Overview
Use Cases
Recommended patterns for real developer workflows.
Use Cases
This document explains where SecureMCP-Lite is immediately useful and what “good” adoption looks like.
1. Read-only repository assistant
Who this is for
- OSS maintainers
- reviewers
- developers using Claude Code, Codex, Cursor, or Copilot to inspect a codebase
Problem
You want the model to understand the repo, but you do not want it to mutate files, delete content, or wander outside the project root.
Recommended policy
Use ../examples/ai-safe-filesystem.ymlFile.
What success looks like
read_fileworks inside the projectlist_dirworks inside the projectsearch_filesworks inside the project../traversal is blocked- non-allowlisted tools never reach the target server
2. Guarded shell assistant
Who this is for
- platform engineers
- DevOps teams
- developers using agentic terminal workflows
Problem
You want shell capability, but not unrestricted shell capability.
Recommended policy
Use ../examples/ai-safe-shell.ymlFile.
What success looks like
- safe diagnostic commands can run
- obvious high-risk commands are blocked
- logs show exactly what was attempted
3. Safe SQL assistant
Who this is for
- analytics engineers
- database engineers
- backend developers exploring schemas or read-only query workflows
Problem
You want SQL assistance without giving the model silent power to mutate or destroy schemas.
Recommended policy
Use ../examples/ai-safe-sql.ymlFile.
What success looks like
- read-oriented query workflows can continue
DROP,TRUNCATE,ALTER, and destructive write patterns are blocked- looped or repeated requests are rate-limited
4. Shared team policy for AI-enabled repos
Who this is for
- engineering teams experimenting with MCP
- repos that want consistent agent boundaries
- maintainers who want to reduce “works on my machine” policy drift
Recommended setup
- install SecureMCP-Lite as a dev dependency
- commit
secure-mcp.yml - commit one client config example, or document a shared
npm run mcp:repo-guardscript
What success looks like
- new contributors do not have to invent their own local guardrails
- the repo documents its intended agent safety posture
- dangerous defaults are narrowed without forking the target MCP server