The open-source MCP firewall for AI agents
Project description
Tessera
The open-source MCP firewall for AI agents
See Tessera block a destructive Cursor action in 60 seconds → cursor-hooks recipe
Why Tessera
AI agents calling MCP tools can delete production data, exfiltrate secrets, and exceed cost caps — all in a single tool call your code never explicitly authorized. Tessera is an HTTP proxy that sits between the agent and every MCP server; every tools/call request is evaluated against a YAML policy set before it reaches the upstream. Decisions are written to a hash-chain audit log so tampering is detectable. The engine is pure Python — no OPA, no ML, no cloud credentials — so the policy outcome for a given input is always the same. The 14 policies (7 core reference + 7 integration-specific) ship with the container; core policies are the same ones sold separately by other vendors.
Installation
Option 1: Docker (recommended for production)
docker pull ghcr.io/cloudmorphai/tessera:0.1.1
Option 2: Python package (for local development and CLI use)
pip install cloudmorph-tessera
After install, verify:
tessera version
# tessera 0.1.1
Docker is the primary path for users running Tessera as a service. PyPI is the path for users who want to author policies locally or run tessera policy lint / tessera policy test in CI.
5-minute quickstart
# Step 1: Pull
docker pull ghcr.io/cloudmorphai/tessera:0.1.1
# Step 2: Scaffold
docker run --rm -v "$PWD:/out" ghcr.io/cloudmorphai/tessera:0.1.1 tessera init --dir /out
# Creates tessera.yaml (mode: log_only), policies/, .env.example
# Step 3: Edit tessera.yaml — change upstreams[].url to your real MCP server URL
# Step 4: Start Tessera (log_only by default — safe to try, nothing is blocked yet)
docker run -d --name tessera \
-p 8080:8080 \
-v "$PWD/tessera.yaml:/etc/tessera/tessera.yaml:ro" \
-v "$PWD/policies:/etc/tessera/policies:ro" \
-v tessera_audit:/var/lib/tessera \
-e TESSERA_BEARER_TOKEN="tk_$(openssl rand -hex 16)" \
ghcr.io/cloudmorphai/tessera:0.1.1
# Step 5: Wire your agent — add to ~/.cursor/mcp.json:
# {
# "mcpServers": {
# "aws-via-tessera": {
# "url": "http://localhost:8080/mcp/aws",
# "headers": {"Authorization": "Bearer <your-token>"}
# }
# }
# }
# See docs/INTEGRATIONS.md for Claude Code, Claude Desktop, Windsurf.
# Step 6: Verify a tool call was logged
docker exec tessera tessera audit verify --scope default
# Step 7: When ready, switch to enforcement
# Edit tessera.yaml: change mode: log_only -> mode: enforcement
# Restart Tessera. Now block decisions fire.
# IMPORTANT: If exposing Tessera beyond localhost, put it behind nginx/Caddy
# with a rate-limit rule. Native rate limiting is on the v0.2 roadmap.
What ships
- Multi-token bearer auth — inline env var, YAML file, or single legacy token; per-token scope isolates audit streams. See docs/CONFIGURATION.md.
- Three enforcement modes —
enforcement(blocks fire),log_only(advisory, always forwards),observation(engine skipped). See docs/CONFIGURATION.md. - 16-condition pure-Python policy engine —
arg_equals,arg_greater_than,arg_less_than,arg_matches_regex,arg_in_set,arg_contains_pattern,arg_size_greater_than,tool_name_in,action_class_in,intent_class_in,intent_purpose_matches,region_in,time_of_day_outside,meta_field_equals,any_of,none_of. See docs/POLICIES.md. - Hash-chain audit log — every event is chained to the previous via SHA-256;
tessera audit verifydetects any gap or tamper. Per-token scope isolation. See docs/AUDIT.md. - 14 policies — 7 core reference policies (
read-only-mode,prod-protection,secret-leak-block,pii-block,cost-cap,write-action-approval,data-residency-eu) and 7 integration-specific protection policies (github-mcp-protection,jira-mcp-protection,owasp-mcp-prompt-injection,owasp-mcp-tool-poisoning,postgres-mcp-protection,salesforce-mcp-protection,slack-mcp-protection). See docs/POLICIES.md. - Per-file reload error isolation — a bad YAML file is skipped and logged; the rest of the policy set remains live. See docs/CONFIGURATION.md.
- Regex safety (ReDoS defense) — all regex conditions are evaluated via the
regexlibrary with a 100 ms timeout; a timeout returnsfalseand tags the audit event. See docs/POLICIES.md. - Intent-blind agent support — agents that do not declare intent in
_meta.tessera_intentare handled by tool-name and argument policies.intent.required: falseis the default. See docs/INTEGRATIONS.md. - CLI —
tessera serve,tessera audit verify,tessera policy test,tessera policy lint,tessera version,tessera init. See docs/CONFIGURATION.md. - Multi-stage Docker image — builder + slim runtime; runs as UID 10001 (non-root). See docs/INSTALL.md.
- Three pluggable Protocols —
Authenticator,PolicyLoader,AuditSinkare resolved via importlib at startup; swap implementations without modifying core code. See tessera/pluggable.py.
How it works
Agent --> [Tessera: auth --> engine --> audit] --> Upstream MCP
Every inbound POST /mcp/{upstream} is:
- Authenticated — bearer token matched against configured tokens;
AuthContext.scopeassigned. - Evaluated — policy engine walks the sorted policy set (first-match-wins) and returns
allow,block,log_only, orrequire_approval. - Audited — the decision (and response, if forwarded) is written to the hash-chain.
