The open-source MCP firewall for AI agents
Project description
Tessera
The open-source MCP firewall for AI agents
See Tessera block a destructive Cursor action in 60 seconds → cursor-hooks recipe
Tessera is the deterministic cost and blast-radius firewall for AI agents on AWS. Block expensive operations before they execute. Audit-grade. No false positives.
What's New in v0.2.0
- AWS MCP Server upstream (
kind: aws_mcp) — IAM-signed routing to the official AWS MCP server viamcp-proxy-for-aws. Install withpip install "cloudmorph-tessera[aws]". - 5 new semantic conditions —
predicted_cost,blast_radius,affected_resource_count,cumulative_spend_today,time_of_day_outside— enables cost-aware and blast-radius policies beyond simple argument matching. - Infracost integration — real-time cost estimation for AWS tool calls via the Infracost GraphQL API. Install with
pip install "cloudmorph-tessera[infracost]". - Gemini policy authoring —
tessera policy authorandtessera analyzecommands powered by Gemini 1.5 Pro. Install withpip install "cloudmorph-tessera[gemini]". - Intelligence client —
tessera intelligence pull <pack>fetches and verifies license-gated premium packs (Ed25519 signature, tier gating). Install withpip install "cloudmorph-tessera[intelligence]". - OIDC/JWT authentication — management-plane SSO via Clerk/Auth0/Cognito (OQ-2) and JWT mode for MCP traffic from Entra/Okta/Cognito agents.
AWS Quickstart
pip install "cloudmorph-tessera[aws,gemini,intelligence]"
Sample tessera.yaml for AWS MCP Server:
listen:
host: 127.0.0.1
port: 8080
auth:
type: bearer
policies:
dir: ./policies
mode: log_only
default_action: block
upstreams:
- name: aws
kind: aws_mcp
url: https://mcp.amazonaws.com
aws_region: us-east-1
# Credentials resolved via boto3 chain (env, ~/.aws, instance profile)
Start Tessera:
TESSERA_BEARER_TOKEN="tk_$(openssl rand -hex 16)" tessera serve --config tessera.yaml
Why Tessera
AI agents calling MCP tools can delete production data, exfiltrate secrets, and exceed cost caps — all in a single tool call your code never explicitly authorized. Tessera is an HTTP proxy that sits between the agent and every MCP server; every tools/call request is evaluated against a YAML policy set before it reaches the upstream. Decisions are written to a hash-chain audit log so tampering is detectable. The engine is pure Python — no OPA, no ML, no cloud credentials — so the policy outcome for a given input is always the same. 12 reference policies (7 generic + 5 AWS-illustrative) ship with the container; vendor-specific policies are available via Tessera Cloud premium packs.
Installation
Option 1: Docker (recommended for production)
docker pull ghcr.io/cloudmorphai/tessera:0.2.1
Option 2: Python package (for local development and CLI use)
pip install cloudmorph-tessera
After install, verify:
tessera version
# tessera 0.2.1
Docker is the primary path for users running Tessera as a service. PyPI is the path for users who want to author policies locally or run tessera policy lint / tessera policy test in CI.
5-minute quickstart
Primary path: pip + Cursor
# Step 1: Install
pipx install cloudmorph-tessera
# or: pip install cloudmorph-tessera (inside a venv)
# Step 2: Scaffold
tessera init
# Creates tessera.yaml (mode: log_only), policies/, .env.example in current directory
# Step 3: Start Tessera
# Default bind is 0.0.0.0:8080; use --bind to restrict to loopback if preferred
tessera serve --policy-dir ./policies --bind 127.0.0.1:8080
# Tessera HTTP MCP server is now listening on http://localhost:8080
# Step 4: Wire Cursor — see the "Wire up Cursor" section below
# Step 5: Verify policy decisions were logged
# The audit log is a SQLite file; check integrity with:
tessera audit verify --audit-path /var/lib/tessera/audit.db --scope default
# Adjust --audit-path if you changed audit.path in tessera.yaml
# Step 6: When ready, switch to enforcement mode
# Edit tessera.yaml: change mode: log_only -> mode: enforcement
# Restart Tessera. Block decisions now fire.
# IMPORTANT: If exposing Tessera beyond localhost, put it behind nginx/Caddy
# with a rate-limit rule. Native rate limiting is on the v0.2 roadmap.
Alternative path: Docker
# Step 1: Pull
docker pull ghcr.io/cloudmorphai/tessera:0.2.1
# Step 2: Scaffold
docker run --rm -v "$PWD:/out" ghcr.io/cloudmorphai/tessera:0.2.1 tessera init --dir /out
# Creates tessera.yaml (mode: log_only), policies/, .env.example
# Step 3: Start Tessera (log_only by default — safe to try, nothing is blocked yet)
docker run -d --name tessera \
-p 8080:8080 \
-v "$PWD/tessera.yaml:/etc/tessera/tessera.yaml:ro" \
-v "$PWD/policies:/etc/tessera/policies:ro" \
-v tessera_audit:/var/lib/tessera \
-e TESSERA_BEARER_TOKEN="tk_$(openssl rand -hex 16)" \
ghcr.io/cloudmorphai/tessera:0.2.1
# Step 4: Wire Cursor — see the "Wire up Cursor" section below
# Step 5: Verify a tool call was logged
docker exec tessera tessera audit verify --scope default
# Step 6: When ready, switch to enforcement
# Edit tessera.yaml: change mode: log_only -> mode: enforcement
# Restart Tessera. Now block decisions fire.
Wire up Cursor
With Tessera running (tessera serve --bind 127.0.0.1:8080), add Tessera as an MCP server in Cursor's config.
macOS / Linux
Edit ~/.cursor/mcp.json:
{
"mcpServers": {
"tessera": {
"type": "http",
"url": "http://localhost:8080/mcp"
}
}
}
Windows
Edit %USERPROFILE%\.cursor\mcp.json:
{
"mcpServers": {
"tessera": {
"type": "http",
"url": "http://localhost:8080/mcp"
}
}
}
Restart Cursor. Tessera should appear in the MCP indicator. All tool calls Cursor makes through Tessera are now subject to your policy bundle, with every decision recorded to the hash-chained audit log.
Tessera also ships a Cursor Hooks integration if you prefer the hooks-based wiring (fires on beforeMCPExecution / afterMCPExecution events):
tessera install-cursor-hooks
See recipes/cursor-hooks.md for a demo walkthrough.
What ships
- Multi-token bearer auth — inline env var, YAML file, or single legacy token; per-token scope isolates audit streams. See docs/CONFIGURATION.md.
- Three enforcement modes —
enforcement(blocks fire),log_only(advisory, always forwards),observation(engine skipped). See docs/CONFIGURATION.md. - 16-condition pure-Python policy engine —
arg_equals,arg_greater_than,arg_less_than,arg_matches_regex,arg_in_set,arg_contains_pattern,arg_size_greater_than,tool_name_in,action_class_in,intent_class_in,intent_purpose_matches,region_in,time_of_day_outside,meta_field_equals,any_of,none_of. See docs/POLICIES.md. - Hash-chain audit log — every event is chained to the previous via SHA-256;
tessera audit verifydetects any gap or tamper. Per-token scope isolation. See docs/AUDIT.md. - 12 reference policies (7 generic + 5 AWS-illustrative) — generic:
read-only-mode,prod-protection,secret-leak-block,pii-block,cost-cap,write-action-approval,data-residency-eu; AWS-illustrative:aws-ec2-cost-cap-EXAMPLE,aws-iam-blast-radius-EXAMPLE,aws-region-allowlist-EXAMPLE,aws-cost-runaway-stop-EXAMPLE,aws-bedrock-cost-ceiling-EXAMPLE. Vendor-specific policies (GitHub, Jira, OWASP, Postgres, Salesforce, Slack) are available via Tessera Cloud premium packs. See Policy Catalog and docs/POLICIES.md. - Per-file reload error isolation — a bad YAML file is skipped and logged; the rest of the policy set remains live. See docs/CONFIGURATION.md.
- Regex safety (ReDoS defense) — all regex conditions are evaluated via the
regexlibrary with a 100 ms timeout; a timeout returnsfalseand tags the audit event. See docs/POLICIES.md. - Intent-blind agent support — agents that do not declare intent in
_meta.tessera_intentare handled by tool-name and argument policies.intent.required: falseis the default. See docs/INTEGRATIONS.md. - CLI —
tessera serve,tessera audit verify,tessera policy test,tessera policy lint,tessera version,tessera init. See docs/CONFIGURATION.md. - Multi-stage Docker image — builder + slim runtime; runs as UID 10001 (non-root). See docs/INSTALL.md.
- Three pluggable Protocols —
Authenticator,PolicyLoader,AuditSinkare resolved via importlib at startup; swap implementations without modifying core code. See tessera/pluggable.py.
