ScopeBlind protect-mcp

MCP security gateway. Wraps any MCP server with per-tool policies, Ed25519-signed decision receipts, and human approval gates. Shadow mode logs everything without blocking. Enforce mode applies policy.

Audits

Pass

Install

openclaw skills install scopeblind-protect-mcp

protect-mcp — MCP Security Gateway

What This Skill Does

Wraps any MCP server as a transparent stdio proxy with per-tool security policies and cryptographic audit trail. Every tool call decision is logged and optionally Ed25519-signed.

Quick Start

# Shadow mode — log everything, block nothing
npx protect-mcp -- node your-server.js

# Enforce mode — apply per-tool policies
npx protect-mcp --policy policy.json --enforce -- node your-server.js

# Initialize signing (generates Ed25519 keypair)
npx protect-mcp init

Policy Example

{
  "tools": {
    "db_write": { "decision": "deny" },
    "file_read": { "decision": "allow", "rateLimit": { "maxCalls": 30, "windowSecs": 60 } },
    "deploy": { "decision": "require_approval" }
  }
}

Pre-built Policy Packs

protect-mcp ships CVE-anchored policy packs:

# List available policies
npx protect-mcp policies

# Apply the Clinejection prevention policy
npx protect-mcp --policy clinejection --enforce -- node your-server.js

Verify Receipts

Receipts are independently verifiable offline — no ScopeBlind dependency:

npx @veritasacta/verify receipt.json
npx @veritasacta/verify --self-test

OWASP MCP Top 10 Coverage

RiskControl
MCP-01 Rug PullsSigned tool manifests; policy pins allowed tools
MCP-03 Tool PoisoningPer-tool allow/deny/rate-limit policies
MCP-04 Tool Arg InjectionArgument inspection + approval gates
MCP-07 Auth/AuthZTrust-tier gating
MCP-08 Logging & AuditEd25519-signed receipts — verifiable offline
MCP-09 Excessive AgencyShadow mode reveals actual tool usage

Links