Vaultak MCP Server — AI agent runtime security for Claude, Cursor, and any MCP-compatible assistant
Project description
Vaultak MCP Server
AI agent runtime security — directly inside Claude, Cursor, and any MCP-compatible assistant.
What it does
The Vaultak MCP server gives any AI assistant three security superpowers:
| Tool | What it does |
|---|---|
vaultak_risk_score |
Score any AI agent 0–100 across 5 security dimensions |
vaultak_policy_check |
Check if an action should be ALLOWED or BLOCKED |
vaultak_get_policy_templates |
Get ready-to-use security policy templates |
Install
pip install vaultak-mcp
Or run directly:
uvx vaultak-mcp
Connect to Claude Desktop
Add to your claude_desktop_config.json:
{
"mcpServers": {
"vaultak": {
"command": "uvx",
"args": ["vaultak-mcp"],
"env": {
"VAULTAK_API_KEY": "your_api_key_here"
}
}
}
}
Get your API key at app.vaultak.com.
Connect to Cursor
In Cursor Settings → MCP → Add Server:
{
"name": "vaultak",
"command": "uvx vaultak-mcp"
}
Example usage
Once connected, ask your AI assistant:
"Score the risk level of my agent that has access to the production database and can send emails"
"Should my agent be allowed to delete records from the users table?"
"Give me policy templates for protecting PII in my AI agent"
Tools reference
vaultak_risk_score
agent_description (required) What the agent does
capabilities (optional) List of tools/capabilities
api_key (optional) Vaultak API key for live scoring
Returns composite score (0–100), risk tier, per-dimension breakdown, and recommendations.
vaultak_policy_check
action (required) The action being attempted (delete, write, execute...)
resource (required) The resource being acted on (production_db, /etc/secrets...)
policies (optional) Policy list to evaluate against
api_key (optional) Fetch your live policies automatically
Returns ALLOW or BLOCK decision with matched policy and recommendation.
vaultak_get_policy_templates
scenario (required) One of: database_protection | file_system_limits |
api_rate_limiting | pii_protection |
production_safeguards | all
Returns ready-to-use policy JSON for your Vaultak dashboard.
Links
- Dashboard: app.vaultak.com
- Docs: docs.vaultak.com
- SDK:
pip install vaultak - Site: vaultak.com
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file vaultak_mcp-1.0.0.tar.gz.
File metadata
- Download URL: vaultak_mcp-1.0.0.tar.gz
- Upload date:
- Size: 9.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.15
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
fb077f7af7ae6341a6ea1b4fc024f7c0cb63ab2c4069eed651da11a13628c22e
|
|
| MD5 |
f7eba2bef3be4496897882ce9c23b65c
|
|
| BLAKE2b-256 |
69fd9966bb7c1e7e5f1a58d90224e7e2ca22ebdfec87ad102bccd11355486fd0
|
File details
Details for the file vaultak_mcp-1.0.0-py3-none-any.whl.
File metadata
- Download URL: vaultak_mcp-1.0.0-py3-none-any.whl
- Upload date:
- Size: 14.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.15
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
095dbefbcbf27d8f30b3c130e0ca63819a836f06cd6cd618adb5a25dbf94506b
|
|
| MD5 |
094ae725e3e7b374b3e49952857a35e1
|
|
| BLAKE2b-256 |
18240c8d2c6bdd4c6b67a4a39aee2ef6c4248b8ab42de6f75d884accd62d0b84
|