Skip to main content

MCP Server for Claude Desktop - Agent OS kernel primitives including code safety verification, CMVK multi-model review, and IATP trust

Project description

MCP Kernel Server

Native Safety for Claude Desktop - Agent OS kernel primitives via Model Context Protocol (MCP)

This server exposes Agent OS capabilities through MCP, enabling Claude Desktop and other MCP-compatible clients to use kernel-level AI agent governance.

The Problem

Claude generates code without safety guarantees. It can suggest:

  • DROP TABLE users - deleting production data
  • Hardcoded API keys and secrets
  • rm -rf / - destructive file operations

The Solution

Agent OS MCP Server provides safety verification that Claude calls before executing code:

[Claude generates code]
        ↓
[Calls verify_code_safety tool]
        ↓
[Agent OS returns: BLOCKED - Destructive SQL]
        ↓
[Claude explains why and suggests safer alternative]

Quick Start

Claude Desktop Integration (60 seconds)

  1. Install the server:
pip install agent-os[mcp]
  1. Add to Claude Desktop config:

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json Windows: %APPDATA%\Claude\claude_desktop_config.json

{
  "mcpServers": {
    "agent-os": {
      "command": "mcp-kernel-server",
      "args": ["--stdio"]
    }
  }
}
  1. Restart Claude Desktop. You now have access to 8 safety tools!

Available Tools

verify_code_safety - Code Safety Check ⭐ NEW

The primary tool for Claude Desktop. Checks if code is safe before execution.

{
  "name": "verify_code_safety",
  "arguments": {
    "code": "await db.query('DROP TABLE users')",
    "language": "javascript"
  }
}

Returns:

{
  "safe": false,
  "violations": [
    {
      "rule": "drop_table",
      "severity": "critical",
      "message": "Destructive SQL: DROP operation detected",
      "alternative": "Consider using soft delete or archiving instead of DROP"
    }
  ],
  "blocked_reason": "Destructive SQL: DROP operation detected"
}

cmvk_review - Multi-Model Code Review ⭐ NEW

Review code across multiple AI models for bugs, security, and best practices.

{
  "name": "cmvk_review",
  "arguments": {
    "code": "function processPayment(userId, amount) {...}",
    "language": "javascript",
    "focus": ["security", "bugs"]
  }
}

Returns:

{
  "consensus": 0.67,
  "reviews": [
    {"model": "gpt-4", "passed": true, "issues": []},
    {"model": "claude-sonnet-4", "passed": false, "issues": [...]},
    {"model": "gemini-pro", "passed": true, "issues": []}
  ],
  "recommendation": "Based on multi-model review:\n1. Missing error handling..."
}

get_audit_log - Retrieve Audit Trail ⭐ NEW

Get the safety audit trail for compliance and debugging.

{
  "name": "get_audit_log",
  "arguments": {
    "limit": 20,
    "filter": {"type": "blocked"}
  }
}

cmvk_verify - Cross-Model Claim Verification

Verify claims across multiple AI models to detect hallucinations.

{
  "name": "cmvk_verify",
  "arguments": {
    "claim": "The capital of France is Paris",
    "threshold": 0.85
  }
}

kernel_execute - Governed Execution

Execute actions through the kernel with policy enforcement.

{
  "name": "kernel_execute",
  "arguments": {
    "action": "database_query",
    "params": {"query": "SELECT * FROM users"},
    "agent_id": "analyst-001",
    "policies": ["read_only", "no_pii"]
  }
}

iatp_sign - Trust Attestation

Sign agent outputs for inter-agent trust.

iatp_verify - Trust Verification

Verify trust before agent-to-agent communication.

iatp_reputation - Reputation Network

Query or modify agent reputation.

Demo: Using with Claude Desktop

After installation, try this in Claude Desktop:

You: "Write a script to clean up old user data"

Claude: (generates code, then calls verify_code_safety)

Agent OS returns: BLOCKED - Destructive SQL detected

Claude: "I generated the code, but Agent OS blocked it for safety. The DELETE statement would remove data permanently. Here's a safer approach using soft deletes..."

Available Resources

URI Template Description
vfs://{agent_id}/mem/working/{key} Ephemeral working memory
vfs://{agent_id}/mem/episodic/{session} Experience logs
vfs://{agent_id}/policy/{name} Policies (read-only)
audit://{agent_id}/log Audit trail (read-only)

Available Prompts

governed_agent

Instructions for operating as a governed agent.

verify_claim

Template for CMVK verification.

safe_execution

Template for safe action execution.

Stateless Design (MCP June 2026 Compliant)

This server is stateless by design for horizontal scaling:

  • ✅ No session state maintained
  • ✅ All context passed in each request
  • ✅ State externalized to backend storage
  • ✅ Horizontally scalable

Configuration Options

mcp-kernel-server --stdio                    # Claude Desktop (default)
mcp-kernel-server --http --port 8080         # Development
mcp-kernel-server --policy-mode strict       # Policy mode: strict|permissive|audit
mcp-kernel-server --cmvk-threshold 0.90      # CMVK confidence threshold

Development Mode

# HTTP transport for testing
mcp-kernel-server --http --port 8080

# List available tools
mcp-kernel-server --list-tools

# List available prompts
mcp-kernel-server --list-prompts

Python Integration

from mcp import ClientSession

async with ClientSession() as session:
    await session.connect("http://localhost:8080")
    
    # Verify code safety
    result = await session.call_tool("verify_code_safety", {
        "code": "import os; os.system('rm -rf /')",
        "language": "python"
    })
    print(result["safe"])  # False
    
    # Multi-model code review
    result = await session.call_tool("cmvk_review", {
        "code": "...",
        "focus": ["security", "bugs"]
    })

Part of Agent OS

This MCP server is part of the Agent OS ecosystem:

  • Kernel-level safety - Not just prompts, real enforcement
  • POSIX-style signals - SIGKILL, SIGSTOP, SIGCONT for agents
  • Cross-model verification - Consensus across GPT-4, Claude, Gemini
  • Zero violations - Deterministic policy enforcement

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mcp_kernel_server-1.2.0.tar.gz (24.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mcp_kernel_server-1.2.0-py3-none-any.whl (24.3 kB view details)

Uploaded Python 3

File details

Details for the file mcp_kernel_server-1.2.0.tar.gz.

File metadata

  • Download URL: mcp_kernel_server-1.2.0.tar.gz
  • Upload date:
  • Size: 24.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.9

File hashes

Hashes for mcp_kernel_server-1.2.0.tar.gz
Algorithm Hash digest
SHA256 86eea16eebb3de612d3c0aeb10136b79cefe52919a892b7bbee0e2528ecb1e51
MD5 7e6095a71bd90ec2bb14a5c4e4158a59
BLAKE2b-256 9c308fbfaa55acea81cb97759a6784fbd8d719f276b411f4edf32af3dbc4e9ea

See more details on using hashes here.

File details

Details for the file mcp_kernel_server-1.2.0-py3-none-any.whl.

File metadata

File hashes

Hashes for mcp_kernel_server-1.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 c6bed41dec0884f19ccefa89f0caff22d3a58320528ae02022f5f46797a7fd8a
MD5 738b9ed0d737bbd57e3a2abb7111cdf4
BLAKE2b-256 7374748b3115aafeab7d41b632212e5156af7163a4758a5a34f512df0848fc55

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page