Control
Allowlist tools, restrict parameters, block traversal, deny dangerous shell or SQL patterns, and rate-limit repeated calls.
SecureMCP-Lite wraps any local stdio MCP server, enforces a YAML policy, returns proper JSON-RPC denials, and keeps logs readable for humans while stdout stays protocol-clean for agents.
npm run demo:blockednpm run demo:allowednpm run demo:sessiontools:
allow:
- read_file
- list_dir
parameterRules:
read_file:
path:
allow:
- '^/workspace/src(?:/.*)?$'
deny:
- '\.\.'INFO SecureMCP-Lite proxy started ALLOWED Forwarding client request method="tools/call" id=2 tool="read_file" BLOCKED Tool "delete_file" is not allowlisted by SecureMCP-Lite policy.
SecureMCP-Lite is not trying to be a platform. It is a local-first enforcement layer that is small enough to audit and practical enough to adopt without rebuilding your workflow.
Allowlist tools, restrict parameters, block traversal, deny dangerous shell or SQL patterns, and rate-limit repeated calls.
Reject malformed JSON-RPC locally, fail closed when the target dies, and keep stdout clean for MCP while logs stay on stderr.
Run it with npx, install it into a repo, share one policy file, and wire the same wrapper command into multiple AI clients.
Let AI agents inspect a repo, search files, and explain code without granting silent write or shell access.
Keep shell access available, but block obvious high-risk commands like rm -rf, curl | sh, or sudo.
Allow analytics and schema exploration while denying destructive query families such as DROP, TRUNCATE, and ALTER.
Check one YAML policy into the repo so contributors and reviewers inherit the same MCP guardrails instead of inventing their own local setup.
The current MVP is intentionally stdio-first. That makes it a strong fit for local MCP clients, and not yet a direct fit for remote-only MCP connector surfaces.
Local stdio integration pattern for Claude Code.
Local MCP integration pattern for Codex CLI and IDE extension.
Cursor mcp.json configuration for SecureMCP-Lite.
Raw-config integration guidance with an explicit caveat.
Editor-side local MCP configuration for Copilot Chat.
Local MCP setup for Copilot CLI.
SecureMCP-Lite is maintained as an open-source infrastructure tool for people who care about AI productivity and safety at the same time.
Need a policy layer that is small, legible, and does not demand platform-level maintenance.
Need a place to express clear allowlists and denial rules instead of trusting vague prompt instructions.
Need a practical local control layer to ship with demos, templates, or internal team workflows.