The WAF for agents. Pattern-based + heuristic firewall scans prompts, RAG documents, tool arguments, A2A payloads for OWASP LLM01 prompt injection BEFORE they reach a downstream agent. Curated from OWASP + academia + production incidents.
Project description
Agent Prompt Injection Firewall MCP
WAF for AI agents — block prompt injection before it reaches the LLM
Agents that blindly forward user input + retrieved documents to other agents are the #1 production AI vulnerability (OWASP LLM01). This MCP is the pre-flight gate.
By MEOK AI Labs.
Install
pip install agent-prompt-injection-firewall-mcp
Tools
scan_promptdefine_custom_rulelist_rulesscan_logsign_firewall_attestation
Claude Desktop
{
"mcpServers": {
"agentpromptinjectionfirewall": { "command": "agent-prompt-injection-firewall-mcp" }
}
}
Tiers
- Free — generous daily limit (100-1,000 depending on operation)
- Pro £199/mo — unlimited + signed HMAC attestations with public verify URLs — subscribe
- Enterprise £1,499/mo — multi-tenant + custom predicate DSL + SIEM webhook push — subscribe
Why this exists
The EU AI Act (Aug 2026), DORA (live), ISO 42001, and OWASP LLM01 Top-10 all demand runtime controls for agent systems — not just deployment-time audits. This MCP is that runtime control layer, emitting cryptographically signed evidence your auditor accepts.
Related MEOK A2A MCPs
agent-policy-enforcement-mcp— per-pair IAMagent-handoff-certified-mcp— signed delegation chainagent-prompt-injection-firewall-mcp— prompt injection WAFagent-rate-limiter-mcp— fleet-wide quotaagent-audit-logger-mcp— hash-chained signed loga2a-governance-bridge-mcp— map A2A to compliance frameworksmeok-attestation-verify— independent cert verifier
License
MIT — MEOK AI Labs, 2026.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file agent_prompt_injection_firewall_mcp-1.0.0.tar.gz.
File metadata
- Download URL: agent_prompt_injection_firewall_mcp-1.0.0.tar.gz
- Upload date:
- Size: 7.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
21a81cfaf9f20d24071c36233a05cc3df4f4b1a9137dd6620a6a85298799e664
|
|
| MD5 |
57b029a87d7ff318628cceccfc2db2c3
|
|
| BLAKE2b-256 |
d7082e50b9e92a8c4ccd9c263248f181066e667c95c813a4965e5ffec652500f
|
File details
Details for the file agent_prompt_injection_firewall_mcp-1.0.0-py3-none-any.whl.
File metadata
- Download URL: agent_prompt_injection_firewall_mcp-1.0.0-py3-none-any.whl
- Upload date:
- Size: 9.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
23d92ae97db15df55c56100431b28b46fd28e9798ee6612f55adce6d23cc6c0c
|
|
| MD5 |
cca345473453a85d8f0c3abc56d29cc6
|
|
| BLAKE2b-256 |
935d712975f6b9dea399d3c410317f46b1f3d1b298acd92b3fca36cc66f90b05
|