Skip to main content

The WAF for agents. Pattern-based + heuristic firewall scans prompts, RAG documents, tool arguments, A2A payloads for OWASP LLM01 prompt injection BEFORE they reach a downstream agent. Curated from OWASP + academia + production incidents.

Project description

Agent Prompt Injection Firewall MCP

WAF for AI agents — block prompt injection before it reaches the LLM

Agents that blindly forward user input + retrieved documents to other agents are the #1 production AI vulnerability (OWASP LLM01). This MCP is the pre-flight gate.

By MEOK AI Labs.

Install

pip install agent-prompt-injection-firewall-mcp

Tools

  • scan_prompt
  • define_custom_rule
  • list_rules
  • scan_log
  • sign_firewall_attestation

Claude Desktop

{
  "mcpServers": {
    "agentpromptinjectionfirewall": { "command": "agent-prompt-injection-firewall-mcp" }
  }
}

Tiers

  • Free — generous daily limit (100-1,000 depending on operation)
  • Pro £199/mo — unlimited + signed HMAC attestations with public verify URLs — subscribe
  • Enterprise £1,499/mo — multi-tenant + custom predicate DSL + SIEM webhook push — subscribe

Why this exists

The EU AI Act (Aug 2026), DORA (live), ISO 42001, and OWASP LLM01 Top-10 all demand runtime controls for agent systems — not just deployment-time audits. This MCP is that runtime control layer, emitting cryptographically signed evidence your auditor accepts.

Related MEOK A2A MCPs

License

MIT — MEOK AI Labs, 2026.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agent_prompt_injection_firewall_mcp-1.0.0.tar.gz (7.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file agent_prompt_injection_firewall_mcp-1.0.0.tar.gz.

File metadata

File hashes

Hashes for agent_prompt_injection_firewall_mcp-1.0.0.tar.gz
Algorithm Hash digest
SHA256 21a81cfaf9f20d24071c36233a05cc3df4f4b1a9137dd6620a6a85298799e664
MD5 57b029a87d7ff318628cceccfc2db2c3
BLAKE2b-256 d7082e50b9e92a8c4ccd9c263248f181066e667c95c813a4965e5ffec652500f

See more details on using hashes here.

File details

Details for the file agent_prompt_injection_firewall_mcp-1.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for agent_prompt_injection_firewall_mcp-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 23d92ae97db15df55c56100431b28b46fd28e9798ee6612f55adce6d23cc6c0c
MD5 cca345473453a85d8f0c3abc56d29cc6
BLAKE2b-256 935d712975f6b9dea399d3c410317f46b1f3d1b298acd92b3fca36cc66f90b05

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page