Mcp-Omega-Brain
Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
| PYTHONUTF8 | No | Set to 1 to ensure UTF-8 encoding for Python | 1 |
Capabilities
Features and capabilities supported by this server
| Capability | Details |
|---|---|
| tools | {
"listChanged": false
} |
| prompts | {
"listChanged": false
} |
| resources | {
"subscribe": false,
"listChanged": false
} |
| experimental | {} |
Tools
Functions exposed to the LLM to take actions
| Name | Description |
|---|---|
| omega_preload_context | Loads episodic context for a new task by querying the RAG store, vault history, and any sealed handoff. Call this once at the start of every new task before doing any work. Returns JSON with fields: rag_matches, vault_history, handoff, continuity_type (CONTINUATION | CONTEXT_SWITCH | FRESH_START). |
| omega_rag_query | Searches the provenance RAG store using semantic similarity and returns ranked text fragments. Use this for meaning-based search; use omega_vault_search instead for exact keyword matching. Returns JSON array of {fragment, similarity_score, quality_score, source, tier}. |
| omega_ingest | Stores a new knowledge fragment in the provenance RAG store with source and evidence tier metadata. Use this to persist decisions, patterns, or findings for future retrieval via omega_rag_query. Returns JSON with fields: fragment_id, stored (boolean), timestamp. |
| omega_vault_search | Searches the vault database using exact keyword matching via SQLite FTS5. Use this for precise keyword lookups; use omega_rag_query instead for semantic/meaning-based search. Returns JSON array of matching vault entries with timestamps and session context. |
| omega_cortex_check | Read-only alignment gate that measures semantic similarity between a proposed action and the task baseline. Use this to check alignment before high-impact operations without modifying any arguments; use omega_cortex_steer instead if you want automatic argument correction. Returns JSON with fields: approved (boolean), similarity (float 0-1), verdict (APPROVED | BLOCKED). |
| omega_cortex_steer | Alignment gate with automatic argument correction for drifting tool calls. Use this instead of omega_cortex_check when you want arguments auto-corrected toward the baseline; blocks hard if similarity < 0.45, steers if 0.45-0.65, passes unchanged if > 0.65. Returns JSON with fields: similarity (float), steered_args (object), corrections (array), verdict (PASSED | STEERED | BLOCKED). |
| omega_seal_run | Appends a tamper-proof entry to the SEAL (Secure Evidence Audit Ledger) SHA-256 hash chain. Use this to create an immutable audit record of significant events, decisions, or state changes. Returns JSON with fields: seal_hash (hex string), chain_position (integer), timestamp (ISO 8601). |
| omega_log_session | Writes a complete session record to the vault for cross-session persistence. Use this at the end of a work session to record what was done; data is retrievable via omega_vault_search. Returns JSON with fields: session_id, stored (boolean), entry_count (integer). |
| omega_write_handoff | Creates a SHA-256 sealed handoff document that auto-loads on the next server restart via omega://session/preload. Use this at the end of a session to ensure seamless context continuity for the next session. Returns JSON with fields: handoff_hash (hex string), file_path (string). |
| omega_execute | Cortex-governed execution wrapper that checks alignment, steers if needed, executes, and auto-logs to the SEAL chain. Use this as the default way to invoke any Omega Brain tool with full governance; only wraps Omega Brain tools — external tools are returned with steered_args for manual invocation. Returns JSON with fields: result (object), cortex_verdict (string), seal_hash (hex string). |
| omega_brain_report | Generates a human-readable audit report showing SEAL chain entries, Cortex verdicts, and vault statistics. Use this to inspect the trust and governance layer; use omega_brain_status for a quick health summary instead. Returns formatted text report with sections: seal_tail, cortex_verdicts, vault_stats, session_health. |
| omega_brain_status | Returns a quick health summary of all Omega Brain subsystems as structured JSON. Use this for a fast status check; use omega_brain_report for a detailed audit report instead. Returns JSON with fields: vault_sessions (int), vault_entries (int), rag_fragments (int), seal_entries (int), session_id (string), uptime_seconds (float), call_count (int). |
| veritas_intake_gate | Gate 1/10: Parses, canonicalizes, and validates a BuildClaim's structure and computes SHA-256 IDs. Use this first to validate claim structure before running any downstream gates. Returns JSON with fields: verdict (PASS | VIOLATION), claim_id (hex), primitive_count (int), evidence_count (int). |
| veritas_type_gate | Gate 2/10: Enforces type-level correctness — unique primitives, non-empty domains, operator arity, symbol resolution, and unit consistency. Use this after intake to catch structural errors before evidence evaluation. Returns JSON with verdict (PASS | VIOLATION) and reason_code: TYPE_OK, TYPE_DUPLICATE_PRIMITIVE, TYPE_EMPTY_DOMAIN, TYPE_OPERATOR_ARITY, UNDEFINED_SYMBOL, or UNIT_MISMATCH. |
| veritas_dependency_gate | Gate 3/10: Analyzes supply-chain security via SBOM scan, CVE check, integrity verification, license compatibility, and dependency depth. Use this to assess third-party dependency risk before deploying or releasing. Returns JSON with verdict (PASS | MODEL_BOUND | VIOLATION) and per-dependency findings array. |
| veritas_evidence_gate | Gate 4/10: Evaluates evidence sufficiency for critical variables by computing independence (MIS_GREEDY), agreement, and quality scores. Use this to verify that evidence meets K_min, A_min, Q_min thresholds; use veritas_compute_quality or veritas_mis_greedy for individual calculations. Returns JSON with verdict (PASS | INCONCLUSIVE) and reason_code: EVIDENCE_OK, INSUFFICIENT_INDEPENDENCE, LOW_AGREEMENT, or LOW_QUALITY. |
| veritas_math_gate | Gate 5/10: Translates boundary constraints into interval arithmetic or SMT formulas and checks satisfiability with evidence values. Use this after evidence gate to verify that measured values satisfy all declared constraints. Returns JSON with verdict (PASS | VIOLATION | INCONCLUSIVE) and reason_code: MATH_OK, UNSAT_CONSTRAINT, or DECIDABILITY_TIMEOUT. |
| veritas_cost_gate | Gate 6/10: Computes resource utilization as max(cost_i / bound_i) and checks against redline thresholds. Use this to verify cost budgets are within limits; skipped automatically if no cost vector is declared. Returns JSON with verdict (PASS | MODEL_BOUND | INCONCLUSIVE), utilization (float), and reason_code: COST_OK, COST_REDLINING, COST_NOT_APPLICABLE, or UNDECLARED_COST_BOUND. |
| veritas_incentive_gate | Gate 7/10: Detects evidence monoculture by measuring source dominance (max_count_from_single_source / independent_set_size). Use this to guard against single-source bias in evidence; dominance > 0.50 triggers MODEL_BOUND. Returns JSON with verdict (PASS | MODEL_BOUND), dominance (float), and reason_code: INCENTIVE_OK or DOMINANCE_DETECTED. |
| veritas_security_gate | Gate 8/10: Evaluates security posture from SAST, secret detection, injection surfaces, auth boundaries, and TLS config. Use this to enforce zero-tolerance security policy — any CRITICAL finding or exposed secret causes VIOLATION. Returns JSON with verdict (PASS | MODEL_BOUND | VIOLATION) and findings array with severity levels. |
| veritas_adversary_gate | Gate 9/10: Stress-tests the claim against attack transforms (bound inflation, evidence removal, parameter/evidence perturbation). Use this as the final robustness check; fragility > 25% triggers MODEL_BOUND (ADVERSARY_FRAGILE). Returns JSON with verdict (PASS | MODEL_BOUND), fragility (float), attacks_tested (int), attacks_degraded (int). |
| veritas_run_pipeline | Runs the full 10-gate VERITAS pipeline: INTAKE → TYPE → DEPENDENCY → EVIDENCE → MATH → COST → INCENTIVE → SECURITY → ADVERSARY → TRACE/SEAL. Use this for complete end-to-end evaluation of a BuildClaim; use individual gates for targeted checks. Returns JSON with fields: final_verdict (PASS | MODEL_BOUND | INCONCLUSIVE | VIOLATION), gate_results (array), reason_codes (array), seal_hash (hex string). |
| veritas_compute_quality | Computes the VERITAS Quality(e) score for a single evidence item using: clamp01(0.50provenance + 0.30uncertainty + 0.20*method). Use this to evaluate individual evidence quality before submitting to the evidence gate. Returns JSON with fields: quality (float 0.0-1.0). |
| veritas_mis_greedy | Runs the MIS_GREEDY algorithm to find the maximum independent set of evidence items with no shared source, chain, dependency, or same-protocol-within-24h. Use this to check evidence independence before submitting to the evidence gate; use veritas_compute_quality for individual quality scores. Returns JSON with fields: independent_set (array), independent_count (int), total_items (int), agreement (float 0.0-1.0). |
| veritas_claeg_resolve | Maps a VERITAS verdict to a CLAEG terminal state: PASS→STABLE_CONTINUATION, MODEL_BOUND/INCONCLUSIVE→ISOLATED_CONTAINMENT, VIOLATION→TERMINAL_SHUTDOWN. Use this after a pipeline run to determine the system's required operational state. Returns JSON with fields: verdict (string), terminal_state (string), invariant (string). |
| veritas_claeg_transition | Validates whether a CLAEG state transition is permitted under closed-world rules (absence of explicit permission = prohibition). Use this before changing system operational state; TERMINAL_SHUTDOWN is absorbing (no outbound transitions). Returns JSON with fields: allowed (boolean), reason (string). |
| veritas_nafe_scan | Scans text for NAFE failure signatures: Narrative Rescue, Moral Override, Authority Drift, and Intent Inference. Use this on commit messages, PR descriptions, or incident reports to detect narrative bypasses of deterministic gates. Returns JSON with fields: clean (boolean), flags (array of detected signatures), scan_metadata (object). Violations auto-seal to the audit ledger. |
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
| omega_task_start | Brief Antigravity at task start. Detects CONTINUATION / CONTEXT_SWITCH / FRESH_START automatically. |
| omega_seal_task | ONE TAP end-of-session seal. Fully automatic: reads vault tape, auto-generates summary, logs to vault, writes S.E.A.L. trace, writes handoff. No fields required. Zero typing. |
| omega_write_handoff | Structured handoff with explicit fields. Use when you want to be precise about task, decisions, files, and next steps. The AI fills these in — you don't type them. omega_seal_task is preferred for quick workflow; this is for detailed records. |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
| Omega Startup Brain Preload | Auto-fetched at startup: RAG + handoff + vault. Zero manual calls needed. |
| Last Session Handoff | SHA-256 verified cross-session handoff file. |
| Current MCP Session | Session ID and call count. |
| Omega Brain Status | DB stats, embedding engine, ledger count. |
| VERITAS Omega Build Spec v1.0.0 | Canonical specification: invariants, thresholds, gate order, type system. Read-only source of truth. |
| CLAEG Grammar | Constraint-Locked Alignment Evaluation Grammar: terminal states, allowed transitions, prohibitions. |
| VERITAS Gate Order | The 10-gate pipeline order: INTAKE->TYPE->DEPENDENCY->EVIDENCE->MATH->COST->INCENTIVE->SECURITY->ADVERSARY->TRACE/SEAL |
| VERITAS Baseline Thresholds | Numeric thresholds for dev/baseline regime. |
| VERITAS Production Thresholds | Escalated numeric thresholds for production/release regime. |
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/VrtxOmega/omega-brain-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server