@getcordon/core
FrameworkFreeCore proxy engine for Cordon for MCP — the security gateway for MCP tool calls
Capabilities12 decomposed
mcp tool-call interception and policy enforcement
Medium confidenceIntercepts tool calls from MCP clients before execution, applies configurable security policies (allowlists, denylists, parameter validation rules), and either permits or blocks execution based on policy evaluation. Implements a proxy pattern that sits between the MCP client and server, inspecting the tool name, parameters, and context to enforce organizational security boundaries without modifying the underlying MCP protocol.
Implements MCP-native tool-call interception at the protocol level rather than wrapping individual tool implementations, allowing centralized policy enforcement across heterogeneous MCP servers without modifying server code
Provides MCP-specific security enforcement that works across any MCP server without code changes, whereas generic API gateways require per-endpoint configuration and lack MCP protocol semantics
human-in-the-loop approval workflow for tool calls
Medium confidenceRoutes tool calls flagged by policy rules to a human reviewer queue, pausing execution until explicit approval or rejection is provided. Implements a callback-based workflow where blocked or high-risk calls are held in a state machine, allowing async human review via API or UI integration, then resuming or aborting the original MCP request based on the decision.
Integrates human approval as a first-class workflow primitive in the MCP proxy layer, allowing approval gates to be defined declaratively in policy without custom application code
Provides MCP-native approval workflows that pause execution at the protocol level, whereas custom approval systems typically require wrapping individual tool implementations or building separate orchestration layers
tool call request/response schema validation and type checking
Medium confidenceValidates MCP tool call requests and responses against schema definitions, ensuring type correctness and structural integrity. Implements schema-based validation where tool definitions include parameter schemas and response schemas, and the proxy validates incoming requests and outgoing responses against these schemas. Supports JSON Schema or similar schema formats and provides detailed validation error messages.
Provides MCP-level schema validation that works across all tools without requiring per-tool implementation, enabling centralized type safety enforcement
Validates schemas at the protocol level before tool execution, whereas per-tool validation requires implementing validation in each tool and may miss edge cases
tool call routing and load balancing across multiple mcp servers
Medium confidenceRoutes tool calls to appropriate MCP servers based on tool availability, load, or custom routing rules, implementing a load balancing strategy that distributes calls across multiple server instances. Supports round-robin, least-connections, and custom routing algorithms. Maintains health checks on server instances and automatically removes unhealthy servers from the routing pool.
Provides MCP-level load balancing that works across heterogeneous tool servers without requiring per-tool routing logic, enabling transparent scaling and failover
Routes at the MCP protocol level before tool execution, whereas generic load balancers (nginx, HAProxy) lack MCP semantics and cannot make tool-aware routing decisions
comprehensive audit logging of tool calls and policy decisions
Medium confidenceLogs all tool call attempts, policy evaluations, approval decisions, and execution results to a structured audit trail with timestamps, actor information, and decision rationale. Implements a logging pipeline that captures both successful and blocked calls, enabling forensic analysis, compliance reporting, and security investigations. Logs are structured (JSON) for easy querying and integration with SIEM systems.
Provides MCP-level audit logging that captures the full lifecycle of tool calls (request, policy evaluation, approval, execution, result) in a single structured log, enabling end-to-end traceability without instrumenting individual tools
Captures MCP protocol-level events that generic API logging cannot see, providing visibility into policy decisions and approval workflows that are invisible to downstream tool implementations
declarative policy definition and composition
Medium confidenceAllows security policies to be defined declaratively (likely JSON or YAML) with support for composing multiple rules (allowlists, denylists, parameter constraints, rate limits) into a cohesive policy. Policies are evaluated against tool call metadata at runtime, supporting logical operators (AND, OR) and context-aware conditions (e.g., 'allow only if user role is admin'). Policies are loaded at proxy startup and can be versioned for audit purposes.
Provides a declarative policy language tailored to MCP tool calls, allowing non-developers to define security rules without understanding the underlying proxy architecture
Offers MCP-specific policy syntax that understands tool call semantics (tool name, parameters, context), whereas generic API gateway policies require manual mapping of tool calls to API endpoints
context-aware tool call filtering based on agent/user identity
Medium confidenceEvaluates tool call requests in the context of the requesting agent or user identity, applying identity-based access control rules. Extracts identity information from MCP request metadata (e.g., client ID, user ID, role) and uses it to make allow/block decisions, enabling fine-grained access control where different agents have different tool permissions. Supports role-based access control (RBAC) and attribute-based access control (ABAC) patterns.
Integrates identity-based access control directly into the MCP proxy, allowing identity to be a first-class dimension of tool call filtering without requiring custom authorization logic in each tool
Provides MCP-native identity-based filtering that works across heterogeneous tools, whereas per-tool authorization requires implementing access control in each tool implementation
parameter validation and sanitization for tool calls
Medium confidenceValidates and optionally sanitizes parameters in tool calls before execution, enforcing constraints like type checking, value ranges, string length limits, and regex patterns. Implements a schema-based validation approach where tool parameters are validated against a schema definition, rejecting calls with invalid parameters and optionally logging violations. Supports both strict validation (reject invalid calls) and lenient modes (log and allow).
