Skip to main content
Glama
dylanmarriner

Kaiza MCP Server

ATLAS-GATE MCP

A Level-5 Zero-Trust Context Provider & Agentic Safety Enclave

TypeScript Status Model Context Protocol

ATLAS-GATE is a highly opinionated Model Context Protocol (MCP) server engineered to wrap AI coding assistants (like Windsurf) in a chroot-esque virtual jail, enforcing strict "Plans are Laws" cryptographic execution models and ensuring deterministic safety limits for autonomous codebase manipulation.


🛡️ Core Security Philosophy

AI tools are inherently non-deterministic. Running them attached to privileged development environments is a catastrophic security vulnerability waiting to happen.

ATLAS-GATE solves this by imposing three uncompromising constraints:

  1. "Plans are Laws": Before any code is written, a declarative JSON Plan must be generated, linted against safety invariants, and cryptographically signed using Sigstore Cosign (ECDSA P-256).

  2. Chroot Boundaries: The MCP server virtualizes the absolute paths requested by the AI. Symlink escapes, generic directory traversal, and environment snooping are trapped.

  3. Fail-Closed Execution: Every file mutation (write_file) requires a .intent.md co-artifact. If an execution drifts from the pre-approved plan, or if stub code (TODO, TBD, mock data, empty catch blocks, or Rust panics) is detected, the process terminates immediately and logs a SIEM alert.


🏗️ Architecture Flow

graph TD
    classDef ai fill:#2B303A,stroke:#00E5FF,stroke-width:2px,color:#FFF
    classDef sec fill:#4B0082,stroke:#FF00FF,stroke-width:2px,color:#FFF
    classDef tool fill:#0E1F2C,stroke:#4CAF50,stroke-width:1px,color:#FFF
    
    A[Human Prompt] -->|Initiates| B((ANTIGRAVITY<br/>Planning Agent))
    B -->|Drafts JSON Plan| C[lint_plan_tool]
    
    C -->|Fails Invariants| D{Reject & Recalculate}
    D --> B
    
    C -->|Passes| E[save_plan_tool]
    E -->|ECDSA P-256 Signing| F[Immutable .json Plan Bundle]
    
    F -->|Transmitted to| G((WINDSURF<br/>Execution Agent))
    G -->|Requests Action| H{ATLAS-GATE Tool Sandbox}
    
    H -->|read_file| I[(Virtualized Volume)]
    H -->|write_file| J{Write-Time Policy Engine}
    
    J -->|intent-validator.js| K[.intent.md Requirement]
    J -->|stub-detector.js| L[No Stubs, mock data, TODOs]
    J -->|Universal Denylist| M[Bans empty catches, unwrap, etc]
    
    K & L & M -->|Violation detected| N[Fatal Error & SIEM Log]
    K & L & M -->|Approved| I
    
    class B,G ai;
    class C,E,J,K,L,M sec;
    class H tool;

🔒 Security Features

1. Deterministic Virtual Filesystem (VFS)

  • Path Virtualization: To the AI, the root repository is /jail/mcp-session. The server translates this back to absolute paths strictly within the authorized sandbox.

  • Symlink Protection: Directory traversal attacks (../../) and unresolved symlinks outside the root are hard-blocked.

2. Zero-Stub Policy Enforcement (Write-Time Engine)

  • Objective: Prevent AI "laziness" from reaching production.

  • Mechanism: Deep AST parsing on file writes traps TODO, pass, empty catch{} blocks, mock schemas, unwrap/expect in Rust, and placeholder IP addresses. Write requests failing the Write-Time Policy Engine are aborted entirely.

3. JIT Node.js Global Stripping

  • Objective: Stop the AI from executing shell commands.

  • Mechanism: At the V8 isolate level, dangerous globals (eval, child_process, exec, setInterval) are deleted before the MCP tools are registered.

4. SIEM-Ready Audit Firehose

Every prompt payload, linting failure, path translation, file write, and invariant violation is dumped to an append-only, cryptographic hash-chained audit-log.jsonl intended for immediate ingestion by Splunk/Datadog.

5. Intent Artifacts

No file mutation may occur without a companion .intent.md document mapping the write to the specific phase of the approved plan.


🚀 Installation & Usage

Prerequisites

  • Node.js 20.x+

  • An MCP-compatible client (e.g., Claude Desktop, Windsurf, Cursor)

  • Cosign / Sigstore CLI (for external verification of plan signatures)

Local Dev Setup

git clone https://github.com/dylanmarriner/ATLAS-GATE-MCP.git
cd ATLAS-GATE-MCP
npm install
npm run build

Environment Configuration

The server operates securely out-of-the-box, but you can configure strict modes:

# Export the directory you want the AI to be restricted to
export ATLAS_WORKSPACE_ROOT=/home/user/my-project

# Required: Enforce cryptographic signing of plans
export ATLAS_ENFORCE_COSIGN=true 

Running the Server

npm start

Integrating with Windsurf

Add the following to your windsurf_config.json:

{
  "mcpServers": {
    "atlas-gate": {
      "command": "node",
      "args": ["/path/to/ATLAS-GATE-MCP/build/index.js"],
      "env": {
        "ATLAS_WORKSPACE_ROOT": "/path/to/your/project",
        "ATLAS_ENFORCE_COSIGN": "true"
      }
    }
  }
}

📜 Agent Prompting Templates

To effectively utilize the "Plans are Laws" architecture, your AI agents must be prompted correctly. Refer to the docs/templates/ directory for system prompts to seed to your Planning vs. Execution agents.

  • planning_prompt.md: Instructions for ANTIGRAVITY to generate structurally sound JSON plans.

  • plan_template.json: The canonical JSON schema required for plans to pass lint_plan and save_plan.

  • execution_template.md: Instructions for WINDSURF to strictly follow the saved plan signature ID and Write-Time Policy Engine mandates.

  • intent_artifact_template.md: The mandated schema for file mutation intents.

-
security - not tested
A
license - permissive license
-
quality - not tested

Resources

Unclaimed servers have limited discoverability.

Looking for Admin?

If you are the server author, to access and configure the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/dylanmarriner/MCP-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server