shadow-mode request logging for mcp servers
Intercepts and logs all MCP protocol messages (requests, responses, errors) flowing through the gateway without blocking or modifying the actual execution path. Implements a transparent proxy pattern that sits between the MCP client and server, capturing full message payloads including tool calls, parameters, and responses for audit and debugging purposes without introducing latency into the critical path.
Unique: Implements shadow-mode logging as a transparent proxy wrapper rather than requiring server-side instrumentation, allowing legacy MCP servers to be audited without code modification. Uses process-level interception of MCP protocol messages rather than application-level hooks.
vs alternatives: Requires zero changes to existing MCP server code unlike server-side logging SDKs, and captures the complete protocol layer unlike application-level logging which may miss framework-level details
per-tool access control policies
Enforces granular authorization rules on a per-tool basis before MCP tool calls are executed, allowing administrators to define which tools are callable, by whom, and under what conditions. Implements a policy evaluation layer that intercepts tool invocation requests, matches them against a policy ruleset, and either permits or denies execution based on tool name, caller identity, or other contextual attributes.
Unique: Provides tool-level granularity for access control at the MCP protocol layer rather than requiring each tool to implement its own authorization logic. Centralizes policy enforcement in the gateway rather than distributing it across multiple tool implementations.
vs alternatives: Simpler than implementing authorization in each individual tool, and works with any MCP server without requiring server-side code changes, unlike application-level access control frameworks
ed25519-signed receipt generation for tool invocations
Generates cryptographically signed receipts for completed tool invocations using Ed25519 digital signatures, creating a tamper-proof audit trail that proves a specific tool was called with specific parameters at a specific time. Each receipt contains the tool invocation details and is signed with a private key, allowing verification that the receipt has not been modified and was issued by the authorized gateway.
Unique: Uses Ed25519 digital signatures for receipt generation rather than HMAC or other symmetric approaches, providing asymmetric verification where the public key can be distributed without compromising the signing capability. Receipts are cryptographically bound to specific tool invocations at the MCP protocol layer.
vs alternatives: Stronger than HMAC-based receipts because verification doesn't require access to the signing key, enabling third-party verification. More efficient than RSA signatures while providing equivalent security guarantees for audit purposes
mcp protocol gateway wrapping and process interception
Acts as a transparent wrapper around MCP server processes, intercepting the MCP protocol communication between client and server without requiring modifications to either endpoint. Implements a process-level proxy that launches the target MCP server as a child process and mediates all stdin/stdout communication, allowing policies and logging to be applied uniformly across any MCP server implementation.
Unique: Implements gateway functionality at the process level using stdin/stdout interception rather than requiring MCP servers to be rewritten as libraries or plugins. Allows any executable MCP server to be wrapped without code changes, working with servers written in any language.
vs alternatives: More flexible than library-based approaches because it works with any MCP server regardless of implementation language or architecture. Simpler than network-level proxies because it operates at the process boundary where MCP protocol messages are already serialized
optional receipt verification and validation
Provides mechanisms to verify the authenticity and integrity of Ed25519-signed receipts generated by the gateway, allowing external systems or auditors to confirm that a receipt was legitimately issued and has not been tampered with. Verification uses the public key corresponding to the gateway's signing key to validate the signature and confirm the receipt contents.
Unique: Provides asymmetric verification where the public key can be freely distributed without compromising security, enabling third-party auditors to verify receipts without access to the gateway's private key. Verification is decoupled from receipt generation, allowing offline verification.
vs alternatives: More scalable than symmetric verification (HMAC) because the public key can be shared with unlimited third parties. More transparent than centralized verification services because verification can be performed locally without contacting the gateway