OpenVox MCP Server - AI governance tooling for the OpenVox Puppet ecosystem
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"openvox-mcp": {
"url": "http://localhost:9393",
"type": "http",
"headers": {
"Authorization": "Bearer ovmcp_your_key_here"
}
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
An open-source Model Context Protocol (MCP) server for the OpenVox Puppet ecosystem. Provides AI tools with deep knowledge of OpenVox core projects and Voxpupuli modules, with built-in AI governance, transparency, and legal protection.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Click any tool to inspect its schema.
openvox://policy/summaryAI policy summary (instructions field)
openvox://policy/summary
openvox://policy/fullComplete policy (all 9 areas)
openvox://policy/full
openvox://policy/licensesLicense allowlist
openvox://policy/licenses
openvox://policy/dcoDCO v1.1 text
openvox://policy/dco
openvox://policy/provenance-formatProvenance file spec
openvox://policy/provenance-format
openvox://policy/trailersTrailer reference
openvox://policy/trailers
openvox://policy/deny-listSecurity deny-list
openvox://policy/deny-list
openvox://policy/protected-filesProtected files list
openvox://policy/protected-files
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in legal
An MCP (Model Context Protocol) server for performing accessibility audits on webpages using axe-core. Use the results in an agentic loop with your favorite AI assistants (Amp/Cline/Cursor/GH Copilot) and let them fix a11y issues for you!
MCP server for French e-invoicing (XP Z12-013). Manages invoices, validation and compliance.
956k Swiss court decisions: full-text search, citation graph, statute lookup (DE/FR/IT)
API governance for AI coding assistants. Breaking changes, policies, cross-model context.
MCP Security Weekly
Get CVE alerts and security updates for Openvox Mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
An open-source Model Context Protocol (MCP) server for the OpenVox Puppet ecosystem. Provides AI tools with deep knowledge of OpenVox core projects and Voxpupuli modules, with built-in AI governance, transparency, and legal protection.
"The community is what drives the ecosystem, not the platform." — Ben Ford
The Puppet ecosystem needs an open-source MCP server. Perforce Puppet has a closed-source MCP; this project provides the community-owned alternative. The OpenVox MCP Server is designed as an AAIF implementation for the Puppet/OpenVox ecosystem.
.ai-provenance.yml), policy configuration
files, and override filesopenvox-mcp-puppet), not the core serveropenvox-puppet, openvox-server, openvoxdb, openvoxdb-cli, openbolt, container-openbolt, container-openvoxagent, container-openvoxdb, container-openvoxserver, hiera, hiera-eyaml, openvox-docs, openvox-helm-chart, openvoxserver-ca, and more.
Community-maintained Puppet modules under the Voxpupuli organization.
Single MCP server with a plugin architecture. Governance is always loaded; depth plugins are optional.
server = OpenvoxMCP.server(plugins: [:puppet, :server, :modules])
# Governance is always loaded — cannot be bypassed
# Depth plugins are loaded conditionally
Both transports are supported from day one:
| Transport | Use Case | Entry Point | Auth | User |
|---|---|---|---|---|
| stdio | Local development | bin/openvox-mcp-stdio | None (local pipe) | Shell user |
| HTTP (Streamable) | Shared / production | bin/openvox-mcp-server | API key (Bearer) | openvox-mcp system user |
stdio runs as your shell user, launched by the MCP client. No special setup needed.
HTTP runs as a long-running daemon (typically via systemd) under a dedicated system user. See docs/deployment.md for the full deployment guide including system user creation, Ruby path configuration, and systemd setup.
The core governance layer provides 9 tools:
| Tool | Description |
|---|---|
validate_commit | Validate commit message for AI policy compliance (stage-aware) |
check_disclosure | C |