Security middleware for MCP servers protecting LLM agents from prompt injection, resource exhaustion, and PII leakage
Project description
MCP-Bastion
One gateway; every tool call screened, metered, and proven.
Scope: Policy runs on MCP JSON-RPC (
tools/list,tools/call, resources) before your handlers execute. Use it together with transport security, identity, and least-privilege access outside this library.
Contents
| Link | What you will find |
|---|---|
| Overview | Product summary, request-flow diagram, release channels |
| Security | OWASP MCP Top 10 alignment, layered defense diagram, risk context, observability |
| Core features | Pillars, feature matrix, dashboard layout diagram |
| Documentation | Tutorials, policy, metrics, attacks |
| Installation | PyPI, npm, prerequisites, integrations |
| Repository layout | Directories and example files |
| Citing MCP-Bastion | Citation file, BibTeX, and acknowledgements |
| Changelog | Version history and release notes |
| Error codes | JSON-RPC codes -32001–-32016 and Python exceptions |
Overview
MCP-Bastion is policy-as-code middleware for the Model Context Protocol: prompt and content checks, PII handling, rate and cost limits, RBAC, optional OPA/Cedar, audit and hash chains, multi-tenant routing, red-team reporting, and an optional dashboard for metrics and forensics. Run it on your own hosts or in your VPC.
Packages: PyPI mcp-bastion-python, npm @mcp-bastion/core. Releases are published via GitHub Actions on tag push.
Request flow
Policy runs on MCP JSON-RPC before your handlers. Both tools/list and tools/call should traverse the same middleware when you enable list-side guards (for example tool_metadata_guard).
flowchart LR
subgraph client["MCP client"]
H["LLM / IDE / agent host"]
end
subgraph proc["Your MCP server process"]
B["MCP-Bastion\n(policy)"]
T["Tool & resource\nhandlers"]
end
H -->|"tools/list, tools/call, …"| B
B -->|allowed| T
B -.->|"blocked · audited"| H
Security context and controls
Industry discussion of MCP incidents (tool metadata abuse, over-privileged service accounts, supply chain) lines up with the OWASP MCP Top 10. Bastion maps product features to those categories in docs/OWASP_MCP_TOP10.md. For narrative context and suggested documentation wording, see docs/MCP_SECURITY_LANDSCAPE.md. Corrections and discussion: open a GitHub issue.
Defense in depth: MCP-Bastion sits in the MCP server process; pair it with strong transport and identity at the edge. Telemetry and audit hooks connect to your existing observability stack.
flowchart LR
E["Edge: TLS · JWT · mTLS"] --> M["MCP-Bastion\n(YAML policy)"]
M --> T["Your tool handlers"]
M -.-> O["Audit · OTEL ·\ntelemetry.sinks"]
With policy enabled and both tools/list and tools/call flowing through this middleware, many common abuse classes (including poisoned tool descriptions when tool_metadata_guard is enabled) are blocked or stripped before tools run; structured audit can go to your SIEM via telemetry.sinks (bastion.yaml.example).
Out of scope for middleware alone: Third-party RCE bugs, stolen build tokens, and organization-wide IAM still need vendor patches, sandboxes, vaults, and least privilege outside this library.
Observability: telemetry.sinks in bastion.yaml POST JSON to Datadog, New Relic, Splunk HEC, or any HTTPS intake (for example API Gateway, Azure Logic Apps, or GCP). For traces, see docs/OTEL.md.
MCP is JSON-RPC over stdio or HTTP. Install Bastion as middleware around your existing Python or TypeScript server so checks run in the same process as your tool handlers (typical overhead is on the order of a few milliseconds; see docs/METRICS.md). You keep business logic in your server; policy lives in bastion.yaml and optional code hooks.
Core features
Prompt injection (optional PromptGuard)
Local classifier on tool-related payloads when enabled; blocks many jailbreak-style patterns before tools run.
PII handling (optional Presidio)
Entity detection and masking on outbound tool results (redaction, substitution, or generalization).
Rate, circuit, and cost controls
Per-session iteration limits, timeouts, token budgets, circuit breaker, and cost tracker to cap runaway sessions.
Local execution
With local classifiers enabled, classification and redaction stay in-process; remote sinks are opt-in via telemetry.sinks.
Latency
Middleware-only path is designed for low overhead (see docs/METRICS.md).
SDK integration
Python and TypeScript MCP SDK patterns, including FastMCP-style stacks, without rewriting tool implementations.
All Features
| Feature | Description |
|---|---|
| Prompt injection | Block jailbreaks via Meta PromptGuard |
| PII redaction | Mask many entity types via Presidio (e.g. SSN, email, phone, credit card, passport, IBAN, medical license; see Presidio docs) |
| Rate limiting | Max iterations, timeout, token budget |
| Audit logging | Log who, what, when, blocked/allowed |
| Content filter | Block paths/code/URLs, plus allowlist and denylist patterns |
| Circuit breaker | Disable failing tools after N failures |
| RBAC | Tool-level permissions by role |
| Schema validation | Validate tool input types |
| Replay guard | Block duplicate nonces |
| Cost tracker | Per-session cost budget |
| Semantic cache | Cache similar queries |
| Semantic firewall | MCP-aware tool intent / dangerous-chain detection |
| Tool metadata guard | Scan tools/list responses (name, description, inputSchema) for poisoning; strip or block (tool_metadata_guard) |
| Sensitive classifier | Model-weighted detection of sensitive business content (beyond PII regex) |
| Tamper-evident audit | SHA-256 hash chain on forensic/audit exports; optional anchor webhooks |
| Behavior fingerprint | Per-session tool-sequence drift anomalies |
| FinOps attribution | Cost rollups by user, LLM provider, model, tool, dataset (BASTION_PRICING_OVERRIDES) |
| External policy | Optional OPA (Rego) or Cedar evaluation alongside YAML RBAC |
| Multi-tenant | One process; per-tenant bastion.yaml under multi_tenant.config_dir |
| Red-team CLI | mcp-bastion redteam: OWASP LLM plus MCP Top 10 tags and JSON report (mcp_top10_summary) |
| Telemetry sinks | telemetry.sinks: POST audits to Datadog, New Relic, Splunk, or any HTTPS intake (cloud and SIEM) |
| Zero-config OTEL | Auto-detect Grafana OTLP, Datadog agent, or AWS CloudWatch fallback (OTEL.md) |
Real-Time Dashboard and Alerts
Run the optional dashboard for a live view of requests, blocked count, PII redacted, cost, top tools, and recent alerts:
mcp-bastion dashboard --port 7000
# or: PYTHONPATH=src python dashboard/app.py
| URL | What it returns |
|---|---|
| http://localhost:7000/ | Command-center UI: KPIs, pillar health, traffic, FinOps charts (user / provider / model), tamper-evident audit head, tenant chips & filter, forensics + replay, auto-tune anomalies |
| http://localhost:7000/api/metrics | JSON metrics plus cost_attribution, tenants, audit_chain, auto_tune, tenant_view?tenant_id= |
| http://localhost:7000/api/audit/verify | POST body { "events": [...] } to verify exported audit hash chain |
| http://localhost:7000/api/health | {"status": "ok"} |
| http://localhost:7000/metrics | Prometheus text format for Grafana/Datadog |
Dashboard layout (conceptual)
flowchart TB
subgraph dash["MCP-Bastion dashboard · localhost:7000"]
K["KPIs · requests · blocked % · cost"]
P["Pillar health · latency · traffic"]
F["FinOps · provider · model · tenant"]
A["Audit chain head · forensics · replay"]
end
Run the server to see the live UI: KPIs, blocked-by-reason bars, top tools, cost by user, tenant filter, tamper-evident audit head, and recent alerts.
- Alerts: Slack webhook and cost-threshold alerts. See dashboard/README.md.
Documentation: Use Cases, Attacks, Metrics, Tutorials
| Doc | Description |
|---|---|
| docs/index.md | GitHub Pages-ready docs home |
| docs/DETAILED_TUTORIAL.md | Step-by-step implementation tutorial for new teams |
| docs/USE_CASES.md | Real use cases: enterprise gateway, LLM products, internal tools, SaaS, compliance |
| docs/ATTACK_PREVENTION.md | Examples showing how MCP-Bastion prevents real attacks (injection, PII leak, rate exhaustion, path traversal, RBAC, replay) |
| docs/METRICS.md | Performance overhead (<5ms) and effectiveness metrics (dashboard, Prometheus, OTEL) |
| docs/TUTORIALS.md | Tutorials: integrating with FastMCP, TypeScript, GitHub MCP, and open-source MCP servers |
| docs/GITHUB_PAGES.md | Publish docs as a GitHub Pages website from this same repo |
| docs/FEATURES.md | Consolidated enterprise & security feature matrix |
| docs/ERRORS.md | JSON-RPC error codes (-32001–-32016) and Python exceptions |
One-Line Docker
docker build -t mcp-bastion/proxy .
docker run -p 8080:8080 mcp-bastion/proxy
flowchart LR
H["Host :8080"] --> C["Container\n(Bastion + MCP)"]
C --> E["/mcp JSON-RPC"]
CFG["Mounted bastion.yaml"] -.-> C
MCP endpoint: http://localhost:8080/mcp. The image defaults to BASTION_CONFIG=/app/bastion.yaml.example (bundled). For production, mount your bastion.yaml and set BASTION_CONFIG to its path inside the container. Use docker compose up -d for the bundled docker-compose.yml; add --profile with-dashboard for the dashboard. See DOCKER.md.
Policy-as-Code (bastion.yaml)
Single config file controls all pillars. Copy bastion.yaml.example to bastion.yaml, then:
flowchart LR
Y["bastion.yaml\n(or BASTION_CONFIG)"] --> B["build_middleware_from_config()"]
B --> MW["MCPBastionMiddleware"]
from mcp_bastion import build_middleware_from_config
middleware = build_middleware_from_config()
Tip: set hot_reload.enabled: true in bastion.yaml to apply policy changes without restarting your MCP server when using build_middleware_from_config().
CLI for developers
mcp-bastion validate # validate bastion.yaml
mcp-bastion serve --http 8080 # run MCP server with config
mcp-bastion dashboard --port 7000 # run metrics dashboard
mcp-bastion redteam -c bastion.yaml -o redteam-report.json # security scorecard
See docs/CLI.md.
OpenTelemetry and observability
Explicit OTEL_EXPORTER_OTLP_ENDPOINT still works. Zero-config mode also picks up Grafana Cloud OTLP (GRAFANA_CLOUD_OTLP_*), probes the Datadog agent OTLP port, or emits AWS CloudWatch custom metrics when OTLP is unavailable. Install optional deps: pip install mcp-bastion-python[otel] (+ boto3 on AWS). See docs/OTEL.md.
Webhook alerts
Use Slack webhook, a single generic webhook (webhook_url or BASTION_WEBHOOK_URL), or multiple URLs (alerts.webhooks in bastion.yaml). Each blocked event can POST to your endpoint (e.g. PagerDuty, custom API). Webhook delivery now supports retry/backoff controls in bastion.yaml (retry_attempts, retry_backoff_seconds, retry_backoff_max_seconds, timeout_seconds).
Architectural notes
flowchart TB
subgraph local["Typical: in-process"]
MW["MCP-Bastion"] --> H["Handlers"]
end
subgraph alt["Optional: sidecar / proxy"]
TS["@mcp-bastion/core"] --> PG["Prompt / PII sidecar\n(MCP_BASTION_URL)"]
end
- In-process default: wrap MCP handlers in Python or TypeScript so policy runs before your tool code, without an extra network hop unless you deploy a proxy on purpose.
- Optional local models: PromptGuard and Presidio run on the host when those pillars are enabled and dependencies are installed.
- Session-scoped state: rate limits, replay nonces, and cost counters are keyed per session as defined in configuration.
- Policy surface: most controls are declared in
bastion.yaml; OPA, Cedar, and webhooks extend that for pipelines that already use those systems.
Structure
| Path | Description |
|---|---|
src/mcp_bastion/ |
Python package: PromptGuard, Presidio, rate limiting, RBAC, etc. |
packages/core/ |
TypeScript package: rate limiting in-process; prompt/PII via sidecar (MCP_BASTION_URL) |
examples/ |
Python examples (examples/README.md) |
dashboard/ |
Real-time dashboard UI and metrics API (dashboard/README.md) |
bastion.yaml.example |
Policy-as-code sample; copy to bastion.yaml (docs/POLICY_AS_CODE.md) |
scripts/validate_checklist.py |
Enterprise validation runner |
VALIDATION_CHECKLIST.md |
Validation guide and MCP Inspector steps |
SETUP_GUIDE.md |
Setup, config, and validation |
DOCKER.md |
Docker one-line run and compose |
Example Files
| File | Purpose |
|---|---|
examples/python_server_example.py |
Minimal middleware chain |
examples/full_demo.py |
All 11 features (rate limit, PII, RBAC, etc.) |
examples/advanced_features_demo.py |
Semantic firewall, sensitive classifier, session limits, tool metadata guard |
examples/owasp_security_showcase.py |
OWASP MCP Top 10–style controls (secrets, allowlist, edge auth, replay) |
examples/connect_any_mcp_tool_example.py |
Arbitrary tool names via await bastion(ctx, downstream) |
examples/policy_simulator_example.py |
Shadow policy replay (simulate_policy) |
examples/bastion.advanced.example.yaml |
Sample YAML for newer pillars |
examples/llm_server.py |
Shared MCP server for LLM clients |
examples/llm_openai_example.py |
OpenAI |
examples/llm_claude_example.py |
Claude |
examples/llm_gemini_example.py |
Gemini |
examples/llm_mistral_example.py |
Mistral |
examples/llm_grok_example.py |
Grok (xAI) |
examples/server_with_config.py |
Policy-as-code (bastion.yaml) |
Installation
Python
uv add mcp-bastion-python
# or
pip install mcp-bastion-python
# pinned latest
pip install mcp-bastion-python==1.0.15
Prerequisites (recommended)
- PII redaction: Presidio expects the spaCy English model. After install, run:
python -m spacy download en_core_web_sm
Without it, PII analysis can fail at runtime. - Policy-as-Code (
bastion.yaml): install YAML support:
pip install mcp-bastion-python[policy]
(addspyyaml; otherwise you may getImportErrorwhen loading policy files). - PromptGuard fail-open: if the PromptGuard model fails to load or inference errors, MCP-Bastion allows the request and logs a warning. Treat this as a security degradation and fix the model/runtime before production.
The PyPI wheel ships the full mcp_bastion tree (including config, cli, otel, dashboard metrics, and alert sinks). If you use an older wheel that omits modules, upgrade to the current release.
TypeScript
npm install @mcp-bastion/core
Framework Integrations
Drop-in security for your favorite LLM framework. Each package auto-installs mcp-bastion-python:
pip install mcp-bastion-langchain # LangChain agents and tools
pip install mcp-bastion-openai # OpenAI GPT API calls
pip install mcp-bastion-anthropic # Anthropic Claude API calls
pip install mcp-bastion-bedrock # AWS Bedrock runtime
pip install mcp-bastion-gemini # Google Gemini
pip install mcp-bastion-crewai # CrewAI agent crews
pip install mcp-bastion-llamaindex # LlamaIndex RAG pipelines
pip install mcp-bastion-groq # Groq inference
pip install mcp-bastion-mistral # Mistral AI
pip install mcp-bastion-cohere # Cohere
pip install mcp-bastion-azure # Azure OpenAI Service
pip install mcp-bastion-vertexai # Google Cloud Vertex AI
pip install mcp-bastion-huggingface # Hugging Face Inference
pip install mcp-bastion-deepseek # DeepSeek AI
pip install mcp-bastion-together # Together AI
pip install mcp-bastion-fireworks # Fireworks AI
pip install mcp-bastion-fastmcp # FastMCP servers
| Package | Protects | Version | Downloads |
|---|---|---|---|
| mcp-bastion-langchain | LangChain | 0.1.0 | stats |
| mcp-bastion-openai | OpenAI GPT | 0.1.0 | stats |
| mcp-bastion-anthropic | Anthropic Claude | 0.1.0 | stats |
| mcp-bastion-bedrock | AWS Bedrock | 0.1.0 | stats |
| mcp-bastion-gemini | Google Gemini | 0.1.0 | stats |
| mcp-bastion-crewai | CrewAI | 0.1.0 | stats |
| mcp-bastion-llamaindex | LlamaIndex | 0.1.0 | stats |
| mcp-bastion-groq | Groq | 0.1.0 | stats |
| mcp-bastion-mistral | Mistral AI | 0.1.0 | stats |
| mcp-bastion-cohere | Cohere | 0.1.0 | stats |
| mcp-bastion-azure | Azure OpenAI | 0.1.1 | stats |
| mcp-bastion-vertexai | Vertex AI | 0.1.0 | stats |
| mcp-bastion-huggingface | Hugging Face | 0.1.1 | stats |
| mcp-bastion-deepseek | DeepSeek AI | 0.1.1 | stats |
| mcp-bastion-together | Together AI | 0.1.1 | stats |
| mcp-bastion-fireworks | Fireworks AI | 0.1.1 | stats |
| mcp-bastion-fastmcp | FastMCP servers | 0.1.0 | stats |
Publish (PyPI / npm)
- PyPI:
python -m build && twine upload dist/*(or use GitHub Actions on tag). - npm: From repo root,
cd packages/core && npm publish --access public(or use Trusted Publishers). - Version is set in
pyproject.toml(Python),packages/core/package.json(npm), andserver.json(MCP registry). Bump before releasing.
Developer Guide
Integration examples for Python and TypeScript.
Quick Start (Python)
Add MCP-Bastion to an existing MCP server in three steps:
from mcp_bastion import MCPBastionMiddleware, compose_middleware
# 1. Create the security middleware
bastion = MCPBastionMiddleware(
enable_prompt_guard=True,
enable_pii_redaction=True,
enable_rate_limit=True,
)
# 2. Compose with your middleware chain (Bastion runs first)
middleware = compose_middleware(bastion)
# 3. Pass the composed middleware to your MCP server
# (integration depends on your server framework)
flowchart LR
B["MCPBastionMiddleware\n(outer: runs first)"] --> O["Other middleware"]
O --> S["Your MCP server"]
Examples:
| Example | Description |
|---|---|
examples/python_server_example.py |
Basic middleware chain |
examples/full_demo.py |
All features: add, PII, rate limit, prompt injection |
examples/llm_openai_example.py |
MCP server for OpenAI |
examples/llm_claude_example.py |
MCP server for Claude |
examples/llm_gemini_example.py |
MCP server for Gemini |
examples/llm_mistral_example.py |
MCP server for Mistral |
examples/llm_grok_example.py |
MCP server for Grok (xAI, HTTP only) |
# Windows: $env:PYTHONPATH="src"; python examples/full_demo.py
# Linux/Mac: PYTHONPATH=src python examples/full_demo.py
LLM integration: See docs/LLM_INTEGRATION.md for copy-paste config for OpenAI, Claude, Gemini, Mistral, and Grok.
Enterprise validation:
PYTHONPATH=src python scripts/validate_checklist.py
See VALIDATION_CHECKLIST.md and SETUP_GUIDE.md.
Python Tutorial: FastMCP Server
FastMCP server with MCP-Bastion.
Step 1: Install dependencies
pip install mcp mcp-bastion-python
Step 2: Create your server file (server.py)
from mcp.server.fastmcp import FastMCP
from mcp_bastion import MCPBastionMiddleware, compose_middleware
# Create the MCP server
mcp = FastMCP("My Secure Server")
# Create MCP-Bastion middleware
# It intercepts tool calls and resource reads before they execute
bastion = MCPBastionMiddleware(
enable_prompt_guard=True, # Block malicious prompts via PromptGuard
enable_pii_redaction=True, # Mask PII in outgoing content
enable_rate_limit=True, # Cap at 15 iterations, 60s timeout
)
# Compose middleware chain (pass to your server's middleware config if supported)
middleware = compose_middleware(bastion)
# Register a tool (protected when middleware is wired into your server)
@mcp.tool()
def get_weather(city: str) -> str:
"""Get weather for a city."""
return f"Weather in {city}: 22C, sunny"
# Resource (PII redacted)
@mcp.resource("user://profile/{user_id}")
def get_profile(user_id: str) -> str:
"""Get user profile. PII redacted."""
return f"User {user_id}: John Doe, SSN 123-45-6789, john@example.com"
if __name__ == "__main__":
mcp.run(transport="streamable-http")
Step 3: Run the server
python server.py
MCP-Bastion:
- Scans tool args for prompt injection
- Redacts PII from resource responses
- Blocks sessions over 15 calls or 60s
Alternative: Policy-as-Code
Use bastion.yaml instead of code. Copy bastion.yaml.example to bastion.yaml, then:
from mcp_bastion import build_middleware_from_config
middleware = build_middleware_from_config()
See docs/POLICY_AS_CODE.md and examples/server_with_config.py.
Python: Custom Rate Limits
Custom config example:
from mcp_bastion import MCPBastionMiddleware
from mcp_bastion.pillars.rate_limit import TokenBucketRateLimiter
from mcp_bastion.pillars.prompt_guard import PromptGuardEngine
# Stricter limits
rate_limiter = TokenBucketRateLimiter(
max_iterations=10,
timeout_seconds=30,
token_budget=25_000,
)
# Higher threshold = fewer blocks, more risk
prompt_guard = PromptGuardEngine(threshold=0.92)
bastion = MCPBastionMiddleware(
prompt_guard=prompt_guard,
rate_limiter=rate_limiter,
enable_prompt_guard=True,
enable_pii_redaction=True,
enable_rate_limit=True,
)
# Disable PII redaction if your data has no PII
bastion_no_pii = MCPBastionMiddleware(enable_pii_redaction=False)
Python: Custom Middleware
Extend Middleware to add logging, metrics, or custom logic:
from mcp_bastion.base import Middleware, MiddlewareContext, compose_middleware
class LoggingMiddleware(Middleware):
async def on_message(self, context, call_next):
result = await call_next(context)
# log method, elapsed, etc.
return result
middleware = compose_middleware(bastion, LoggingMiddleware())
See examples/full_demo.py for a complete example.
TypeScript: Wrap an MCP Server
Step 1: Install dependencies
npm install @modelcontextprotocol/sdk @mcp-bastion/core
Step 2: Create your server (server.ts)
import { Server } from "@modelcontextprotocol/sdk/server/index.js";
import { StdioServerTransport } from "@modelcontextprotocol/sdk/server/stdio.js";
import {
wrapWithMcpBastion,
wrapCallToolHandler,
} from "@mcp-bastion/core";
const server = new Server({ name: "my-mcp-server", version: "1.0.0" });
// Wrap the server with MCP-Bastion (rate limiting only by default)
// For prompt injection and PII, run the Python sidecar and set sidecarUrl
wrapWithMcpBastion(server, {
enableRateLimit: true,
maxIterations: 15,
timeoutMs: 60_000,
// Optional: enable ML features via Python sidecar
sidecarUrl: process.env.MCP_BASTION_SIDECAR || "",
enablePromptGuard: !!process.env.MCP_BASTION_SIDECAR,
enablePiiRedaction: !!process.env.MCP_BASTION_SIDECAR,
});
// Register tools (handlers are automatically wrapped)
server.setRequestHandler("tools/call" as any, async (request) => {
if (request.params?.name === "get_weather") {
return {
content: [{ type: "text", text: "Sunny, 22C" }],
isError: false,
};
}
throw new Error("Unknown tool");
});
async function main() {
const transport = new StdioServerTransport();
await server.connect(transport);
}
main();
Step 3: Run with rate limiting only
npx tsx server.ts
Step 4: Run with full ML features (Python sidecar)
For prompt injection and PII redaction, run a Python HTTP service that exposes /prompt-guard and /pii-redact endpoints (see the Python package for sidecar implementation). Then:
# Start the Python sidecar, then the TypeScript server
MCP_BASTION_SIDECAR=http://localhost:8000 npx tsx server.ts
TypeScript: Wrap Individual Handlers
Wrap specific handlers only:
import {
wrapCallToolHandler,
wrapReadResourceHandler,
} from "@mcp-bastion/core";
import {
CallToolRequestSchema,
ReadResourceRequestSchema,
} from "@modelcontextprotocol/sdk/types.js";
// Wrap only the tool handler
const safeToolHandler = wrapCallToolHandler(
async (request) => {
// Your tool logic
return { content: [{ type: "text", text: "OK" }], isError: false };
},
{ enableRateLimit: true, maxIterations: 10 }
);
// Wrap only the resource handler (for PII redaction)
const safeResourceHandler = wrapReadResourceHandler(
async (request) => {
const contents = await fetchResource(request.params.uri);
return { contents };
},
{ sidecarUrl: "http://localhost:8000", enablePiiRedaction: true }
);
server.setRequestHandler(CallToolRequestSchema, safeToolHandler);
server.setRequestHandler(ReadResourceRequestSchema, safeResourceHandler);
Configuration Reference
| Option | Python | TypeScript | Default | Description |
|---|---|---|---|---|
enable_prompt_guard |
Yes | Yes | True (Python) / False (TS) |
Block malicious prompts via PromptGuard |
enable_pii_redaction |
Yes | Yes | True (Python) / False (TS) |
Mask PII in outgoing content |
enable_rate_limit |
Yes | Yes | True |
Enforce iteration and timeout caps |
max_iterations |
Via TokenBucketRateLimiter |
Yes | 15 | Max tool calls per session |
timeout_seconds / timeoutMs |
Via TokenBucketRateLimiter |
Yes | 60 | Session timeout |
token_budget |
Via TokenBucketRateLimiter |
- | 50,000 | FinOps token cap per request |
sidecarUrl |
- | Yes | "" |
Python sidecar URL for ML features |
threshold |
Via PromptGuardEngine |
- | 0.85 | Malicious probability cutoff |
setLogLevel |
- | Yes | "info" |
TypeScript: "debug" | "info" | "warn" | "error" |
Error Handling
When MCP-Bastion blocks a request, it returns standard MCP/JSON-RPC errors:
| Code | Exception | When |
|---|---|---|
| -32001 | PromptInjectionError |
Tool args contain jailbreak/injection |
| -32002 | RateLimitExceededError |
Session exceeds iteration or timeout limit |
| -32003 | TokenBudgetExceededError |
Session exceeds token budget |
| -32004 | CircuitBreakerOpenError |
Tool’s circuit breaker is open after failures |
| -32005 | ContentFilterError |
Content filter matched a blocked pattern |
| -32006 | RBACError |
Caller not allowed to use this tool |
| -32007 | SchemaValidationError |
Tool arguments failed schema validation |
| -32008 | ReplayAttackError |
Duplicate nonce / replay detected |
| -32009 | CostBudgetExceededError |
Session cost budget exceeded |
# Python: exceptions
from mcp_bastion.errors import (
PromptInjectionError,
RateLimitExceededError,
TokenBudgetExceededError,
CircuitBreakerOpenError,
ContentFilterError,
RBACError,
SchemaValidationError,
ReplayAttackError,
CostBudgetExceededError,
)
import logging
logger = logging.getLogger(__name__)
try:
result = await middleware(context, call_next)
except (
PromptInjectionError,
RateLimitExceededError,
TokenBudgetExceededError,
CircuitBreakerOpenError,
ContentFilterError,
RBACError,
SchemaValidationError,
ReplayAttackError,
CostBudgetExceededError,
) as e:
logger.warning("blocked: %s", e.to_mcp_error())
// TypeScript: handlers return isError: true
import { logger, setLogLevel } from "@mcp-bastion/core";
setLogLevel("debug"); // optional: "debug" | "info" | "warn" | "error"
const result = await guardedHandler(request);
if (result.isError) {
logger.error("blocked", result.content);
}
Testing
MCP Inspector:
# Start your guarded server
python server.py # or: npx tsx server.ts
# In another terminal, launch the Inspector
npx -y @modelcontextprotocol/inspector
Connect via HTTP (http://localhost:8000/mcp) or stdio, then:
- List tools and call one with benign arguments (should succeed)
- Call a tool with "Ignore previous instructions" (should be blocked)
- Trigger 16+ tool calls in one session (should hit rate limit)
Testing
# Python (PYTHONPATH=src on Windows: $env:PYTHONPATH="src")
pytest tests/ -v
# TypeScript
npm run test --workspace=@mcp-bastion/core
# Full validation checklist (build, pillars, latency)
PYTHONPATH=src python scripts/validate_checklist.py
# MCP Inspector (manual)
npx -y @modelcontextprotocol/inspector
Third-Party Components
See NOTICE for licenses. MCP-Bastion uses Meta Llama Prompt Guard 2 (Llama 4 Community License) and Microsoft Presidio. For OWASP-relevant mitigations, dependency audit, and reporting vulnerabilities, see docs/SECURITY.md.
Citing MCP-Bastion
Use the repository CITATION.cff (Citation File Format). On GitHub, open the Cite this repository control on the repo home page to copy APA, BibTeX, or other formats derived from that file.
Plain text (example):
Khan, V. (2026). MCP-Bastion (Version 1.0.15) [Computer software]. https://github.com/vaquarkhan/MCP-Bastion
BibTeX (software entry; adjust version / year if you cite a specific release):
@software{khan_mcp_bastion_2026,
author = {Khan, Viquar},
title = {MCP-Bastion: Security middleware for the {Model Context Protocol}},
year = {2026},
version = {1.0.15},
url = {https://github.com/vaquarkhan/MCP-Bastion},
note = {Python package \texttt{mcp-bastion-python}; npm scope \texttt{@mcp-bastion/core}}
}
Non-commercial use of this project requires attribution consistent with LICENSE, including citation metadata when you publish work that builds on the software.
License
MCP-Bastion is distributed under the MCP-Bastion Community and Commercial License.
- Non-commercial use is permitted with required attribution/citation.
- Commercial use requires a separate paid agreement.
See:
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file mcp_bastion_python-1.0.15.tar.gz.
File metadata
- Download URL: mcp_bastion_python-1.0.15.tar.gz
- Upload date:
- Size: 158.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
970bed692fbfb0d335345a939200d2e9cd472270f847e036081b134c3d5cd888
|
|
| MD5 |
8015721322dde856d01ec0da6f4a912e
|
|
| BLAKE2b-256 |
9a4b3e039c7702d63f476f5cf90c604968d2b73665071a608305d4fe5b660037
|
Provenance
The following attestation bundles were made for mcp_bastion_python-1.0.15.tar.gz:
Publisher:
publish-mcp.yml on vaquarkhan/MCP-Bastion
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
mcp_bastion_python-1.0.15.tar.gz -
Subject digest:
970bed692fbfb0d335345a939200d2e9cd472270f847e036081b134c3d5cd888 - Sigstore transparency entry: 1353470739
- Sigstore integration time:
-
Permalink:
vaquarkhan/MCP-Bastion@acced0db0b5ee2dc38d3e66f47b2fcb00d59a8a6 -
Branch / Tag:
refs/tags/v1.0.15 - Owner: https://github.com/vaquarkhan
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-mcp.yml@acced0db0b5ee2dc38d3e66f47b2fcb00d59a8a6 -
Trigger Event:
push
-
Statement type:
File details
Details for the file mcp_bastion_python-1.0.15-py3-none-any.whl.
File metadata
- Download URL: mcp_bastion_python-1.0.15-py3-none-any.whl
- Upload date:
- Size: 163.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
da1395048184b7314e06fc81743e30df1242b50d712c4961ed239e01115b79ea
|
|
| MD5 |
bc4fad5e4608df953fc3bac1270c0326
|
|
| BLAKE2b-256 |
5d3672ef8ce639a08d6ac119e5410caaf1b9a224fa9bc4dfb05847e650e2c25c
|
Provenance
The following attestation bundles were made for mcp_bastion_python-1.0.15-py3-none-any.whl:
Publisher:
publish-mcp.yml on vaquarkhan/MCP-Bastion
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
mcp_bastion_python-1.0.15-py3-none-any.whl -
Subject digest:
da1395048184b7314e06fc81743e30df1242b50d712c4961ed239e01115b79ea - Sigstore transparency entry: 1353470822
- Sigstore integration time:
-
Permalink:
vaquarkhan/MCP-Bastion@acced0db0b5ee2dc38d3e66f47b2fcb00d59a8a6 -
Branch / Tag:
refs/tags/v1.0.15 - Owner: https://github.com/vaquarkhan
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-mcp.yml@acced0db0b5ee2dc38d3e66f47b2fcb00d59a8a6 -
Trigger Event:
push
-
Statement type: