@oconnector/mcp-gateway
MCP ServerFreeSecurity Proxy for Model Context Protocol — Govern any MCP tool call with ABS Core NRaaS (Non-Repudiation as a Service)
Capabilities8 decomposed
mcp tool call interception and governance
Medium confidenceIntercepts all Model Context Protocol tool invocations at the gateway layer before execution, applying configurable governance policies to approve, deny, or modify tool calls based on security rules and compliance requirements. Uses a proxy architecture that sits between LLM agents (CrewAI, LangChain) and MCP servers, inspecting call signatures and payloads against policy definitions without requiring changes to upstream agent code.
Implements MCP-specific governance as a transparent proxy layer with non-repudiation guarantees via ED25519 signatures, rather than relying on agent-level access control or LLM prompt-based restrictions. Integrates with ABS Core NRaaS to cryptographically bind tool call decisions to identifiable actors.
Unlike prompt-based tool restrictions (easily bypassed) or agent-level ACLs (require code changes), this gateway approach provides cryptographically-auditable governance that applies uniformly across all agents and cannot be circumvented by prompt injection.
non-repudiation signing for tool call decisions
Medium confidenceCryptographically signs all tool call governance decisions (approval, denial, modification) using ED25519 digital signatures, creating an immutable audit trail that proves who authorized or rejected each tool invocation and when. Each decision is bound to an actor identity and cannot be forged or altered retroactively, satisfying compliance requirements for accountability in regulated environments.
Implements Non-Repudiation as a Service (NRaaS) specifically for MCP tool governance, using ED25519 signatures to bind decisions to actor identities with cryptographic certainty. This is distinct from generic audit logging because signatures are mathematically unforgeable and can be verified by external parties.
Standard audit logs can be tampered with or deleted; ED25519 signatures create cryptographic proof that a decision was made by a specific actor at a specific time, satisfying compliance requirements that generic logging cannot meet.
policy-based tool call filtering and modification
Medium confidenceEvaluates incoming MCP tool calls against a configurable policy engine that can allow, block, or transform tool invocations based on rules matching tool name, arguments, caller identity, resource usage, or other contextual signals. Policies are evaluated before tool execution, enabling fine-grained control over what agents can do without requiring changes to agent code or LLM prompts.
Provides MCP-specific policy evaluation at the gateway layer, allowing rules to match on MCP-specific metadata (tool name, schema, arguments) rather than generic HTTP/API patterns. Integrates with ABS Core for policy storage and evaluation, enabling centralized governance across multiple agents.
Unlike agent-level tool restrictions (which require code changes) or LLM prompt-based controls (which are easily bypassed), gateway-level policy enforcement applies uniformly and cannot be circumvented by prompt injection or agent code modification.
multi-agent tool access control with role-based enforcement
Medium confidenceManages tool access permissions across multiple AI agents based on actor identity, role, or team membership, ensuring that different agents or users can only invoke tools they are authorized to use. Uses identity context from the MCP request to evaluate role-based access control (RBAC) policies, enabling fine-grained delegation of tool access without modifying individual agent configurations.
Implements role-based access control at the MCP gateway layer, allowing fine-grained tool access decisions based on actor identity without requiring changes to individual agent code. Integrates with ABS Core identity management to support centralized role definitions across multiple agents and teams.
Unlike agent-level tool restrictions (which require per-agent configuration) or LLM-based access control (which is not cryptographically enforceable), gateway-level RBAC provides centralized, auditable, and tamper-proof tool access control.
audit logging with cryptographic proof of tool invocations
Medium confidenceRecords comprehensive audit logs of all tool call governance decisions, including tool name, arguments, actor identity, decision (allow/deny/modify), timestamp, and ED25519 signature proving the decision was made by an authorized entity. Logs are structured for compliance reporting and can be exported for external audit or forensic analysis.
Combines comprehensive audit logging with ED25519 cryptographic signatures, creating tamper-proof records of tool call governance decisions that satisfy compliance requirements. Each log entry is cryptographically bound to the decision maker and timestamp, making it impossible to forge or alter logs retroactively.
Standard audit logs can be tampered with or deleted; cryptographically-signed audit logs provide mathematical proof that a record was created by an authorized entity at a specific time, satisfying compliance requirements that generic logging cannot meet.
mcp server endpoint proxying with transparent request/response handling
Medium confidenceActs as a transparent proxy between LLM agents and MCP servers, intercepting all MCP protocol messages (JSON-RPC format), applying governance policies, and forwarding approved calls to the actual MCP server endpoints. Handles request/response transformation, error handling, and timeout management without requiring agents to be aware of the proxy layer.
