VeriSwarm MCP Server
The VeriSwarm MCP Server exposes the VeriSwarm platform to AI agents through the Model Context Protocol. Any MCP-compatible client — Claude Desktop, Cursor, or custom runtimes — can check trust scores, report events, manage agents, and interact with Guard, Passport, and Vault.
Installation
pip install veriswarm-mcp
Requires Python 3.10+.
Authentication
The server authenticates using environment variables:
| Variable | Required | Description |
|---|---|---|
VERISWARM_API_URL |
No | API base URL (default: https://api.veriswarm.ai) |
VERISWARM_API_KEY |
Yes (or AGENT_KEY) |
Platform API key for workspace operations |
VERISWARM_AGENT_KEY |
Yes (or API_KEY) |
Agent-scoped key for self-reporting and credentials |
For most setups, you only need VERISWARM_API_KEY. Set VERISWARM_AGENT_KEY when the server runs on behalf of a specific agent.
Available Tools (26)
Trust Scoring (5 tools)
check_trust, check_decision, get_my_score, get_score_history, explain_score
Event Reporting (4 tools)
report_action, report_tool_call, report_interaction, report_incident
Guard Security (7 tools)
scan_tool, check_tool_allowed, get_findings, kill_agent, unkill_agent, tokenize_pii, rehydrate_pii
Passport Identity (4 tools)
get_credentials, verify_credential, verify_identity, check_delegation
Vault Audit (3 tools)
query_ledger, verify_chain, export_evidence
Agent Management (3 tools)
register_agent, get_agent, list_agents
Platform (1 tool)
platform_status
For detailed parameter descriptions, see the Python SDK or Node.js SDK documentation.
Client Configuration
Add the following to your MCP client configuration:
{
"mcpServers": {
"veriswarm": {
"command": "python",
"args": ["-m", "src"],
"env": {
"VERISWARM_API_URL": "https://api.veriswarm.ai",
"VERISWARM_API_KEY": "vs_your_platform_key"
}
}
}
}
Config file locations:
- Claude Desktop (macOS):
~/Library/Application Support/Claude/claude_desktop_config.json - Claude Desktop (Windows):
%APPDATA%\Claude\claude_desktop_config.json - Cursor:
.cursor/mcp.jsonin your project, or Cursor Settings > MCP
If using a virtual environment, replace "python" with the full path to that environment's Python binary.
Usage Examples
Check trust and make decisions
"What is the current trust score for agent
agt_abc123?"
"Can agent
agt_abc123perform afile_writeaction onproduction_db?"
Report events
"Report that agent
agt_abc123successfully calledsearch_documentsin 230ms."
"Report a high-severity prompt injection attempt from agent
agt_xyz789."
Passport credentials
"Issue me a Passport credential."
"Verify this Passport credential: eyJhbGciOi..."
Guard and Vault
"Kill-switch agent
agt_abc123— suspected data exfiltration."
"Tokenize any PII in this text before sending it to the external tool."
"Rehydrate the tokenized response so I can read the original values."
"Verify the integrity of the last 200 Vault ledger entries."
Guard Proxy Mode
Agents can connect through a Guard Proxy MCP server instead of connecting directly to upstream tool servers. The proxy transparently intercepts every tool call to apply PII tokenization, policy enforcement, injection scanning, and audit logging before forwarding requests. Configure the proxy endpoint in your MCP client config just like any other MCP server.
Rate Limits
The MCP server inherits rate limits from the VeriSwarm REST API. Limits vary by plan tier — see your workspace billing settings for details. Rate-limited requests return HTTP 429.