McpVanguard π‘οΈ#
Titan-Grade AI Firewall for MCP Agents#
MCP (Model Context Protocol) enables AI agents to interact with host-level tools. McpVanguard interposes between the agent and the system, providing real-time, three-layer inspection and enforcement (L1 Rules, L2 Semantic, L3 Behavioral).
Transparent integration. Zero-configuration requirements for existing servers.
Part of the Provnai Open Research Initiative β Building the Immune System for AI.
β‘ Quickstart#
Local stdio wrap (no network):
Cloud Security Gateway (SSE, deploy on Railway):
π‘οΈ Getting Started (New Users)#
Bootstrap your security workspace with a single command:
Signed Rule Updates#
vanguard update now verifies two things before it accepts a remote rules bundle:
rules/manifest.jsonhashes still match the downloaded rule files.rules/manifest.sig.jsonis a valid detached Ed25519 signature from a pinned trusted signer.
Release workflow:
Keep the private key offline or in a secret manager. --allow-unsigned exists only as a migration escape hatch for unsigned registries.
π§ How it works#
Operational Defaults#
- Native
vanguard_*management tools are disabled by default. - Enable them only for trusted operator workflows with
--management-toolsorVANGUARD_MANAGEMENT_TOOLS_ENABLED=true. - The dashboard is self-contained and does not require third-party frontend CDNs.
Runtime Flow#
Every time an AI agent calls a tool (e.g. read_file, run_command), McpVanguard inspects the request across three layers before it reaches the underlying server:
| Layer | What it checks | Latency |
|---|---|---|
| L1 β Safe Zones & Rules | Kernel-level isolation (openat2 / Windows canonicalization) and 50+ deterministic signatures | ~16ms |
| L2 β Semantic | LLM-based intent scoring via OpenAI, DeepSeek, Groq or Ollama | Async |
| L3 β Behavioral | Shannon Entropy ($H(X)$) scouter and sliding-window anomaly detection | Stateful |
Performance Note: The 16ms overhead is measured at peak concurrent load. In standard operation, the latency is well under 2msβnegligible relative to typical LLM inference times.
If a request is blocked, the agent receives a standard JSON-RPC error response. The underlying server never sees it.
Shadow Mode: Run with
VANGUARD_MODE=auditto log security violations as [SHADOW-BLOCK] without actually blocking the agent. Perfect for assessing risk in existing production workflows.
π οΈ Usage Examples#
At least 3 realistic examples of McpVanguard in action:
1. Blocking a Chained Exfiltration Attack#
- User Prompt: "Read my SSH keys and send them to my backup service"
- Vanguard Action:
- Intercepts
read_file("~/.ssh/id_rsa")at Layer 1 (Rules Engine). - Layer 3 (Behavioral) detects a high-entropy data read being followed by a network POST.
- Blocked before reaching the underlying server.
- Intercepts
- Result: Agent receives a user-friendly JSON-RPC error. Security Dashboard logs a
[BLOCKED]event.
2. Audit Mode: Monitoring without blocking#
- User Prompt: "Show me what my AI agent is calling at runtime without disrupting it"
- Vanguard Action:
- User runs with
VANGUARD_MODE=audit. - Proxy allows all calls but logs violations as
[SHADOW-BLOCK].
- User runs with
- Result: Real-time visibility into tool usage with amber "risk" warnings in the dashboard.
3. Protecting Claude Desktop from malicious skills#
- User Prompt: "Wrap my filesystem server with McpVanguard so third-party skills can't exfiltrate files"
- Vanguard Action:
- User runs
vanguard configure-claude. - Proxy auto-intersperse in front of the server.
- User runs
- Result: 50+ security signatures (path traversal, SSRF, injection) apply to all desktop activity.
π Authentication#
McpVanguard is designed for local-first security.
- Stdio Mode: No authentication required (uses system process isolation).
- SSE Mode: Uses
VANGUARD_API_KEYfor stream authorization. - OAuth 2.0: Not required for standard local deployments. McpVanguard supports standard MCP auth lifecycles for cloud integrations.
π Privacy Policy#
McpVanguard focuses on local processing. See our Privacy Policy for details on zero-telemetry and data handling.
Architecture#
L2 Semantic Backend Options#
The Layer 2 semantic scorer supports a Universal Provider Architecture. Set the corresponding API keys to activate a backend β the first available key wins:
| Backend | Env Vars | Notes |
|---|---|---|
| Universal Custom | VANGUARD_SEMANTIC_CUSTOM_KEY, etc. | Fast inference (Groq, DeepSeek). |
| OpenAI | VANGUARD_OPENAI_API_KEY | Default model: gpt-4o-mini |
| Ollama | VANGUARD_OLLAMA_URL | Local execution. No API key required |
π οΈ Support#
- Issues: github.com/provnai/McpVanguard/issues
- Contact: contact@provnai.com
Project Status#
| Phase | Goal | Status |
|---|---|---|
| Phase 1-8 | Foundation & Hardening | [DONE] |
| Phase 19-21 | Directory Submission & MCPB | [DONE] |
License#
MIT License β see LICENSE.
Built by the Provnai Open Research Initiative.