Provides schema-based parameter validation at the MCP proxy layer, catching invalid parameters before they reach tool implementations and enabling centralized validation logic
Validates parameters at the protocol level before tool execution, whereas per-tool validation requires implementing validation in each tool and may miss edge cases
rate limiting and quota enforcement for tool calls
Medium confidenceEnforces rate limits and quotas on tool calls, tracking usage per agent/user/tool and blocking calls that exceed configured limits. Implements a quota tracking system (likely using in-memory counters or external state store) that increments on each call and checks against configured limits before allowing execution. Supports multiple quota dimensions (per-minute, per-hour, per-day, per-user, per-tool) and graceful degradation (reject, queue, or throttle).
Provides MCP-level rate limiting that works across all tools without requiring per-tool implementation, enabling centralized quota management and fair-use enforcement
Enforces rate limits at the protocol level before tool execution, whereas per-tool rate limiting requires implementing limits in each tool and may allow quota exhaustion across multiple tools
proxy request/response transformation and middleware pipeline
Medium confidenceProvides a middleware pipeline architecture for transforming MCP requests and responses, allowing custom logic to be injected at various stages (pre-policy, post-policy, pre-execution, post-execution). Implements a chain-of-responsibility pattern where middleware components can inspect, modify, or reject requests/responses before they proceed to the next stage. Supports both built-in middleware (logging, metrics, validation) and custom middleware.
Provides a middleware pipeline architecture that allows custom logic to be injected at multiple stages of the MCP request/response lifecycle, enabling flexible extension without modifying the proxy core
Offers a composable middleware pattern that works at the MCP protocol level, whereas custom extensions typically require forking the proxy or wrapping individual tools
tool call result filtering and output redaction
Medium confidenceFilters and redacts sensitive information from tool call results before returning them to the MCP client, implementing data loss prevention (DLP) rules that identify and mask/remove sensitive data patterns. Uses pattern matching (regex, keyword lists) or semantic analysis to detect sensitive data (PII, credentials, API keys) in tool results and redacts or blocks them based on policy. Supports both automatic redaction and manual review workflows.
Provides MCP-level output redaction that works across all tools without requiring per-tool implementation, enabling centralized data loss prevention and privacy enforcement
Redacts sensitive data at the protocol level after tool execution, whereas per-tool redaction requires implementing DLP in each tool and may allow sensitive data to leak through audit logs or monitoring
metrics collection and observability for tool calls
Medium confidenceCollects metrics on tool call execution (latency, success rate, policy violations, approval times) and exposes them for monitoring and alerting. Implements a metrics pipeline that tracks key performance indicators (KPIs) like tool call volume, policy block rate, approval queue depth, and execution latency. Supports integration with monitoring systems (Prometheus, CloudWatch, Datadog) via standard metrics formats.
Provides MCP-level metrics that capture the full lifecycle of tool calls (request, policy evaluation, approval, execution), enabling end-to-end observability without instrumenting individual tools
Collects MCP protocol-level metrics that generic application monitoring cannot see, providing visibility into policy decisions and approval workflows that are invisible to downstream tool implementations
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with @getcordon/core, ranked by overlap. Discovered automatically through the match graph.
mcp-runtime-guard
Policy-based MCP tool call proxy
promptspeak-mcp-server
Pre-execution governance for AI agents. Intercepts MCP tool calls before execution with deterministic blocking, human-in-the-loop holds, and behavioral drift detection.
tegata
Enforceable authorization for MCP tool calls
@policylayer/intercept
Policy-as-code enforcement for MCP tool calls
@oconnector/mcp-gateway
Security Proxy for Model Context Protocol — Govern any MCP tool call with ABS Core NRaaS (Non-Repudiation as a Service)
cordon-cli
The security gateway for AI agents — firewall, auditor, and remote control for MCP tool calls
Best For
- ✓Teams deploying LLM agents in production environments with security requirements
- ✓Organizations using MCP servers that expose sensitive APIs or data operations
- ✓Developers building AI systems that need compliance-aware tool execution
- ✓Regulated industries (finance, healthcare, legal) requiring human oversight of AI decisions
- ✓Teams building customer-facing AI agents that need approval gates before state-changing operations
- ✓Organizations with compliance requirements for AI-driven actions
- ✓Teams with strict schema requirements
- ✓Systems where tool definitions are formally specified
Known Limitations
- ⚠Policy evaluation adds latency to each tool call (exact overhead depends on policy complexity)
- ⚠Policies are statically defined at proxy initialization — no runtime policy updates without restart
- ⚠Does not provide cryptographic signing or attestation of tool calls, only blocking/allowing
- ⚠Introduces latency — tool calls are blocked until human approval, potentially seconds to minutes
- ⚠Requires external state management or persistence layer to track pending approvals across restarts
- ⚠No built-in UI for approval — integrators must build their own approval interface or use webhooks
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Package Details
About
Core proxy engine for Cordon for MCP — the security gateway for MCP tool calls
Categories
Alternatives to @getcordon/core
Search the Supabase docs for up-to-date guidance and troubleshoot errors quickly. Manage organizations, projects, databases, and Edge Functions, including migrations, SQL, logs, advisors, keys, and type generation, in one flow. Create and manage development branches to iterate safely, confirm costs
Compare →Are you the builder of @getcordon/core?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →