GetMCP: Zero Trust for AI agents

Reddit r/AI_Agents Tools

Summary

GetMCP is a self-hostable open-source tool that brings zero-trust security to AI agents by providing per-request audit, per-agent revocation, policy enforcement, and human-in-the-loop approvals for API calls. It generates MCP servers from OpenAPI specs and acts as a streaming proxy with tamper-evident audit logs.

Just shipped v0.1.0 of something I've been building. Sharing because I haven't seen anyone solve this end-to-end as a self-hostable thing. The problem. AI agents (Claude, ChatGPT, Cursor, in-house bots) are starting to make real calls into production APIs. Most companies are handing them a single long-lived API key and praying. There's no per-request audit, no per-agent revocation, no policy layer, no human-in-the-loop for sensitive mutations. What GetMCP does: \- Generates two MCP servers from any OpenAPI spec: Internal (full surface) and External (scoped/customer-safe). LLM-classified, human-overridable per endpoint. \- Runs as a streaming proxy in front of them : auth, agent identity (revocable in 5s), 5 rule types (allowlist / block / audit / rate-limit / Slack approval). \- Tamper-evident audit log, every call writes one row to a per-org sha256 hash chain. GET /audit/verify walks it end-to-end. Property-tested with 200 random inserts + 50 random tampers, all detected. \- Slack approvals with HMAC-signed callbacks and an idempotent state machine. Stack: NestJS + Postgres + React. Apache 2.0. Single bash command to bootstrap (./deploy/scripts/bootstrap.sh) generates secrets, brings up Postgres + API + dashboard, seeds a demo org. Helm chart included for k8s. No telemetry, no phone-home, no license server. Looking for honest feedback especially from anyone who's tried to safely expose APIs to AI agents in their homelab or at work. What did I miss? Where's the ergonomics broken? PRs welcome.
Original Article

Similar Articles

@GoSailGlobal: Cloudflare has fully revealed its internal architecture for running MCP. Read this alongside OpenAI's recent "Running Codex Safely" report for two essential templates on enterprise agent security. The most explosive move: Code Mode cuts MCP token consumption by 99.9%...

X AI KOLs Timeline

Cloudflare publishes its internal architecture for securely running Model Context Protocol (MCP) agents, introducing 'Code Mode' to reduce token usage by 99.9% and advocating for centralized remote server governance over local deployments.

Code execution with MCP: Building more efficient agents

Anthropic Engineering

This article from Anthropic explores how integrating code execution with the Model Context Protocol (MCP) can improve the efficiency of AI agents. It addresses challenges like token overload from tool definitions and intermediate results, proposing code execution as a solution to reduce latency and costs.

Apideck MCP Server

Product Hunt

Apideck launches an MCP server to enable AI agents to access real-time data across more than 200 applications.