MCP Firewall & Integration
How ABS Core intercepts Model Context Protocol (MCP) tool calls to enforce enterprise governance.
MCP Firewall: Securing the Agent Interface
The Model Context Protocol (MCP) is the emerging standard for agent-to-environment interaction. However, native MCP has no built-in governance layer. ABS Core fills this gap by acting as a Layer 7 Firewall for MCP.
How the MCP Firewall Works
ABS Core intercepts the binary gRPC stream (or JSON-RPC) between an agent and its MCP server. It evaluates tool calls against the WASM Core Engine before they reach the environment.
The Interception Flow
sequenceDiagram
participant A as Agent (LLM)
participant G as ABS Governance Gateway
participant P as Policy Engine (WASM)
participant S as MCP Server (Environment)
A->>G: request_tool_execution(call_data)
G->>P: evaluate_policy(context, tool, args)
P-->>G: Result (ALLOW | DENY | CHALLENGE)
alt ALLOW
G->>S: forward_call(data)
S-->>G: tool_response
G-->>A: tool_response
else DENY
G-->>A: error(Blocked by Policy)
endKey Features for Enterprises
1. Granular Tool Permissions
Grant an agent access to list_files but block delete_file or write_file based on the user's IAM role, even if the MCP server itself has broad permissions.
2. Parameter Sanitization & Masking
If an agent attempts to pass sensitive data (PII, secrets) as a tool argument, the ABS Firewall can redact or mask those parameters before they leave the secure enclave.
3. JIT Secret Injection
Instead of providing the agent with an API key for a tool, the ABS Gateway injects the SENTRY_DSN or STRIPE_KEY at the proxy level just as the request is forwarded to the MCP server. The agent never sees the secret.
Implementation Example
To protect a standard MCP-based development environment:
# policy.yaml
mcp_rules:
- tool: "run_command"
allow_regex: "^(npm install|pnpm build)$"
deny_regex: ".*(rm -rf|curl|wget).*"
risk_level: "high"
- tool: "read_file"
mask: ["password", "token", "secret"]Why This Matters
Without the ABS MCP Firewall, an agent that achieves a "jailbreak" or follows a malicious instruction can execute arbitrary commands on your infrastructure. ABS Core provides the Deterministic Barrier that ensures the agent only does exactly what it is authorized to do.