Policy Catalog
Tessera v0.2.1 ships 12 reference policies out of the box (7 generic + 5 AWS-illustrative). Drop any of them into your --policy-dir to opt in. All policies are simple YAML and easy to fork. Vendor-specific policies (GitHub, Jira, OWASP, Postgres, Salesforce, Slack) are in the Tessera Cloud premium pack.
Generic (7)
| Policy | Effect |
|---|---|
prod-protection.yaml |
Block destructive write operations when targeting production resources (env=production/prod or resource name matching prod-*) |
secret-leak-block.yaml |
Block tool calls where arguments appear to contain API keys or tokens |
pii-block.yaml |
Block tool calls with arguments matching PII patterns (SSN, credit card numbers) |
cost-cap.yaml |
Block tool calls that exceed per-request cost thresholds |
read-only-mode.yaml |
Allow only read operations; block everything else |
write-action-approval.yaml |
Require human approval for all write and delete operations |
data-residency-eu.yaml |
Ensure data operations stay within EU regions |
AWS-illustrative policies (5)
| Policy | Effect |
|---|---|
aws-ec2-cost-cap-EXAMPLE.yaml |
Block EC2 RunInstances calls predicted to cost more than $50/hr |
aws-iam-blast-radius-EXAMPLE.yaml |
Block IAM PutRolePolicy/AttachRolePolicy affecting more than 100 principals |
aws-region-allowlist-EXAMPLE.yaml |
Block operations outside EU regions (data-residency enforcement) |
aws-cost-runaway-stop-EXAMPLE.yaml |
Halt all cost-incurring calls when cumulative daily spend exceeds $500 |
aws-bedrock-cost-ceiling-EXAMPLE.yaml |
Block Bedrock InvokeModel calls with ceiling cost above $1.50 |
These require predicted_cost / blast_radius / cumulative_spend_today condition support from the Tessera Cloud aws-cost-aware-defaults premium pack. In log_only mode they are safe to try without the premium pack (unknown conditions fail-open).
Vendor-specific policies (premium pack)
The 7 vendor-specific policies (GitHub, Jira, OWASP prompt injection, OWASP tool poisoning, Postgres, Salesforce, Slack) are available in the Tessera Cloud premium pack vendor-mcp-protection. Access via tessera intelligence pull vendor-mcp-protection.
See policies/README.md for the full schema and authoring guide.
How it works
Agent --> [Tessera: auth --> engine --> audit] --> Upstream MCP
Every inbound POST /mcp/{upstream} is:
- Authenticated — bearer token matched against configured tokens;
AuthContext.scopeassigned. - Evaluated — policy engine walks the sorted policy set (first-match-wins) and returns
allow,block,log_only, orrequire_approval. - Audited — the decision (and response, if forwarded) is written to the hash-chain.
In enforcement mode a block decision returns a JSON-RPC error (code -32603) over HTTP 200 to the agent and does not touch the upstream. In log_only mode the upstream is always called and the decision is returned in response headers (X-Tessera-Decision, X-Tessera-Policy-Id, X-Tessera-Reason).
Source code is under tessera/; contributor notes in CONTRIBUTING.md.
Configuration at a glance
listen:
host: 0.0.0.0
port: 8080
auth:
type: bearer
policies:
dir: /etc/tessera/policies
reload: watch # watch | sighup | none
mode: log_only # enforcement | log_only | observation
default_action: block
upstreams:
- name: aws
url: https://mcp.aws.example.com
credentials:
header: Authorization
value: "Bearer ${AWS_MCP_TOKEN}" # resolved from environment at startup
Full reference: docs/CONFIGURATION.md. Annotated example: tessera.example.yaml.
Authoring policies
id: block-delete-prod
name: Block Delete in Production
description: Block delete calls targeting prod-suffixed resources.
match:
upstream: "*"
when:
- condition: action_class_in
values: ["write.delete"]
- condition: arg_matches_regex
arg: resource_name
pattern: ".*-prod$"
action: block
reason: "Delete blocked on production resource"
priority: 90
Policies are one YAML file per rule in the directory set by policies.dir. Files prefixed with _ are skipped. The engine evaluates policies in descending priority order; the first matching policy wins. when: [] (empty) matches every call.
Test before deploying:
tessera policy lint --policy-dir policies/
tessera policy test --policy-dir policies/ --fixture-dir tests/fixtures/
Full condition catalog and fixture format: docs/POLICIES.md.
Routing your AI agent through Tessera (CLAUDE.md / system-prompt pattern)
Adding Tessera as one of many available MCP servers isn't enough — your agent will often prefer the direct cloud MCP server because it sees that one too. To make Tessera the default route for cloud tool calls, instruct the agent in its system context.
