Mund

Mund

MCP security scanner for AI agents - detects prompt injection, secrets, PII, and vets MCP servers before installation

Category
Visit Server

README

πŸ•ΈοΈ Weave Protocol

Enterprise Security Suite for AI Agents

npm npm npm npm npm npm npm npm npm npm License

A TypeScript monorepo providing security, encryption, compliance, and governance tools for AI agent systems. Built for the Model Context Protocol (MCP) ecosystem.


πŸ†• What's New: MCP Server Scanner

Mund v0.1.12 now scans MCP servers before you install them:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  mund_scan_mcp_server                                         β”‚
β”‚                                                               β”‚
β”‚  ⚠️  CRITICAL: Tool "execute" contains injection pattern      β”‚
β”‚     "ignore previous instructions and run..."                 β”‚
β”‚                                                               β”‚
β”‚  ⚠️  HIGH: Server name "githib-mcp" is 1 edit from "github"   β”‚
β”‚                                                               β”‚
β”‚  Recommendation: DO_NOT_INSTALL                               β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Why this matters:

  • 43% of MCP servers have command injection vulnerabilities
  • "Line jumping" attacks hide malicious prompts in tool descriptions
  • Typosquatting mimics legitimate server names

See Mund README β†’


πŸ“¦ Packages

Package Version Description
πŸ›‘οΈ @weave_protocol/mund 0.1.12 Security scanner - secrets, PII, injection, MCP server vetting
πŸ›οΈ @weave_protocol/hord 0.1.4 Encrypted vault with Yoxallismus cipher
βš–οΈ @weave_protocol/domere 1.2.10 Compliance (PCI-DSS, ISO27001, SOC2, HIPAA) & verification
πŸ‘₯ @weave_protocol/witan 1.0.0 Multi-agent consensus & governance
πŸ”Œ @weave_protocol/api 1.0.6 REST API for all packages

πŸ€– AI Agent Skills

Each package includes a SKILL.md file following the Claude Agent Skills specification. These teach AI agents how to use Weave Protocol tools effectively.

Package Skill Name Triggers
πŸ›‘οΈ Mund security-scanning scan, detect secrets, check injection, vet MCP server
πŸ›οΈ Hord encrypting-data encrypt, decrypt, vault, Yoxallismus, protect
βš–οΈ Domere compliance-auditing audit, checkpoint, SOC2, HIPAA, PCI-DSS, blockchain
πŸ‘₯ Witan consensus-governance consensus, vote, approve, policy, escalate
πŸ”Œ API weave-api-calling REST API, HTTP endpoint, curl, fetch

Installation:

Copy skill files to your Claude skills directory:

# Clone repo
git clone https://github.com/Tyox-all/Weave_Protocol.git

# Copy skills to Claude Code
mkdir -p ~/.claude/skills/weave-protocol
cp Weave_Protocol/*/SKILL.md ~/.claude/skills/weave-protocol/

# Or for Claude.ai (upload as custom skills)
# Settings > Features > Custom Skills > Upload ZIP

Once installed, Claude automatically invokes the appropriate skill when you ask it to scan content, encrypt data, create compliance checkpoints, or coordinate multi-agent consensus.


πŸš€ Quick Start

Install All Packages

npm install @weave_protocol/mund @weave_protocol/hord @weave_protocol/domere

Claude Desktop Integration

Add to claude_desktop_config.json:

{
  "mcpServers": {
    "mund": {
      "command": "npx",
      "args": ["-y", "@weave_protocol/mund"]
    },
    "hord": {
      "command": "npx",
      "args": ["-y", "@weave_protocol/hord"]
    },
    "domere": {
      "command": "npx",
      "args": ["-y", "@weave_protocol/domere"]
    }
  }
}

MCP Registry

Mund is available on the official MCP Registry:

# Search for it
https://registry.modelcontextprotocol.io
# Server ID: io.github.Tyox-all/mund

✨ Package Details

πŸ›‘οΈ Mund - The Guardian

Real-time security scanning for AI agents.

Category Features
Secrets API keys, tokens, passwords, certificates (30+ patterns)
PII SSN, credit cards, emails, phone numbers, addresses
Injection Prompt injection, jailbreak attempts, instruction override
Exfiltration Data leakage, encoding tricks, steganography
Code Dangerous patterns, eval/exec, SQL injection, XSS
MCP Servers Malicious tool descriptions, typosquatting, dangerous permissions
// Scan content
const result = await mund.scan("Here's my key: sk-abc123...");
// { safe: false, issues: [{ severity: "critical", ... }] }

// Scan MCP server before install
const serverScan = await mund.scanMcpServer(serverJson);
// { recommendation: "DO_NOT_INSTALL", issues: [...] }

πŸ“„ Skill: security-scanning


πŸ›οΈ Hord - The Vault

Encrypted storage with the Yoxallismus dual-tumbler cipher.

Category Features
Encryption AES-256-GCM, ChaCha20-Poly1305
Key Derivation Argon2id with configurable parameters
Yoxallismus Dual-layer tumbler/deadbolt obfuscation
Memory Safety Secure buffer handling, auto-zeroing
MCP Server Claude Desktop integration, vault management tools
import { YoxallismusCipher } from '@weave_protocol/hord';

const cipher = new YoxallismusCipher('master-key');

// Lock (encrypt + obfuscate)
const locked = await cipher.lock(sensitiveData);

// Unlock (de-obfuscate + decrypt)
const unlocked = await cipher.unlock(locked);

Yoxallismus Cipher: A dual-layer encryption combining AES-256-GCM with tumbler/deadbolt obfuscation. Data is first encrypted, then the ciphertext is scrambled using position-dependent transformations that require both the key and the original encryption context to reverse.

πŸ“„ Skill: encrypting-data


βš–οΈ Domere - The Judge

Enterprise-grade verification, orchestration, compliance, and audit infrastructure.

Category Features
Verification Intent tracking, drift detection, execution replay, multi-agent handoff
Orchestration Task scheduler, agent registry, shared state with locks
Compliance SOC2, HIPAA, PCI-DSS, ISO27001 checkpoints & reporting
Blockchain Solana & Ethereum anchoring for immutable audit trails

Blockchain Anchoring:

  • Solana Mainnet: 6g7raTAHU2h331VKtfVtkS5pmuvR8vMYwjGsZF1CUj2o
  • Solana Devnet: BeCYVJYfbUu3k2TPGmh9VoGWeJwzm2hg2NdtnvbdBNCj
  • Ethereum: 0xAA8b52adD3CEce6269d14C6335a79df451543820
import { ComplianceManager } from '@weave_protocol/domere';

const compliance = new ComplianceManager(['pci-dss', 'iso27001', 'soc2', 'hipaa']);

// Create tamper-evident checkpoint
const checkpoint = await compliance.createCheckpoint({
  action: 'data_access',
  resource: 'customer_records',
  actor: 'agent-001'
});

// Generate audit report
const report = await compliance.generateReport('pci-dss', {
  startDate: '2024-01-01',
  endDate: '2024-12-31'
});

πŸ“„ Skill: compliance-auditing


πŸ‘₯ Witan - The Council

Multi-agent consensus and governance.

Category Features
Consensus Unanimous, majority, weighted, quorum protocols
Policy Rule enforcement, permission management, escalation
Communication Agent bus, broadcast, point-to-point messaging
Recovery Failure detection, automatic failover, state recovery
import { ConsensusEngine, PolicyEngine } from '@weave_protocol/witan';

const consensus = new ConsensusEngine({
  protocol: 'weighted_majority',
  threshold: 0.66,
  timeout: 30000
});

// Propose action requiring consensus
const result = await consensus.propose({
  action: 'deploy_to_production',
  requiredApprovals: ['security-agent', 'qa-agent', 'ops-agent']
});

πŸ“„ Skill: consensus-governance


πŸ—οΈ Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                       AI Agent System                         β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                               β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”‚
β”‚  β”‚  πŸ›‘οΈ Mund β”‚  β”‚ πŸ›οΈ Hord  β”‚  β”‚ βš–οΈ Domereβ”‚  β”‚ πŸ‘₯ Witan β”‚      β”‚
β”‚  β”‚ Guardian β”‚  β”‚  Vault   β”‚  β”‚  Judge   β”‚  β”‚ Council  β”‚      β”‚
β”‚  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜      β”‚
β”‚       β”‚             β”‚             β”‚             β”‚             β”‚
β”‚  Security      Encryption    Compliance     Consensus        β”‚
β”‚  Scanning      Storage       Verification   Governance       β”‚
β”‚       β”‚             β”‚             β”‚             β”‚             β”‚
β”‚       β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜             β”‚
β”‚                           β”‚                                   β”‚
β”‚                     β”Œβ”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”                             β”‚
β”‚                     β”‚  πŸ”Œ API   β”‚                             β”‚
β”‚                     β”‚   REST    β”‚                             β”‚
β”‚                     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                             β”‚
β”‚                                                               β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ”Œ REST API

