Kaiza MCP Server

Kaiza MCP Server

Enables secure, audited file operations with LLMs by enforcing implementation plans, restricting writes to approved file scopes, and maintaining a tamper-evident audit log with stub detection.

Category
Visit Server

README

KAIZA MCP: Canonical Workflow (Authoritative)

Enterprise Governance Gateway for LLM-Driven Development

KAIZA is a high-assurance Model Context Protocol (MCP) implementation designed to enforce strict role boundaries, deterministic execution, and cryptographic auditability. It transforms an LLM agent from an unconstrained generator into a governed Execution Authority.

๐Ÿ› ๏ธ Technical Setup

Prerequisites

  • Node.js: version 18 or later.
  • MCP Client: compatible client like Claude Desktop or Windsurf.

Installation

git clone <repository-url> KAIZA-MCP-server
cd KAIZA-MCP-server
npm install

Configuration

Add KAIZA to your MCP client configuration (e.g., claude_desktop_config.json or mcp_config.json):

{
  "mcpServers": {
    "kaiza": {
      "command": "node",
      "args": ["/absolute/path/to/KAIZA-MCP-server/server.js"],
      "env": {
        "KAIZA_BOOTSTRAP_SECRET": "your-secure-secret-here"
      }
    }
  }
}

[!IMPORTANT] Change /absolute/path/to/KAIZA-MCP-server to the actual location on your machine. KAIZA_BOOTSTRAP_SECRET is required for initializing fresh mission roots.

๐Ÿ›ก๏ธ The Authoritative Invariants

  1. Mandatory Ignition: No operations are permitted without a begin_session call locking the workspace_root.
  2. Role Purity: Tools are manifested dynamically based on the active role (ANTIGRAVITY for Planning, WINDSURF for Execution).
  3. Hash-Only addressing: Plans are identified strictly by their SHA256 content hash (<HASH>.md).
  4. Canonical Metadata: Every write operation must include mandatory role-specific metadata for the audit chain.
  5. Zero Discovery: No directory listing allowed outside of explicit governance discovery (list_plans).

๐Ÿš€ The Lifecycle

1. Session Ignition

Every session must begin with begin_session. This locks the repository root and initializes the path resolver.

2. Role Selection

  • ANTIGRAVITY: The Planning Role. Focuses on architectural intent and semantic contracts.
  • WINDSURF: The Execution Role. Focuses on mechanical implementation of approved plans.

3. Plan Authorization

All modifications must target an APPROVED plan. A plan is approved if it contains the canonical header:

<!--
KAIZA_PLAN_HASH: <64-char-sha256-hash>
ROLE: <ANTIGRAVITY|WINDSURF>
STATUS: APPROVED
-->

๐Ÿ—๏ธ Role: ANTIGRAVITY (The Architect)

Purpose: Define the mission parameters, architectural boundaries, and implementation contracts.

Example Prompt

"๐Ÿง  I am in the ANTIGRAVITY role. I need to initialize a session at /home/lin/Documents/my-project. Once initialized, I will read the requirements, call list_plans to see existing state, and then use bootstrap_create_foundation_plan to establish a new governance plan for the feature I'm designing. I will ensure the plan content includes the STATUS: APPROVED header and the SHA256 hash of the content."

Planning Tools

  • list_plans: Discover approved plans in the repository.
  • read_file: Safe, audited reading of existing code and docs.
  • bootstrap_create_foundation_plan: Create the initial approved mission contract.

๐Ÿ”จ Role: WINDSURF (The Builder)

Purpose: Execute the changes specified in approved plans with absolute mechanical precision.

Example Prompt

"โš™๏ธ I am in the WINDSURF role. I need to begin a session at /home/lin/Documents/my-project. After ignition, I will satisfy the prompt gate via read_prompt({ name: 'WINDSURF_CANONICAL' }). I will then list plans to find the approved hash for the task. Finally, I will implement the changes using write_file, ensuring I provide the plan hash and all required role metadata (role, purpose, connectedVia, etc.)."

Execution Tools

  • read_prompt: Unlock write capabilities by acknowledging the canonical protocol.
  • write_file: Authoritative audited write. Requires a valid plan hash and full metadata.
  • read_audit_log: Inspect the session's hash chain for verification.

๐Ÿ› ๏ธ Tool Reference (Core)

begin_session

Locks the session to an absolute workspace_root. MANDATORY FIRST CALL.

write_file

The primary mutation tool.

  • Plan Hash: Must match a file in docs/plans/<HASH>.md.
  • Metadata: Requires role, purpose, connectedVia, registeredIn, failureModes.
  • Stub Detector: Automatically rejects code containing TODO, FIXME, or placeholder logic.

๐Ÿ“ Repository Governance

Plans and audit data are stored in canonical locations:

  • Plans: docs/plans/ (Hash-addressed .md files).
  • Audit Log: audit-log.jsonl (Append-only operation history).
  • Governance: governance.json (Maintains bootstrap state).

๐Ÿงช Verification

Ensure your environment is compliant by running:

npm run verify

This executes the full suite of bootstrap, enforcement, and security penetration tests.


KAIZA MCP: Refining the boundary between intelligence and execution.

Recommended Servers

playwright-mcp

playwright-mcp

A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.

Official
Featured
TypeScript
Magic Component Platform (MCP)

Magic Component Platform (MCP)

An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.

Official
Featured
Local
TypeScript
Audiense Insights MCP Server

Audiense Insights MCP Server

Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.

Official
Featured
Local
TypeScript
VeyraX MCP

VeyraX MCP

Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.

Official
Featured
Local
Kagi MCP Server

Kagi MCP Server

An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.

Official
Featured
Python
graphlit-mcp-server

graphlit-mcp-server

The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.

Official
Featured
TypeScript
Qdrant Server

Qdrant Server

This repository is an example of how to create a MCP server for Qdrant, a vector search engine.

Official
Featured
Neon Database

Neon Database

MCP server for interacting with Neon Management API and databases

Official
Featured
Exa Search

Exa Search

A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.

Official
Featured
E2B

E2B

Using MCP to run code via e2b.

Official
Featured