In enforcement mode a block decision returns a JSON-RPC error (code -32603) over HTTP 200 to the agent and does not touch the upstream. In log_only mode the upstream is always called and the decision is returned in response headers (X-Tessera-Decision, X-Tessera-Policy-Id, X-Tessera-Reason).
Source code is under tessera/; contributor notes in CONTRIBUTING.md.
Configuration at a glance
listen:
host: 0.0.0.0
port: 8080
auth:
type: bearer
policies:
dir: /etc/tessera/policies
reload: watch # watch | sighup | none
mode: log_only # enforcement | log_only | observation
default_action: block
upstreams:
- name: aws
url: https://mcp.aws.example.com
credentials:
header: Authorization
value: "Bearer ${AWS_MCP_TOKEN}" # resolved from environment at startup
Full reference: docs/CONFIGURATION.md. Annotated example: tessera.example.yaml.
Authoring policies
id: block-delete-prod
name: Block Delete in Production
description: Block delete calls targeting prod-suffixed resources.
match:
upstream: "*"
when:
- condition: action_class_in
values: ["write.delete"]
- condition: arg_matches_regex
arg: resource_name
pattern: ".*-prod$"
action: block
reason: "Delete blocked on production resource"
priority: 90
Policies are one YAML file per rule in the directory set by policies.dir. Files prefixed with _ are skipped. The engine evaluates policies in descending priority order; the first matching policy wins. when: [] (empty) matches every call.
Test before deploying:
tessera policy lint --policy-dir policies/
tessera policy test --policy-dir policies/ --fixture-dir tests/fixtures/
Full condition catalog and fixture format: docs/POLICIES.md.
Routing your AI agent through Tessera (CLAUDE.md / system-prompt pattern)
Adding Tessera as one of many available MCP servers isn't enough — your agent will often prefer the direct cloud MCP server because it sees that one too. To make Tessera the default route for cloud tool calls, instruct the agent in its system context.
For Claude Code, drop a CLAUDE.md at your project root (or ~/.claude/CLAUDE.md for global default):
# Tool routing — use Tessera as the MCP firewall
When this project calls MCP tools that touch cloud resources (AWS, GCP, Azure,
Databricks, Snowflake, GitHub, Slack, Postgres, Kubernetes):
- **Always prefer the `tessera` MCP server** if the same tool is reachable
through it. Tessera enforces deterministic policy + writes a hash-chained
audit log of every call.
- If a tool is only available via a direct cloud MCP server, **stop and ask
the user before proceeding** — don't silently bypass the firewall.
- Read-only operations (list, describe, get) typically pass through normally.
- Destructive operations (delete, terminate, drop, force-push) WILL be blocked
by the shipped reference policies if they touch prod resources. When the
block response carries `error.data._meta.tessera_audit_event_id`, surface
the policy reason to the user verbatim.
For Cursor, equivalent goes in .cursorrules at project root, or in user-level Cursor settings. For Claude Desktop, put it in the global system prompt via Settings → "Personalization".
This pattern is the difference between "a firewall the user must remember to use" and "a firewall the agent uses by default." Combined with the 14 reference policies, it gives you defense-in-depth without per-call vigilance.
See docs/INTEGRATIONS.md for per-client config recipes (Cursor, Claude Code, Claude Desktop).
Tessera Cloud
Want hosted? Multi-tenant? SSO? Compliance evidence export? Tessera Cloud is the same engine with hosted orchestration. The same Authenticator, PolicyLoader, and AuditSink Protocols are used — the implementations are swapped (e.g., DynamoDBPolicyLoader instead of FilesystemPolicyLoader). Your existing tessera.yaml and policy files work without changes when you migrate. https://cloudmorph.ai
Roadmap
Deferred from v0.1; detail and rationale in docs/ROADMAP.md.
- OAuth 2.1 PKCE — v0.2; needed for SaaS/CI deployments where the identity issuer is a third-party IdP.
- Native rate limiting — v0.2; per-token token bucket; workaround in v0.1 is nginx/Caddy in front.
- Postgres audit sink — v0.2; the
AuditSinkProtocol is already designed for it; SQLite covers v0.1 write volume. - stdio transport — v0.2; for Claude Desktop and agent runtimes that launch MCP servers as subprocesses.
- Rego escape hatch — v0.2; gated on a concrete use case the YAML condition catalog cannot express.
- Multi-tenant isolation — not planned for OSS; available in Tessera Cloud.
Contributing
See CONTRIBUTING.md. Run pip install -e ".[dev]" and pre-commit install to get started.
License
Apache-2.0. See LICENSE.
Security
Report vulnerabilities privately via SECURITY.md.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cloudmorph_tessera-0.1.1.tar.gz.
File metadata
- Download URL: cloudmorph_tessera-0.1.1.tar.gz
- Upload date:
- Size: 47.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
faacc989b45f29ecbb211ba8a43ce3d753859f975e5a4ce2cb7eefbfe234bf43
|
|
| MD5 |
82289609da6a504d2cba4ac2f9182008
|
|
| BLAKE2b-256 |
85e2429ef81be0d16272ef39d6c5c92d0506b7484a653af87186eb41aa3080f2
|
File details
Details for the file cloudmorph_tessera-0.1.1-py3-none-any.whl.
File metadata
- Download URL: cloudmorph_tessera-0.1.1-py3-none-any.whl
- Upload date:
- Size: 56.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ecd7fa8f7c1acb3921ef82b9b8ace8143d75da4147945c6cc8645b15a642d83f
|
|
| MD5 |
4c209fe77fd2f3fa09fd31d5bd6c1e8f
|
|
| BLAKE2b-256 |
e87fad01ac9a5e89eba715a700d6bfa74f4b262234d4548191b2f63529e9742a
|