MCP (Model Context Protocol) security validates tool calls before execution in agent workflows, preventing unauthorized tool use, argument injection, and resource access violations.
Overview
As AI agents gain the ability to call external tools via the Model Context Protocol, new attack surfaces emerge. PromptGuard’s MCP security layer validates every tool call against configurable policies before execution.Capabilities
Server Allow/Block-listing
Control which MCP servers your agents can communicate with:Argument Schema Validation
Validate tool call arguments against expected schemas to prevent injection:Resource Access Policies
Define which resources tools can read or modify:- File system paths (allow-list / deny-list)
- Database tables and operations
- Network endpoints and protocols
- Environment variables and secrets
Tool Injection Detection
Identifies attempts to inject unauthorized MCP tool calls through:- Prompt-based tool invocation attempts
- Argument manipulation to access restricted resources
- Chained tool calls designed to escalate privileges
Configuration
Configure MCP security as part of your guardrail policy:Best Practices
- Default deny: Only allow-list the MCP servers your agents need
- Schema validation: Define schemas for all tool arguments
- Least privilege: Restrict resource access to the minimum required
- Monitor tool calls: Review tool call patterns in the security dashboard
- Version policies: Use policy-as-code to track MCP security changes in git