Provides a SIEM-ready audit firehose that logs prompt payloads, policy violations, and file mutations in an append-only, cryptographic hash-chained format intended for immediate ingestion and security monitoring.
Provides a SIEM-ready audit firehose that logs prompt payloads, policy violations, and file mutations in an append-only, cryptographic hash-chained format intended for immediate ingestion and security monitoring.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Kaiza MCP Serverwrite_file app/models/user.rb using plan ID 'auth-refactor-2024'"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
ATLAS-GATE MCP
A Level-5 Zero-Trust Context Provider & Agentic Safety Enclave
ATLAS-GATE is a highly opinionated Model Context Protocol (MCP) server engineered to wrap AI coding assistants (like Windsurf) in a chroot-esque virtual jail, enforcing strict "Plans are Laws" cryptographic execution models and ensuring deterministic safety limits for autonomous codebase manipulation.
🛡️ Core Security Philosophy
AI tools are inherently non-deterministic. Running them attached to privileged development environments is a catastrophic security vulnerability waiting to happen.
ATLAS-GATE solves this by imposing three uncompromising constraints:
"Plans are Laws": Before any code is written, a declarative JSON Plan must be generated, linted against safety invariants, and cryptographically signed using Sigstore Cosign (ECDSA P-256).
Chroot Boundaries: The MCP server virtualizes the absolute paths requested by the AI. Symlink escapes, generic directory traversal, and environment snooping are trapped.
Fail-Closed Execution: Every file mutation (
write_file) requires a.intent.mdco-artifact. If an execution drifts from the pre-approved plan, or if stub code (TODO,TBD, mock data, empty catch blocks, or Rust panics) is detected, the process terminates immediately and logs a SIEM alert.
🏗️ Architecture Flow
graph TD
classDef ai fill:#2B303A,stroke:#00E5FF,stroke-width:2px,color:#FFF
classDef sec fill:#4B0082,stroke:#FF00FF,stroke-width:2px,color:#FFF
classDef tool fill:#0E1F2C,stroke:#4CAF50,stroke-width:1px,color:#FFF
A[Human Prompt] -->|Initiates| B((ANTIGRAVITY<br/>Planning Agent))
B -->|Drafts JSON Plan| C[lint_plan_tool]
C -->|Fails Invariants| D{Reject & Recalculate}
D --> B
C -->|Passes| E[save_plan_tool]
E -->|ECDSA P-256 Signing| F[Immutable .json Plan Bundle]
F -->|Transmitted to| G((WINDSURF<br/>Execution Agent))
G -->|Requests Action| H{ATLAS-GATE Tool Sandbox}
H -->|read_file| I[(Virtualized Volume)]
H -->|write_file| J{Write-Time Policy Engine}
J -->|intent-validator.js| K[.intent.md Requirement]
J -->|stub-detector.js| L[No Stubs, mock data, TODOs]
J -->|Universal Denylist| M[Bans empty catches, unwrap, etc]
K & L & M -->|Violation detected| N[Fatal Error & SIEM Log]
K & L & M -->|Approved| I
class B,G ai;
class C,E,J,K,L,M sec;
class H tool;🔒 Security Features
1. Deterministic Virtual Filesystem (VFS)
Path Virtualization: To the AI, the root repository is
/jail/mcp-session. The server translates this back to absolute paths strictly within the authorized sandbox.Symlink Protection: Directory traversal attacks (
../../) and unresolved symlinks outside the root are hard-blocked.
2. Zero-Stub Policy Enforcement (Write-Time Engine)
Objective: Prevent AI "laziness" from reaching production.
Mechanism: Deep AST parsing on file writes traps
TODO,pass, emptycatch{}blocks, mock schemas,unwrap/expectin Rust, and placeholder IP addresses. Write requests failing the Write-Time Policy Engine are aborted entirely.
3. JIT Node.js Global Stripping
Objective: Stop the AI from executing shell commands.
Mechanism: At the V8 isolate level, dangerous globals (
eval,child_process,exec,setInterval) are deleted before the MCP tools are registered.
4. SIEM-Ready Audit Firehose
Every prompt payload, linting failure, path translation, file write, and invariant violation is dumped to an append-only, cryptographic hash-chained audit-log.jsonl intended for immediate ingestion by Splunk/Datadog.
5. Intent Artifacts
No file mutation may occur without a companion .intent.md document mapping the write to the specific phase of the approved plan.
🚀 Installation & Usage
Prerequisites
Node.js 20.x+
An MCP-compatible client (e.g., Claude Desktop, Windsurf, Cursor)
Cosign / Sigstore CLI (for external verification of plan signatures)
Local Dev Setup
git clone https://github.com/dylanmarriner/ATLAS-GATE-MCP.git
cd ATLAS-GATE-MCP
npm install
npm run buildEnvironment Configuration
The server operates securely out-of-the-box, but you can configure strict modes:
# Export the directory you want the AI to be restricted to
export ATLAS_WORKSPACE_ROOT=/home/user/my-project
# Required: Enforce cryptographic signing of plans
export ATLAS_ENFORCE_COSIGN=true Running the Server
npm startIntegrating with Windsurf
Add the following to your windsurf_config.json:
{
"mcpServers": {
"atlas-gate": {
"command": "node",
"args": ["/path/to/ATLAS-GATE-MCP/build/index.js"],
"env": {
"ATLAS_WORKSPACE_ROOT": "/path/to/your/project",
"ATLAS_ENFORCE_COSIGN": "true"
}
}
}
}📜 Agent Prompting Templates
To effectively utilize the "Plans are Laws" architecture, your AI agents must be prompted correctly. Refer to the docs/templates/ directory for system prompts to seed to your Planning vs. Execution agents.
planning_prompt.md: Instructions forANTIGRAVITYto generate structurally sound JSON plans.plan_template.json: The canonical JSON schema required for plans to passlint_planandsave_plan.execution_template.md: Instructions forWINDSURFto strictly follow the saved plan signature ID and Write-Time Policy Engine mandates.intent_artifact_template.md: The mandated schema for file mutation intents.
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.