Skip to main content

Open-source MCP/A2A security gateway — policy enforcement, taint tracking, sandboxed execution, deterministic envelopes, and Sigstore audit for every AI agent tool call. OWASP ASI 2026 compliant.

Project description

MCPKernel — The Security Kernel for AI Agents

Open-source MCP/A2A security gateway — policy enforcement, taint tracking, sandboxed execution, deterministic envelopes, and Sigstore audit for every AI agent tool call. OWASP ASI 2026 compliant.

CI License: Apache 2.0 Python 3.12+


Quick Start

pip install "mcpkernel[all]"
mcpkernel serve --host 127.0.0.1 --port 8000

Point your MCP client to http://localhost:8000/mcp instead of targeting tool servers directly. Every tool call is now policy-checked, taint-scanned, sandboxed, and audit-logged.


Why MCPKernel?

AI agents (LangChain, CrewAI, AutoGen, Copilot) call tools autonomously — reading files, executing code, making HTTP requests. Without a security layer, a single prompt injection can exfiltrate secrets, overwrite critical files, or run arbitrary code.

MCPKernel is the missing chokepoint. It sits between your agent and MCP tool servers, enforcing security policies on every single call:

┌─────────────┐     ┌──────────────────────────┐     ┌─────────────┐
│  AI Agent    │────▶│       MCPKernel           │────▶│  MCP Tool   │
│ (LangChain,  │◀────│  Security Gateway        │◀────│  Server     │
│ CrewAI, etc) │     └──────────────────────────┘     └─────────────┘
└─────────────┘       │ Policy │ Taint │ Sandbox │
                      │  DEE   │ Audit │ eBPF    │

What happens to every tool call:

Step What MCPKernel Does
1. Policy Check Evaluates against YAML rules with OWASP ASI 2026 mappings — blocks or allows
2. Taint Scan Detects secrets (AWS keys, JWTs), PII (SSN, credit cards), and user input in arguments
3. Sandbox Execution Runs code in Docker, Firecracker, WASM, or Microsandbox — never on bare metal
4. Deterministic Envelope Hashes inputs/outputs, Sigstore-signs the trace — fully replayable
5. Audit Log Writes to tamper-proof append-only log with SIEM export (CEF, JSONL, CSV)

Features

  • YAML Policy Engine — define allow/deny/audit/sandbox rules per tool, argument pattern, or taint label
  • Taint Tracking — automatic detection of secrets, PII, API keys, JWTs in tool call arguments
  • 4 Sandbox Backends — Docker, Firecracker microVMs, WASM, Microsandbox
  • Deterministic Execution Envelopes (DEE) — every execution is hashed and Sigstore-signed for replay
  • OWASP ASI 2026 Compliance — built-in policy sets mapping to ASI-01 through ASI-08
  • Append-Only Audit Logs — SQLite-backed, content-hashed, with CEF/JSONL/CSV SIEM export
  • Kong-Style Plugin Pipelinepre_execution → execution → post_execution → log with priorities
  • Rate Limiting — per-identity token bucket with LRU eviction
  • Prometheus Metrics + OpenTelemetry — full observability out of the box
  • Optional eBPF Probes — kernel-level syscall monitoring at MCP boundaries
  • Agent Manifest Integration — load agent.yaml definitions, convert compliance declarations (FINRA/SEC/Federal Reserve) to policy rules, validate tool schemas, and block undeclared tools at runtime via proxy hook

Getting Started

# Install with all backends
pip install "mcpkernel[all]"

# Start the security gateway
mcpkernel serve --host 127.0.0.1 --port 8000

Point your MCP client to http://localhost:8000/mcp instead of targeting tool servers directly.


Use Cases

Scenario How MCPKernel Helps
AI Coding Assistants Intercepts Copilot/Cursor tool calls, blocks dangerous file writes, prevents secret exfiltration
Autonomous Agents Policy-enforces LangChain/CrewAI/AutoGen tool usage, sandboxes code execution
Enterprise MCP Deployments OWASP ASI compliance, tamper-proof audit trails, SIEM integration
Research Reproducibility Deterministic execution envelopes — every result is signed and replayable
Multi-Agent Workflows Cross-tool taint tracking — PII in one tool's output can't leak to another's HTTP call
Regulated Industries Append-only audit logs, integrity verification, CEF export for security teams

Architecture

src/mcpkernel/
├── proxy/          # FastAPI MCP/A2A gateway — auth, rate limiting, plugin pipeline
├── policy/         # YAML rule engine with OWASP ASI 2026 mappings
├── taint/          # Source/sink taint tracking — secrets, PII, user input detection
├── sandbox/        # Docker, Firecracker, WASM, Microsandbox execution backends
├── dee/            # Deterministic Execution Envelopes — hash, sign, replay, drift detect
├── audit/          # Append-only Sigstore-signed audit logs + SIEM export
├── context/        # Token-efficient context reduction via TF-IDF + AST pruning
├── ebpf/           # Optional kernel-level syscall monitoring (BCC probes)
├── observability/  # Prometheus metrics, OpenTelemetry tracing, health checks
├── agent_manifest/ # agent.yaml loader, compliance-to-policy bridge, tool schema validator
├── config.py       # Pydantic v2 hierarchical config (YAML → env → CLI)
├── cli.py          # Typer CLI — serve, scan, replay, audit, init
└── utils.py        # Hashing, exceptions, structured logging

Policy Rules

MCPKernel ships with three policy sets:

  • owasp_asi_2026_strict.yaml — Full OWASP ASI 2026 coverage (ASI-01 through ASI-08)
  • minimal.yaml — Lightweight defaults for development
  • custom_template.yaml — Copy and customize for your environment

Example rule:

rules:
  - id: ASI-03-001
    name: Block PII in outbound calls
    description: Prevent PII-tainted data from reaching HTTP sinks
    action: deny
    priority: 10
    tool_patterns:
      - "http_post"
      - "send_email"
    taint_labels:
      - pii
      - secret
    owasp_asi_id: ASI-03

CLI Reference

Command Description
mcpkernel serve Start the proxy gateway
mcpkernel init Initialize config and policies in a project
mcpkernel scan <file> Static taint analysis on Python code
mcpkernel validate-policy <path> Validate policy YAML files
mcpkernel trace-list List recent execution traces
mcpkernel trace-export <id> Export a trace as JSON
mcpkernel replay <id> Replay a trace and check for drift
mcpkernel audit-query Query audit logs with filters
mcpkernel audit-verify Verify audit log integrity
mcpkernel config-show Show effective configuration
mcpkernel manifest-import <path> Import agent.yaml from a repo, convert to policy rules, export YAML
mcpkernel manifest-validate <path> Validate agent.yaml + tool schemas, report compliance status

Configuration

Config loads hierarchically: YAML → environment variables → CLI flags.

# .mcpkernel/config.yaml
proxy:
  host: 127.0.0.1
  port: 8000

sandbox:
  backend: docker        # docker | firecracker | wasm | microsandbox
  timeout_seconds: 30

taint:
  mode: hybrid           # decorator | ebpf | hybrid | disabled

policy:
  default_action: deny   # deny-by-default for production
  policy_paths:
    - policies/owasp_asi_2026_strict.yaml

observability:
  log_level: info
  metrics_enabled: true
  otlp_endpoint: ""      # Set for OpenTelemetry export

Environment variable override: MCPKERNEL_SANDBOX__BACKEND=wasm


Docker Deployment

# Build and run
docker compose up -d

# With Prometheus monitoring
docker compose --profile monitoring up -d

Development

# Clone and install
git clone https://github.com/piyushptiwari1/mcpkernel.git
cd mcpkernel
pip install -e ".[dev]"

# Run tests (443 tests, ~89% coverage)
pytest tests/ -v --cov=mcpkernel

# Lint
ruff check src/ tests/
ruff format src/ tests/

Examples

Integration examples for popular AI agent frameworks:

  • LangChain — route LangChain tool calls through MCPKernel
  • CrewAI — secure CrewAI agent tool usage
  • AutoGen — protect AutoGen multi-agent conversations
  • Copilot Guard — intercept Copilot/Cursor tool calls

Planned — The Road to Agent Sovereignty

1. Inter-Agent Proof of Intent (Zero-Knowledge Tooling)

Today agents trust the gateway. Tomorrow, Agent A (Company X) will call a tool on Agent B (Company Y) — across organizational boundaries.

  • Problem: How does Agent B verify that Agent A's call was authorized by a specific policy without revealing the underlying data?
  • Plan: Add a ZK-Policy module to MCPKernel. Agents will produce zero-knowledge proofs of policy compliance, enabling cross-org tool calls with cryptographic "sovereignty" — no private code or data is ever exposed.

2. Physical-World Safety Layer (Robotic MCP)

As MCP expands into IoT and Robotics (Digital Twins), the "sandbox" isn't just a VM — it's a physical constraint.

  • Problem: If an agent calls move_arm(), the gateway must simulate the physics impact before allowing the tainted command to reach the actuator.
  • Plan: Deterministic execution for hardware — a physics-aware sandbox that models real-world consequences (collision, force limits, safety envelopes) before any command reaches a physical device.

3. Automated Red-Teaming ("Immune System" Mode)

Instead of being a passive gatekeeper, the gateway should attack itself.

  • Problem: New prompt injection techniques and policy bypasses appear daily. Static rules can't keep up.
  • Plan: A Shadow LLM module that continuously attempts prompt injections against MCPKernel's own policies in real-time, discovering 0-day vulnerabilities in agent logic before adversaries do.

4. Parallel Taint Analysis (Cold-Start Latency < 50 ms)

In 2026, latency is everything. If the gateway adds more than 50 ms to a tool call, developers will disable it.

  • Plan: Run taint sink checking concurrently with code execution rather than sequentially — analyze while the sandbox is running, abort only if a violation is detected, keeping the hot path near zero additional latency.

5. Context Minimization as a Cost Weapon

Security matters, but saving money sells faster. The context/ module already prunes tokens via TF-IDF + AST analysis.

  • Plan: Productize context minimization to deliver ≥ 30 % token reduction while maintaining safety guarantees. When the gateway pays for itself in reduced LLM costs, adoption becomes a no-brainer.

Competitive Landscape

MCPKernel is a runtime security gateway — it sits in the live request path intercepting every tool call. This is fundamentally different from the scanners and config auditors in the ecosystem:

Project What It Does How MCPKernel Differs
SaravanaGuhan/mcp-guard Static/dynamic vulnerability scanner for MCP servers (CVSS v4.0 + AIVSS) Scanner finds bugs before deployment; MCPKernel enforces policy at runtime. Complementary — run mcp-guard in CI, MCPKernel in prod.
aryanjp1/mcpguard (PyPI mcpguard) MCP config static scanner — audits claude_desktop_config.json for OWASP MCP Top 10 Config linter, no runtime component. Internally uses mcpshield package.
kriskimmerle/mcpguard MCP config auditor — secrets, unpinned packages, Docker access. Zero deps. Archived Feb 2026. Single-file config checker. Archived. No overlap.
mcpshield (PyPI) Database security gateway for AI agents (Postgres, MySQL, Redis, MongoDB) with cloud dashboard DB-only scope with SaaS dependency. MCPKernel is infrastructure-agnostic, self-hosted, and covers any MCP tool call.
mcp-proxy Transport bridge (stdio ↔ SSE/StreamableHTTP) Pure transport, zero security features.

Bottom line: No existing project provides the full runtime stack MCPKernel delivers — policy engine + taint tracking + sandboxing + deterministic envelopes + Sigstore audit + eBPF, all in one gateway.


Contributing

See CONTRIBUTING.md for development setup, testing, and PR guidelines.


License

Apache 2.0 — see LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mcpkernel-0.1.0.tar.gz (118.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mcpkernel-0.1.0-py3-none-any.whl (84.0 kB view details)

Uploaded Python 3

File details

Details for the file mcpkernel-0.1.0.tar.gz.

File metadata

  • Download URL: mcpkernel-0.1.0.tar.gz
  • Upload date:
  • Size: 118.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for mcpkernel-0.1.0.tar.gz
Algorithm Hash digest
SHA256 457e0585ad236722d9bdb216e37946001b78c9c7e69952131f3adc7bde820e42
MD5 7b13978a3368ac13c4dabc483a8774ce
BLAKE2b-256 96d75bb86217fc12bf02e63787435a46778c23f1a6850c265ee86c7da66575b1

See more details on using hashes here.

File details

Details for the file mcpkernel-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: mcpkernel-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 84.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for mcpkernel-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 bdf4a105aee0f80896d10be58cb66775db80b3d4f0f46019633abde4eedc2204
MD5 d135421bec77d8575c104c477ffce221
BLAKE2b-256 15d410dc26b89093021abfbf6397fd817ee20ee78e5ffb9694be526fbd0b7f8c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page