- Home
- MCP servers
- ZugaShield
ZugaShield
- python
0
GitHub Stars
python
Language
2 months ago
First Indexed
3 weeks ago
Catalog Refreshed
Documentation & install
Readme and setup notes from the catalogue, plus a client-ready config you can copy for your MCP host.
Installation
Add the following to your MCP client configuration file.
Configuration
View docs{
"mcpServers": {
"zuga-luga-zugashield": {
"command": "zugashield-mcp",
"args": [],
"env": {
"ZUGASHIELD_ENABLED": "true",
"ZUGASHIELD_STRICT_MODE": "false",
"ZUGASHIELD_SENSITIVE_PATHS": ".ssh,.env",
"ZUGASHIELD_LLM_JUDGE_ENABLED": "false",
"ZUGASHIELD_TOOL_GUARD_ENABLED": "true",
"ZUGASHIELD_PROMPT_ARMOR_ENABLED": "true",
"ZUGASHIELD_MEMORY_SENTINEL_ENABLED": "true",
"ZUGASHIELD_WALLET_FORTRESS_ENABLED": "true",
"ZUGASHIELD_EXFILTRATION_GUARD_ENABLED": "true"
}
}
}
}ZugaShield provides an MCP (Multiplayer Cells Protocol) server for safeguarding AI agents by validating inputs, outputs, tool calls, and memory interactions through a layered, zero-dependency security gateway. It enables seamless integration with AI platforms while enforcing threat detection and policy compliance at the MCP boundary, helping you prevent prompt injections, data leakage, and related attacks with sub-15ms overhead.
How to use
You will run the MCP server locally or in your hosting environment and connect your MCP client to it. The server exposes a set of tools that let you scan user messages, LLM outputs, tool calls, memory interactions, and documents before they are processed by or returned from the AI system. You can enable or disable individual defense layers and observe live telemetry through the provided dashboard endpoints when you integrate the FastAPI integration. Your client will send requests to the MCP server’s scan endpoints to validate inputs, tool definitions, and outputs, ensuring security policies are consistently enforced across all interactions.
How to install
Prerequisites: You need Python with pip available on your system. You may also choose to enable optional extras for dashboards and integrations.
pip install zugashield[mcp]
Configuration and usage notes
Configure the MCP server in your client setup to connect to the local or remote MCP runner. The MCP server runs as a separate process that your client can invoke for scanning inputs, tool calls, and memory interactions.
{
"mcpServers": {
"zugashield": {
"command": "zugashield-mcp"
}
}
}
Available tools and endpoints
The MCP server exposes a suite of tools for comprehensive security checks. Each tool is designed to scan a specific aspect of the interaction between your AI agent and its environment.
- scan_input: Check user messages for prompt injection
- scan_output: Check LLM responses for data leakage
- scan_tool_call: Validate tool parameters before execution
- scan_tool_definitions: Scan tool schemas for hidden payloads
- scan_memory: Check memory writes for poisoning
- scan_document: Pre-ingestion RAG document scanning
- get_threat_report: Get current threat statistics
- get_config: View active configuration
- update_config: Toggle layers and settings at runtime
Available tools
scan_input
Check user messages for prompt injection to prevent prompt manipulation.
scan_output
Check LLM responses for data leakage and exfiltration.
scan_tool_call
Validate tool parameters and guard against SSRF or harmful commands before tool execution.
scan_tool_definitions
Scan tool schemas for hidden payloads or malicious payload structures.
scan_memory
Check memory writes and reads for poisoning or leakage.
scan_document
Pre-ingestion RAG document scanning to prevent poisoning or leakage.
get_threat_report
Retrieve current threat statistics and threat catalog updates.
get_config
View the active MCP configuration and layer statuses.
update_config
Toggle defense layers and settings at runtime.