KAIZA-MCP-server
Verified Safeby dylanmarriner
Overview
Enterprise governance gateway for AI-driven development, transforming unconstrained AI agents into governed execution authorities.
Installation
node server.jsEnvironment Variables
- KAIZA_BOOTSTRAP_SECRET
- KAIZA_ATTESTATION_SECRET
- CALLER_ID
Security Notes
The KAIZA MCP server is designed with a strong 'security-first' and 'fail-closed' philosophy. It implements a zero-trust execution model, plan-based authorization, cryptographic audit trails, and extensive write-time policy enforcement (stub detection, language-specific rules, intent co-requirement). Path traversal is strictly prevented, and all write operations are subject to preflight checks and atomic reverts upon failure. All secrets are expected via environment variables. Communication is primarily over stdio, reducing network attack surface. Comprehensive adversarial testing and remediations are documented.
Similar Servers
klavis
Develop and deploy AI agents that interact with a wide array of web services (e.g., Gmail, YouTube, LinkedIn, Supabase, Salesforce, Kubernetes) through a standardized Model Context Protocol (MCP), often orchestrated by an intelligent routing layer like Strata.
archestra
A platform for securely deploying, orchestrating, and managing Model Context Protocol (MCP) servers and their AI-powered tools within an enterprise environment.
mcp-gateway-registry
Provides a programmatic interface to interact with the main MCP Gateway Registry API, enabling tasks like registering/toggling services, managing groups/users, and intelligently discovering tools across registered services using semantic search and access control.
mesh
An open-source control plane for Model Context Protocol (MCP) traffic, providing unified authentication, routing, observability, and tool management for AI agents and integrations across various services.