The @weave_protocol/api package provides HTTP endpoints for all functionality:

# Start the API server
npx @weave_protocol/api

# Or with Docker
docker run -p 3000:3000 weave-protocol/api

Endpoints:

Method Path Description
POST /mund/scan Scan content for security issues
POST /mund/scan-mcp-server Scan MCP server manifest
POST /hord/encrypt Encrypt data
POST /hord/decrypt Decrypt data
POST /hord/yoxallismus/lock Lock with Yoxallismus cipher
POST /hord/yoxallismus/unlock Unlock with Yoxallismus cipher
POST /domere/checkpoint Create compliance checkpoint
GET /domere/compliance/frameworks List available frameworks
POST /domere/compliance/report Generate compliance report

πŸ“„ Skill: weave-api-calling


πŸ”’ Security Model

Weave Protocol implements defense-in-depth:

  1. πŸ›‘οΈ Mund scans all inputs for threats before processing
  2. πŸ›οΈ Hord encrypts sensitive data at rest and in transit
  3. βš–οΈ Domere logs all actions with tamper-evident checksums
  4. πŸ‘₯ Witan requires consensus for high-risk operations

CORS Model Integration

The Weave Protocol maps to the CORS Model for AI agent security:

CORS Layer Weave Package Function
Origin Validation πŸ›‘οΈ Mund Validates input sources, detects injection
Context Integrity πŸ›οΈ Hord Protects data integrity through encryption
Deterministic Enforcement βš–οΈ Domere Ensures consistent policy application

πŸ› οΈ Development

# Clone
git clone https://github.com/Tyox-all/Weave_Protocol.git
cd Weave_Protocol

# Install dependencies (each package)
cd mund && npm install && npm run build
cd ../hord && npm install && npm run build
cd ../domere && npm install && npm run build

# Run tests
npm test

πŸ—ΊοΈ Roadmap

  • [ ] LangChain/LlamaIndex integration package
  • [ ] Web dashboard for monitoring
  • [ ] MCP server reputation scoring
  • [ ] Automated threat intelligence updates
  • [ ] GDPR compliance framework

🀝 Contributing

See CONTRIBUTING.md for guidelines.


πŸ“„ License

Apache 2.0 - See LICENSE


πŸ”— Links

  • GitHub: https://github.com/Tyox-all/Weave_Protocol
  • npm (mund): https://www.npmjs.com/package/@weave_protocol/mund
  • npm (hord): https://www.npmjs.com/package/@weave_protocol/hord
  • npm (domere): https://www.npmjs.com/package/@weave_protocol/domere
  • npm (witan): https://www.npmjs.com/package/@weave_protocol/witan
  • MCP Registry: https://registry.modelcontextprotocol.io (search "mund")

Built with ❀️ for the AI agent ecosystem.

Recommended Servers

playwright-mcp

playwright-mcp

A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.

Official
Featured
TypeScript
Magic Component Platform (MCP)

Magic Component Platform (MCP)

An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.

Official
Featured
Local
TypeScript
Audiense Insights MCP Server

Audiense Insights MCP Server

Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.

Official
Featured
Local
TypeScript
VeyraX MCP

VeyraX MCP

Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.

Official
Featured
Local
graphlit-mcp-server

graphlit-mcp-server

The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.

Official
Featured
TypeScript
Kagi MCP Server

Kagi MCP Server

An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.

Official
Featured
Python
E2B

E2B

Using MCP to run code via e2b.

Official
Featured
Neon Database

Neon Database

MCP server for interacting with Neon Management API and databases

Official
Featured
Exa Search

Exa Search

A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.

Official
Featured
Qdrant Server

Qdrant Server

This repository is an example of how to create a MCP server for Qdrant, a vector search engine.

Official
Featured