PiQrypt MCP Server
The PiQrypt MCP Server provides cryptographic audit trail capabilities for AI agents, enabling tamper-proof recording, verification, and export of agent decisions for compliance purposes.
Stamp Events (
piqrypt_stamp_event): Cryptographically sign and record agent decisions using Ed25519 signatures and hash chaining (AISS v2.0), supporting compliance with GDPR Art.22, EU AI Act Art.13, HIPAA, and SEC/FINRA.Verify Chain Integrity (
piqrypt_verify_chain): Validate that an agent's event history is intact, detecting tampering, missing records, hash chain breaks, or forks.Export Audit Trails (
piqrypt_export_audit): Export complete audit logs in portable JSON or encrypted.pqzformat, with optional PiQrypt CA certification for legal admissibility (eIDAS Art.26).Search Events (
piqrypt_search_events): Query event history by type, time range, or session to reconstruct agent activity with full chain metadata.Broad Integration: Works with MCP-compatible clients (Claude, Cursor, VS Code, Continue, Windsurf, n8n) and automation platforms like Make.com and Zapier.
Enables cryptographic audit trails for n8n automation workflows, allowing AI agents to sign decisions with cryptographic proof, verify event chain integrity, and export compliance-ready audit logs for SEC, FINRA, GDPR, or HIPAA requirements.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@PiQrypt MCP ServerSign my latest decision with a cryptographic proof for the audit trail"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
PiQrypt MCP Server
Cryptographic Audit Trail for AI Agents via Model Context Protocol
๐ What is PiQrypt MCP?
PiQrypt MCP Server provides Model Context Protocol access to PiQrypt โ the post-quantum cryptographic audit trail for AI agents.
Use cases:
๐ค AI Agents: Sign every decision with cryptographic proof
๐ n8n Workflows: Add audit trail to automation workflows
๐ฆ Trading Bots: SEC/FINRA compliance for automated trading
๐ฅ HR Automation: GDPR-compliant AI hiring decisions
๐ฅ Healthcare AI: HIPAA audit trail for medical decisions
๐ฆ Installation
Prerequisites
1. Install piqrypt (required โ Python 3.8+)
pip install piqryptThe MCP server delegates all cryptographic operations to the piqrypt Python package.
If it is not installed, the server will return a clear error on every tool call.
2. Install the MCP server (Node.js 18+)
npm install -g @piqrypt/mcp-serverInstall via npx (no global install)
npx @piqrypt/mcp-serverBuild from source
git clone https://github.com/piqrypt/piqrypt-mcp-server
cd piqrypt-mcp-server
npm install
npm run buildPIQRYPT_PYTHON โ custom Python environment
By default the server uses python3 (Linux/Mac) or python (Windows).
If piqrypt is installed in a virtual environment, set this variable to point to the right interpreter:
Windows
set PIQRYPT_PYTHON=C:\path\to\venv\Scripts\python.exeLinux / Mac
export PIQRYPT_PYTHON=/path/to/venv/bin/pythonTo make it persistent, add it to your MCP client configuration:
{
"mcpServers": {
"piqrypt": {
"command": "piqrypt-mcp-server",
"args": [],
"env": {
"PIQRYPT_PYTHON": "/path/to/venv/bin/python"
}
}
}
}โ๏ธ Configuration
Claude Desktop
Add to ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"piqrypt": {
"command": "piqrypt-mcp-server",
"args": []
}
}
}n8n (v1.88+)
Install n8n MCP integration
Add PiQrypt MCP server to configuration
Use in workflows via MCP node
Compatible with
MCP clients
Client | Version | Notes |
Any MCP-compatible client | MCP spec 2024-11+ | stdio transport |
n8n | 1.88+ | via MCP node |
Cursor | any | add to mcp settings |
VS Code | any | add to mcp settings |
Continue | any | add to mcp settings |
Windsurf | any | add to mcp settings |
Automation platforms (via MCP node)
Platform | Integration | Use case |
n8n | MCP node (native) | No-code audit trail |
Make.com | HTTP module | Webhook-triggered stamping |
Zapier | Webhooks + HTTP | Basic event recording |
What you can audit with PiQrypt MCP
Every tool call goes through the same 4 operations โ stamp, verify, export, search. Here is what that means in practice depending on your context:
Automated trading / finance Any agent that submits orders, rebalances portfolios, or triggers transactions can stamp each decision before execution. The signed chain is exportable for SEC/FINRA audit without any additional infrastructure.
HR and hiring automation Any workflow that evaluates candidates, scores CVs, or routes applicants can stamp each decision. Provides a GDPR Art.22 compliant audit trail for AI-assisted hiring โ who decided what, when, and what data was used (hashed, never stored raw).
Content and publishing pipelines Any agent that drafts, approves, or publishes content can stamp each step. Useful when multiple AI agents collaborate and you need to prove attribution โ which agent wrote what, in what order.
DevOps and CI/CD Any agent that triggers deployments, merges branches, or rotates secrets can stamp each action. Provides a tamper-evident record of infrastructure changes made by autonomous agents.
Healthcare and medical AI Any diagnostic or triage agent can stamp each recommendation. Provides a HIPAA-compliant audit trail linking each AI output to a verifiable agent identity.
The common pattern in all cases:
[Agent makes decision]
โ
piqrypt_stamp_event โ sign + chain
โ
[Agent executes action]
โ
piqrypt_export_audit โ portable proof, verifiable
without PiQrypt installed๐ ๏ธ Available Tools
1. piqrypt_stamp_event
Sign an AI decision with cryptographic proof.
Parameters:
agent_id(string, required): Agent identifierpayload(object, required): Decision dataprevious_hash(string, optional): Previous event hash for chaining
Example:
const event = await mcp.call('piqrypt_stamp_event', {
agent_id: 'trading_bot_v1',
payload: {
action: 'buy',
symbol: 'AAPL',
quantity: 100,
price: 150.25
}
});Returns:
{
"version": "AISS-1.0",
"agent_id": "trading_bot_v1",
"timestamp": 1739382400,
"nonce": "uuid-...",
"payload": { ... },
"previous_hash": "sha256:...",
"signature": "base64:..."
}2. piqrypt_verify_chain
Verify integrity of event chain.
Parameters:
events(array, required): Events to verify
Example:
const result = await mcp.call('piqrypt_verify_chain', {
events: [event1, event2, event3]
});Returns:
{
"valid": true,
"events_count": 3,
"chain_hash": "sha256:...",
"errors": []
}3. piqrypt_export_audit
Export audit trail for compliance.
Parameters:
agent_id(string, required): Agent to exportcertified(boolean): Request PiQrypt certificationoutput_format(string):jsonorpqz
Example:
const audit = await mcp.call('piqrypt_export_audit', {
agent_id: 'trading_bot_v1',
certified: true,
output_format: 'json'
});4. piqrypt_search_events
Fast search via SQLite index.
Parameters:
event_type(string, optional): Filter by typefrom_timestamp(number, optional): Start timeto_timestamp(number, optional): End timelimit(number): Max results (default: 100)
Example:
const trades = await mcp.call('piqrypt_search_events', {
event_type: 'trade_executed',
from_timestamp: 1739300000,
limit: 50
});๐ Vigil Dashboard (optional, free)
Every stamped event is visible in Vigil โ PiQrypt's local monitoring dashboard.
Note: Vigil is not launched automatically by the MCP server. You must start it separately before opening the dashboard.
piqrypt vigil
# โ http://localhost:8421Free tier includes: chain health, VRS risk score, 7-day history, CRITICAL alerts. Upgrade to Pro for 90-day history, TrustGate governance, and post-quantum signatures.
๐๏ธ Managing Agents
Agents are created automatically on first stamp. To view and delete agents:
Start Vigil:
piqrypt vigilGo to All Agents view
Check the agents to delete โ click โ Delete selected
Confirm โ Vigil returns to the welcome screen when no agents remain
Agents are stored in
~/.piqrypt/agents/on your machine. Deleting an agent removes its keys and event history permanently.
๐ Security Model
Process Isolation
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ MCP Client (any MCP-compatible client) โ
โ โ JSON-RPC over stdio โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ MCP Server (TypeScript/Node.js) โ โ No crypto here
โ โ subprocess call โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ Python Bridge (bridge.py) โ
โ โ invokes CLI โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ PiQrypt CLI (Python) โ
โ โ uses โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ Core Crypto (aiss package) โ โ All crypto here
โ โข Ed25519 / Dilithium3 โ
โ โข RFC 8785 canonical JSON โ
โ โข Hash chains โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโGuarantees
โ
Private keys never exposed to MCP layer
โ
All crypto in Python (Ed25519, Dilithium3)
โ
Same security as CLI (process isolation)
โ
RFC AISS-1.1 compliant (identical output)
โ
Input validation before subprocess call
๐ Examples
Trading Bot (n8n)
[Webhook: price alert]
โ
[AI Decision: buy/sell?]
โ
[PiQrypt MCP: stamp decision] โ Audit trail
โ
[Execute trade API]
โ
[Database: store proof]HR Automation
[Upload CV]
โ
[AI Agent: evaluate candidate]
โ
[PiQrypt MCP: stamp evaluation] โ GDPR compliance
โ
[Email HR team]๐งช Testing
# Build
npm run build
# Test bridge
python3 src/python/bridge.py stamp '{"agent_id":"test","payload":{"action":"test"}}'
# Test MCP server (manual)
node dist/index.js
# Then send MCP request via stdin๐ง Troubleshooting
Error: piqrypt is not installed in this Python environment
The Python interpreter used by the MCP server cannot find the piqrypt package.
Fix:
pip install piqryptIf piqrypt is installed in a virtual environment and not the system Python, set PIQRYPT_PYTHON to point to the correct interpreter:
# Linux / Mac
export PIQRYPT_PYTHON=/path/to/venv/bin/python
# Windows
set PIQRYPT_PYTHON=C:\path\to\venv\Scripts\python.exeTo verify which Python the server will use:
# Linux / Mac
$PIQRYPT_PYTHON -c "import aiss; print('ok')"
# Windows
%PIQRYPT_PYTHON% -c "import aiss; print('ok')"๐ Documentation
๐ค Contributing
We welcome contributions! See CONTRIBUTING.md.
๐ License
MCP Server โ MIT License - see LICENSE PiQrypt Core โ free tier + commercial tiers
๐ Links
PiQrypt Core: https://github.com/piqrypt/piqrypt
MCP Protocol: https://modelcontextprotocol.io
n8n: https://n8n.io
Documentation: https://docs.piqrypt.com
Built with โค๏ธ by PiQrypt Inc.
Maintenance
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/PiQrypt/piqrypt-mcp-server'
If you have feedback or need assistance with the MCP directory API, please join our Discord server