Production-grade MCP server for ISO 20022 payment message processing
Project description
Pactus
Pactus is an MCP server for parsing ISO 20022 payment messages directly from chat. It exposes five tools that let AI assistants inspect pacs.008, pacs.002, pain.001, and camt.053 messages — the message types at the centre of the CBPR+ migration — without leaving the conversation. It is aimed at developers and bank-integration teams who need to read, debug, or explain ISO 20022 traffic during the transition away from MT messages.
Status
Stable. Version 1.0.0 is on PyPI.
pip install pactus-mcp
# or
uv add pactus-mcp
Quick start
git clone https://github.com/deniskarlinsky/iso20022-mcp
cd iso20022-mcp
uv sync
uv run pytest
Connecting to Claude Desktop
Add Pactus to your Claude Desktop config:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json - Windows:
%APPDATA%\Claude\claude_desktop_config.json - Linux:
~/.config/Claude/claude_desktop_config.json
{
"mcpServers": {
"pactus": {
"command": "uv",
"args": ["run", "--directory", "/absolute/path/to/iso20022-mcp", "pactus-mcp"]
}
}
}
Restart Claude Desktop. The Pactus tools will appear in the tools menu.
Available tools
| Tool | Message type | Purpose |
|---|---|---|
ping |
— | Health check; returns service name and version. |
parse_pacs008 |
pacs.008.001.08 |
Parse a FI-to-FI Customer Credit Transfer. |
parse_pacs002 |
pacs.002.001.10 |
Parse a FI-to-FI Payment Status Report. |
parse_pain001 |
pain.001.001.09 |
Parse a Customer Credit Transfer Initiation. |
parse_camt053 |
camt.053.001.08 |
Parse a Bank-to-Customer Account Statement. |
All four parse tools return a structured Pydantic model on success, or {"error": "..."} on failure. Errors never raise; the agent can explain what went wrong.
Tool reference
parse_pacs008
pacs.008 is the primary interbank credit transfer message and the mandatory format for all CBPR+ cross-border traffic from November 2025. It carries one or more credit transfer instructions between financial institutions, each with settlement amount, charge bearer, debtor, and creditor agents.
Example response
{
"group_header": {
"message_id": "MSG20240508001",
"creation_datetime": "2024-05-08T10:00:00",
"number_of_transactions": 1,
"settlement_method": "CLRG"
},
"transactions": [
{
"end_to_end_id": "E2E20240508001",
"transaction_id": "TX20240508001",
"settlement_amount": {"value": "1000.00", "currency": "USD"},
"charge_bearer": "SHAR",
"debtor": {"name": "Acme Corporation"},
"debtor_agent": {"bic": "CHASUS33"},
"creditor": {"name": "Global Supplies Ltd"},
"creditor_agent": {"bic": "DEUTDEDB"}
}
]
}
parse_pacs002
pacs.002 is the status report sent in response to a pacs.008. It reports whether each transaction was accepted, rejected, or is in an intermediate state. Rejections carry one or more structured reason codes (e.g. AC01 incorrect account, AG01 transaction forbidden) that explain the outcome.
Example response
{
"group_header": {
"message_id": "STS20260510001",
"creation_datetime": "2026-05-10T14:30:00"
},
"original_group_info": {
"original_message_id": "MSG20240508001",
"original_message_name_id": "pacs.008.001.08",
"original_creation_datetime": "2024-05-08T10:00:00",
"group_status": "ACSC"
},
"transaction_statuses": [
{
"original_end_to_end_id": "E2E-001",
"original_transaction_id": "TX-001",
"status": "ACSC",
"status_reasons": [],
"acceptance_datetime": "2026-05-10T14:29:45"
}
]
}
parse_pain001
pain.001 is the initiating message in a credit transfer flow, sent by a corporate or customer to their bank. It groups transactions into one or more PaymentInformation batches that share a debtor account, execution date, and service level. The LLM sees the full hierarchy: group header → batches → transactions.
Example response
{
"group_header": {
"message_id": "PAIN20260510-001",
"creation_datetime": "2026-05-10T09:00:00",
"number_of_transactions": 1,
"control_sum": "1500.00",
"initiating_party_name": "ACME Corp"
},
"payment_informations": [
{
"payment_information_id": "BATCH-2026-05-10-A",
"payment_method": "TRF",
"requested_execution_date": "2026-05-12",
"debtor": {"name": "ACME Corp"},
"debtor_account_iban": "DE89370400440532013000",
"debtor_agent": {"bic": "DEUTDEFFXXX"},
"charge_bearer": "SLEV",
"service_level_code": "SEPA",
"transactions": [
{
"end_to_end_id": "E2E-PAIN-001",
"amount": {"value": "1500.00", "currency": "EUR"},
"creditor": {"name": "Acme Supplier SARL"},
"creditor_account_iban": "FR1420041010050500013M02606",
"remittance_info": ["Invoice 2026-0042"]
}
]
}
]
}
parse_camt053
camt.053 is the structured account statement sent by a bank to its customer. It reports opening and closing balances and individual debit/credit entries for a period, each optionally broken down to individual transaction details. It is the primary source for automated bank reconciliation.
