What mcpwall Does
and Doesn’t
Protect Against
Where mcpwall sits
mcpwall is a transparent stdio proxy. It intercepts every JSON-RPC message from your AI coding tool to the MCP server. Rules are YAML, evaluated top-to-bottom, first match wins.
The key word is bidirectional firewall. Since v0.2.0, mcpwall inspects both what your AI agent asks to do and what the server sends back. Secrets in responses are redacted, prompt injection patterns are blocked.
8 attack classes blocked out of the box
No configuration needed. These default rules apply automatically and scan every argument value recursively.
Plus: JSON-RPC batch bypass fixed (C1), ReDoS mitigation at config load, symlink resolution for path traversal, crash protection with fail-open behavior.
Known limitations
These are attack classes that mcpwall does not yet mitigate. We’re publishing them because hiding limitations is worse than having them.
One layer, not the whole stack
mcpwall is not a complete security solution. It’s one layer in a defense-in-depth strategy. We recommend combining it with:
Closing the gaps
Every “not covered” item above has a plan:
v0.2.0Response inspection — outbound rules scan responses for secrets, injection, and suspicious content (shipped)v0.3.0Tool integrity / rug pull detection — hash descriptions, detect changesv0.3-4HTTP/SSE proxy mode — support remote MCP serversv0.4.0Rate limiting — throttle excessive tool calls