For Claude Code, drop a CLAUDE.md at your project root (or ~/.claude/CLAUDE.md for global default):
# Tool routing — use Tessera as the MCP firewall
When this project calls MCP tools that touch cloud resources (AWS, GCP, Azure,
Databricks, Snowflake, GitHub, Slack, Postgres, Kubernetes):
- **Always prefer the `tessera` MCP server** if the same tool is reachable
through it. Tessera enforces deterministic policy + writes a hash-chained
audit log of every call.
- If a tool is only available via a direct cloud MCP server, **stop and ask
the user before proceeding** — don't silently bypass the firewall.
- Read-only operations (list, describe, get) typically pass through normally.
- Destructive operations (delete, terminate, drop, force-push) WILL be blocked
by the shipped reference policies if they touch prod resources. When the
block response carries `error.data._meta.tessera_audit_event_id`, surface
the policy reason to the user verbatim.
For Cursor, equivalent goes in .cursorrules at project root, or in user-level Cursor settings. For Claude Desktop, put it in the global system prompt via Settings → "Personalization".
This pattern is the difference between "a firewall the user must remember to use" and "a firewall the agent uses by default." Combined with the 14 reference policies, it gives you defense-in-depth without per-call vigilance.
See docs/INTEGRATIONS.md for per-client config recipes (Cursor, Claude Code, Claude Desktop).
Tessera Cloud
Want hosted? Multi-tenant? SSO? Compliance evidence export? Tessera Cloud is the same engine with hosted orchestration. The same Authenticator, PolicyLoader, and AuditSink Protocols are used — the implementations are swapped (e.g., DynamoDBPolicyLoader instead of FilesystemPolicyLoader). Your existing tessera.yaml and policy files work without changes when you migrate. https://cloudmorph.ai
Roadmap
Deferred from v0.1; detail and rationale in docs/ROADMAP.md.
- OAuth 2.1 PKCE — v0.2; needed for SaaS/CI deployments where the identity issuer is a third-party IdP.
- Native rate limiting — v0.2; per-token token bucket; workaround in v0.1 is nginx/Caddy in front.
- Postgres audit sink — v0.2; the
AuditSinkProtocol is already designed for it; SQLite covers v0.1 write volume. - stdio transport — v0.2; for Claude Desktop and agent runtimes that launch MCP servers as subprocesses.
- Rego escape hatch — v0.2; gated on a concrete use case the YAML condition catalog cannot express.
- Multi-tenant isolation — not planned for OSS; available in Tessera Cloud.
FAQ
Does Tessera work with Claude Desktop?
Tessera v0.2.1 is HTTP-mode only. Claude Desktop free tier supports stdio MCP servers only, so Tessera v0.2.1 won't appear there. Claude Desktop Pro / Max / Team / Enterprise plans support Custom Connectors, which can talk to Tessera via the same http://localhost:8080/mcp endpoint Cursor uses.
A stdio adapter is on the v0.3.0 roadmap so Claude Desktop free-tier users can also use Tessera without a paid plan. Track it in issues.
Contributing
See CONTRIBUTING.md. Run pip install -e ".[dev]" and pre-commit install to get started.
License
Apache-2.0. See LICENSE.
Security
Report vulnerabilities privately via SECURITY.md.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cloudmorph_tessera-0.2.1.tar.gz.
File metadata
- Download URL: cloudmorph_tessera-0.2.1.tar.gz
- Upload date:
- Size: 124.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8fff460a12dab9a822013dc79a4daac3f8ec4507bb9db74e1ef46764b9f0d7de
|
|
| MD5 |
da2a029ba222c52ac2346dfca183a430
|
|
| BLAKE2b-256 |
93dc87270b0def0f4fa3d2baa0a77aee7d04bd4e5f82a8bd45e4203b1d44da75
|
File details
Details for the file cloudmorph_tessera-0.2.1-py3-none-any.whl.
File metadata
- Download URL: cloudmorph_tessera-0.2.1-py3-none-any.whl
- Upload date:
- Size: 146.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
9ebc53aa4ff8e0127d0da63bc35049a21e7320b0507ad1d56e526c2ef24afed1
|
|
| MD5 |
ec4c830d6e4c10f7a2b2170efec988c3
|
|
| BLAKE2b-256 |
073f8bb7cf919c75324f92a63e4ad7c9571cfd37e2529b4f24e79e2c0192931e
|