Kaiza MCP Server
Enables secure, audited file operations with LLMs by enforcing implementation plans, restricting writes to approved file scopes, and maintaining a tamper-evident audit log with stub detection.
README
KAIZA MCP: Canonical Workflow (Authoritative)
Enterprise Governance Gateway for LLM-Driven Development
KAIZA is a high-assurance Model Context Protocol (MCP) implementation designed to enforce strict role boundaries, deterministic execution, and cryptographic auditability. It transforms an LLM agent from an unconstrained generator into a governed Execution Authority.
๐ ๏ธ Technical Setup
Prerequisites
- Node.js: version 18 or later.
- MCP Client: compatible client like Claude Desktop or Windsurf.
Installation
git clone <repository-url> KAIZA-MCP-server
cd KAIZA-MCP-server
npm install
Configuration
Add KAIZA to your MCP client configuration (e.g., claude_desktop_config.json or mcp_config.json):
{
"mcpServers": {
"kaiza": {
"command": "node",
"args": ["/absolute/path/to/KAIZA-MCP-server/server.js"],
"env": {
"KAIZA_BOOTSTRAP_SECRET": "your-secure-secret-here"
}
}
}
}
[!IMPORTANT] Change
/absolute/path/to/KAIZA-MCP-serverto the actual location on your machine.KAIZA_BOOTSTRAP_SECRETis required for initializing fresh mission roots.
๐ก๏ธ The Authoritative Invariants
- Mandatory Ignition: No operations are permitted without a
begin_sessioncall locking theworkspace_root. - Role Purity: Tools are manifested dynamically based on the active role (ANTIGRAVITY for Planning, WINDSURF for Execution).
- Hash-Only addressing: Plans are identified strictly by their SHA256 content hash (
<HASH>.md). - Canonical Metadata: Every write operation must include mandatory role-specific metadata for the audit chain.
- Zero Discovery: No directory listing allowed outside of explicit governance discovery (
list_plans).
๐ The Lifecycle
1. Session Ignition
Every session must begin with begin_session. This locks the repository root and initializes the path resolver.
2. Role Selection
- ANTIGRAVITY: The Planning Role. Focuses on architectural intent and semantic contracts.
- WINDSURF: The Execution Role. Focuses on mechanical implementation of approved plans.
3. Plan Authorization
All modifications must target an APPROVED plan. A plan is approved if it contains the canonical header:
<!--
KAIZA_PLAN_HASH: <64-char-sha256-hash>
ROLE: <ANTIGRAVITY|WINDSURF>
STATUS: APPROVED
-->
๐๏ธ Role: ANTIGRAVITY (The Architect)
Purpose: Define the mission parameters, architectural boundaries, and implementation contracts.
Example Prompt
"๐ง I am in the ANTIGRAVITY role. I need to initialize a session at
/home/lin/Documents/my-project. Once initialized, I will read the requirements, calllist_plansto see existing state, and then usebootstrap_create_foundation_planto establish a new governance plan for the feature I'm designing. I will ensure the plan content includes theSTATUS: APPROVEDheader and the SHA256 hash of the content."
Planning Tools
list_plans: Discover approved plans in the repository.read_file: Safe, audited reading of existing code and docs.bootstrap_create_foundation_plan: Create the initial approved mission contract.
๐จ Role: WINDSURF (The Builder)
Purpose: Execute the changes specified in approved plans with absolute mechanical precision.
Example Prompt
"โ๏ธ I am in the WINDSURF role. I need to begin a session at
/home/lin/Documents/my-project. After ignition, I will satisfy the prompt gate viaread_prompt({ name: 'WINDSURF_CANONICAL' }). I will then list plans to find the approved hash for the task. Finally, I will implement the changes usingwrite_file, ensuring I provide theplanhash and all required role metadata (role,purpose,connectedVia, etc.)."
Execution Tools
read_prompt: Unlock write capabilities by acknowledging the canonical protocol.write_file: Authoritative audited write. Requires a valid plan hash and full metadata.read_audit_log: Inspect the session's hash chain for verification.
๐ ๏ธ Tool Reference (Core)
begin_session
Locks the session to an absolute workspace_root. MANDATORY FIRST CALL.
write_file
The primary mutation tool.
- Plan Hash: Must match a file in
docs/plans/<HASH>.md. - Metadata: Requires
role,purpose,connectedVia,registeredIn,failureModes. - Stub Detector: Automatically rejects code containing
TODO,FIXME, or placeholder logic.
๐ Repository Governance
Plans and audit data are stored in canonical locations:
- Plans:
docs/plans/(Hash-addressed.mdfiles). - Audit Log:
audit-log.jsonl(Append-only operation history). - Governance:
governance.json(Maintains bootstrap state).
๐งช Verification
Ensure your environment is compliant by running:
npm run verify
This executes the full suite of bootstrap, enforcement, and security penetration tests.
KAIZA MCP: Refining the boundary between intelligence and execution.
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
Audiense Insights MCP Server
Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.
VeyraX MCP
Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.
Kagi MCP Server
An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.
graphlit-mcp-server
The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.
Qdrant Server
This repository is an example of how to create a MCP server for Qdrant, a vector search engine.
Neon Database
MCP server for interacting with Neon Management API and databases
Exa Search
A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.
E2B
Using MCP to run code via e2b.