Example response
{
"group_header": {
"message_id": "CAMT053-SINGLE-001",
"creation_datetime": "2026-05-10T08:00:00"
},
"statements": [
{
"statement_id": "STMT-2026-05-09-001",
"account_iban": "DE89370400440532013000",
"account_currency": "EUR",
"balances": [
{
"type_code": "OPBD",
"amount": {"value": "10000.00", "currency": "EUR"},
"credit_debit": "CRDT",
"balance_date": "2026-05-09"
}
],
"entries": [
{
"entry_ref": "NTRY-001",
"amount": {"value": "1500.00", "currency": "EUR"},
"credit_debit": "DBIT",
"status": "BOOK",
"booking_date": "2026-05-09",
"bank_tx_domain": "PMNT",
"bank_tx_family": "ICDT",
"bank_tx_subfamily": "ESCT"
}
]
}
]
}
Security model
- XXE and entity-expansion hardening: All four parsers reject input containing
<!DOCTYPE>or<!ENTITY>declarations before any XML parsing occurs. This blocks XXE file-read, SSRF, and billion-laughs DoS patterns. - Build integrity: Generated xsdata models are SHA-256 verified in CI on every commit (
sha256sum -c GENERATED_HASHES.txt). Regeneration is reproducible from the vendored XSDs. - Supply chain: GitHub Actions workflows use SHA-pinned action references (commit-hash
@pins, not mutable tags). - Distribution integrity: PyPI artifacts are published via OIDC Trusted Publishing and signed with Sigstore. SBOMs (CycloneDX and SPDX) are generated and vulnerability-scanned on every CI run; release artifacts include the SBOM.
- Vulnerability disclosure: See SECURITY.md.
Architecture
Pactus uses a hexagonal layout: pactus/core/ is pure business logic with no MCP awareness, mcp_server.py is a thin FastMCP wrapper, and the generated xsdata models live in pactus/generated/ and never escape parsers.py. See architecture.md for the diagram.
Development
uv run ruff check
uv run ruff format
uv run mypy
uv run pytest
The project targets mypy --strict.
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file pactus_mcp-1.0.0.tar.gz.
File metadata
- Download URL: pactus_mcp-1.0.0.tar.gz
- Upload date:
- Size: 226.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c892c38e77b6b9881b738d0568006810642521965175baad2d0634604dd0e12e
|
|
| MD5 |
2f6c9a9ac376d994f0075217590ce5cb
|
|
| BLAKE2b-256 |
76114c6c823af4fdb5971ab3f9b76a5409c030535da7fd60cee85600c8092b8a
|
Provenance
The following attestation bundles were made for pactus_mcp-1.0.0.tar.gz:
Publisher:
release.yml on deniskarlinsky/iso20022-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
pactus_mcp-1.0.0.tar.gz -
Subject digest:
c892c38e77b6b9881b738d0568006810642521965175baad2d0634604dd0e12e - Sigstore transparency entry: 1509176846
- Sigstore integration time:
-
Permalink:
deniskarlinsky/iso20022-mcp@73f61de34398bec1d29d39d204f6b7d67cb71565 -
Branch / Tag:
refs/tags/v1.0.0 - Owner: https://github.com/deniskarlinsky
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@73f61de34398bec1d29d39d204f6b7d67cb71565 -
Trigger Event:
workflow_dispatch
-
Statement type:
File details
Details for the file pactus_mcp-1.0.0-py3-none-any.whl.
File metadata
- Download URL: pactus_mcp-1.0.0-py3-none-any.whl
- Upload date:
- Size: 89.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
2c3c3d52cca99d02a84050660f77c9dbf4d0644b3c521a5a99908e7f05b07134
|
|
| MD5 |
786639985730551c1de78bf8045a787a
|
|
| BLAKE2b-256 |
4744ae5fa3fdd6b424cacb5b65b35515a8004e846663e630e06e77f38ffafa98
|
Provenance
The following attestation bundles were made for pactus_mcp-1.0.0-py3-none-any.whl:
Publisher:
release.yml on deniskarlinsky/iso20022-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
pactus_mcp-1.0.0-py3-none-any.whl -
Subject digest:
2c3c3d52cca99d02a84050660f77c9dbf4d0644b3c521a5a99908e7f05b07134 - Sigstore transparency entry: 1509176904
- Sigstore integration time:
-
Permalink:
deniskarlinsky/iso20022-mcp@73f61de34398bec1d29d39d204f6b7d67cb71565 -
Branch / Tag:
refs/tags/v1.0.0 - Owner: https://github.com/deniskarlinsky
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@73f61de34398bec1d29d39d204f6b7d67cb71565 -
Trigger Event:
workflow_dispatch
-
Statement type: