I --> Q{≥ min blocks in window?}
Q -->|yes| S[Queue attack-pattern suggestion]
Q -->|no| W[More blocks in stream]
B --> D[Debounced batch cycle]
D --> S
S --> P[Human accept or auto-apply → policy YAML]
| Instant vs batch — repo eval | Stage 1 → 2 detection — synthetic 180 min sim |
|---|---|
![]() | ![]() |
Instant curve rises in the first minutes; batch stays flat until ~4.9h debounce quiet — same 5 suggestions, different discovery latency (median ~41s instant vs ~4.87h batch in metrics table above).
Synthetic sim (sca/): Stage 2 detection +8.8pp avg vs Stage 1 across 12 escalating attack types (not metrics.json).
pnpm eval:attack-learning:long && pnpm eval:attack-learning:charts # refresh fig1–fig7 + metrics.json
MCP Guardian sits between AI agents and MCP servers, enforcing active security policies, tracking real token costs, monitoring server health, and providing enterprise observability — all through a YAML-configurable engine with hot-reload.
It works as a transparent stdio proxy (real-time enforcement for Cline, Cursor, Claude Code), a standalone CLI, an interactive TUI, an MCP audit server (agents can