Implements MCP-specific proxying that understands the MCP protocol (JSON-RPC, tool schemas, context protocol) rather than generic HTTP proxying, enabling governance decisions based on MCP-specific metadata like tool name, schema, and arguments.
Unlike generic HTTP proxies (which cannot understand MCP semantics) or agent-level tool wrappers (which require code changes), MCP gateway proxying provides transparent governance that works with any MCP-compatible agent without modification.
integration with crewai and langchain agent frameworks
Medium confidenceProvides native integration points with CrewAI and LangChain agent frameworks, allowing these frameworks to route tool calls through the MCP gateway for governance without requiring custom code. Handles framework-specific tool registration, context passing, and response handling to ensure seamless integration with existing agent code.
Provides native integration with CrewAI and LangChain rather than requiring agents to manually route calls through the gateway, enabling governance to be added with minimal code changes. Handles framework-specific tool registration and context passing transparently.
Unlike generic MCP client libraries (which require agents to manually route calls), framework-specific integration allows governance to be added as a transparent layer that works with existing agent code.
sovereign accountability and compliance reporting
Medium confidenceGenerates compliance reports and audit evidence demonstrating that AI tool usage meets regulatory requirements (NIST, HIPAA, SOX, GDPR, etc.) by providing cryptographically-signed records of tool call governance decisions, actor accountability, and policy enforcement. Reports can be exported for external audit or regulatory review.
Combines cryptographically-signed audit logs with compliance reporting to provide auditors with mathematical proof that AI tool usage meets regulatory requirements. Uses ED25519 signatures to create tamper-proof evidence of governance and accountability.
Unlike generic audit logs (which can be tampered with) or self-attestations (which lack proof), cryptographically-signed compliance reports provide mathematical evidence that governance controls are in place and functioning correctly.
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with @oconnector/mcp-gateway, ranked by overlap. Discovered automatically through the match graph.
mcp-runtime-guard
Policy-based MCP tool call proxy
cordon-cli
The security gateway for AI agents — firewall, auditor, and remote control for MCP tool calls
@getcordon/core
Core proxy engine for Cordon for MCP — the security gateway for MCP tool calls
@policylayer/intercept
Policy-as-code enforcement for MCP tool calls
tegata
Enforceable authorization for MCP tool calls
@mcptoolgate/client
MCP Tool Gate client for Claude Desktop - secure MCP tool governance with human-in-the-loop approvals
Best For
- ✓Enterprise teams deploying AI agents in regulated industries (finance, healthcare, legal)
- ✓Teams building multi-agent systems where tool access control is critical
- ✓Organizations requiring audit trails and compliance evidence for AI tool usage
- ✓Regulated industries (finance, healthcare, legal) requiring audit trails for AI decisions
- ✓Organizations with strict compliance frameworks (HIPAA, SOX, GDPR, NIST)
- ✓Teams needing to demonstrate 'human-in-the-loop' approval for sensitive AI operations
- ✓Enterprises building sovereign AI systems with accountability requirements
- ✓Teams building multi-tenant AI systems where different users have different tool access levels
Known Limitations
- ⚠Adds latency to every tool call (exact overhead depends on policy complexity and NRaaS signing operations)
- ⚠Requires explicit policy configuration — no sensible defaults for tool restrictions
- ⚠Does not prevent agents from attempting calls; only governs execution post-interception
- ⚠Policy evaluation logic must be maintained separately from agent code, creating potential drift
- ⚠Signature verification requires access to public keys — key management infrastructure must be maintained
- ⚠ED25519 signatures add cryptographic overhead (~5-10ms per signature operation)
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Package Details
About
Security Proxy for Model Context Protocol — Govern any MCP tool call with ABS Core NRaaS (Non-Repudiation as a Service)
Categories
Alternatives to @oconnector/mcp-gateway
Search the Supabase docs for up-to-date guidance and troubleshoot errors quickly. Manage organizations, projects, databases, and Edge Functions, including migrations, SQL, logs, advisors, keys, and type generation, in one flow. Create and manage development branches to iterate safely, confirm costs
Compare →Are you the builder of @oconnector/mcp-gateway?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →