Fleet-wide shared rate limiter for A2A + multi-MCP deployments. Most MCP servers rate-limit independently — a hostile agent hitting 10 MCPs gets 10x quota. This MCP is the shared counter: every MCP checks here before allowing a call. Sliding window + concurrency grants + signed enforcement attestations. By MEOK AI Labs.
Project description
Agent Rate Limiter MCP
Fleet-wide shared rate limiter for A2A + multi-MCP deployments.
Most MCP servers rate-limit independently. A hostile or runaway agent hitting 10 different MCPs gets 10× its quota. This MCP is the shared counter — every MCP in the fleet checks here before allowing a call.
By MEOK AI Labs.
Tools
acquire— request a rate-limit slot for (tenant, agent, operation). Returns{allowed, current, limit, retry_after_sec}.release— release an in-flight grantstatus— inspect current usage for a tenantset_quota— Pro: override default quota per (agent, operation)reset_counters— Pro: clear counters for emergency overridesign_rate_limit_attestation— Pro: cryptographically signed enforcement evidence
Use cases
- A2A orchestration where one buggy agent can DoS the stack
- Shared per-tenant quotas across multiple MCPs
- Pre-flight capacity check before expensive calls (LLM, external APIs)
- Fairness between concurrent agent pairs
- Regulator evidence: signed attestation proves you were enforcing quotas during an incident window
Install
pip install agent-rate-limiter-mcp
Claude Desktop
{
"mcpServers": {
"rate-limiter": { "command": "agent-rate-limiter-mcp" }
}
}
Example
# From your orchestrator MCP, before dispatching to worker-agent:
result = acquire(
tenant_id="acme-corp",
agent_id="orchestrator:supervisor:worker",
operation="llm_call",
window_sec=60,
weight=1,
)
if result["allowed"]:
# proceed with the call
do_the_thing()
release(tenant_id, agent_id, result["grant_id"])
else:
# back off for result["retry_after_sec"] seconds
...
Tiers
- Free — 100 acquire/day per caller, 60-second window
- Pro £199/mo — unlimited acquires + custom quotas + signed attestations — subscribe
- Enterprise £1,499/mo — multi-tenant + custom algorithms (token-bucket, leaky-bucket) + audit trail — subscribe
Related MEOK MCPs
agent-audit-logger-mcp— signed A2A call logagent-policy-enforcement-mcp— per-agent-pair IAMa2a-governance-bridge-mcp— map A2A to compliance frameworksmeok-attestation-verify— verify signed certs
License
MIT — MEOK AI Labs, 2026.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file agent_rate_limiter_mcp-1.0.0.tar.gz.
File metadata
- Download URL: agent_rate_limiter_mcp-1.0.0.tar.gz
- Upload date:
- Size: 6.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
754c05035182df803c21e0d92867d955035d2df4c1f92beac79c674248d39469
|
|
| MD5 |
ee84929ea73b4ed949dd774e8dc27db6
|
|
| BLAKE2b-256 |
f5845a8fef2101b8e4e58afa2fcc4646dcaec4420d6040c4ee413c242a97f565
|
File details
Details for the file agent_rate_limiter_mcp-1.0.0-py3-none-any.whl.
File metadata
- Download URL: agent_rate_limiter_mcp-1.0.0-py3-none-any.whl
- Upload date:
- Size: 8.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1a37539855f9defb01b7e69bc6092e97754b9d9695b0b0d8bf987aebef5c9f27
|
|
| MD5 |
de889edf2ea88fee4e6710f21bd8fcb9
|
|
| BLAKE2b-256 |
416b19f016a3d06c1cf3ca38fccc980c3cdb38d10f0be5ea3b40d6becad7f53c
|