Skip to main content

Vaultak MCP Server — AI agent runtime security for Claude, Cursor, and any MCP-compatible assistant

Project description

Vaultak MCP Server

AI agent runtime security — directly inside Claude, Cursor, and any MCP-compatible assistant.

What it does

The Vaultak MCP server gives any AI assistant three security superpowers:

Tool What it does
vaultak_risk_score Score any AI agent 0–100 across 5 security dimensions
vaultak_policy_check Check if an action should be ALLOWED or BLOCKED
vaultak_get_policy_templates Get ready-to-use security policy templates

Install

pip install vaultak-mcp

Or run directly:

uvx vaultak-mcp

Connect to Claude Desktop

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "vaultak": {
      "command": "uvx",
      "args": ["vaultak-mcp"],
      "env": {
        "VAULTAK_API_KEY": "your_api_key_here"
      }
    }
  }
}

Get your API key at app.vaultak.com.

Connect to Cursor

In Cursor Settings → MCP → Add Server:

{
  "name": "vaultak",
  "command": "uvx vaultak-mcp"
}

Example usage

Once connected, ask your AI assistant:

"Score the risk level of my agent that has access to the production database and can send emails"

"Should my agent be allowed to delete records from the users table?"

"Give me policy templates for protecting PII in my AI agent"

Tools reference

vaultak_risk_score

agent_description  (required)  What the agent does
capabilities       (optional)  List of tools/capabilities
api_key            (optional)  Vaultak API key for live scoring

Returns composite score (0–100), risk tier, per-dimension breakdown, and recommendations.

vaultak_policy_check

action    (required)  The action being attempted (delete, write, execute...)
resource  (required)  The resource being acted on (production_db, /etc/secrets...)
policies  (optional)  Policy list to evaluate against
api_key   (optional)  Fetch your live policies automatically

Returns ALLOW or BLOCK decision with matched policy and recommendation.

vaultak_get_policy_templates

scenario  (required)  One of: database_protection | file_system_limits |
                               api_rate_limiting | pii_protection |
                               production_safeguards | all

Returns ready-to-use policy JSON for your Vaultak dashboard.

Links

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vaultak_mcp-1.0.0.tar.gz (9.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

vaultak_mcp-1.0.0-py3-none-any.whl (14.2 kB view details)

Uploaded Python 3

File details

Details for the file vaultak_mcp-1.0.0.tar.gz.

File metadata

  • Download URL: vaultak_mcp-1.0.0.tar.gz
  • Upload date:
  • Size: 9.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.15

File hashes

Hashes for vaultak_mcp-1.0.0.tar.gz
Algorithm Hash digest
SHA256 fb077f7af7ae6341a6ea1b4fc024f7c0cb63ab2c4069eed651da11a13628c22e
MD5 f7eba2bef3be4496897882ce9c23b65c
BLAKE2b-256 69fd9966bb7c1e7e5f1a58d90224e7e2ca22ebdfec87ad102bccd11355486fd0

See more details on using hashes here.

File details

Details for the file vaultak_mcp-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: vaultak_mcp-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 14.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.15

File hashes

Hashes for vaultak_mcp-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 095dbefbcbf27d8f30b3c130e0ca63819a836f06cd6cd618adb5a25dbf94506b
MD5 094ae725e3e7b374b3e49952857a35e1
BLAKE2b-256 18240c8d2c6bdd4c6b67a4a39aee2ef6c4248b8ab42de6f75d884accd62d0b84

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page