๐ First Public Beta Release โ
The AI Security Gateway is a unified security platform providing real-time monitoring, policy enforcement, and threat detection for Large Language Model (LLM) APIs, Model Context Protocol (MCP) servers and Agent-to-Agent (A2A) registry. This beta release represents a comprehensive security proxy and monitoring platform for AI infrastructure.
โจ Core Features โ
๐ฐ Budget Limits & Cost Control โ
- Monthly Budget Limits: Set spending limits per user group/team in USD
- Configurable Warning Thresholds: Alert when spending reaches configured percentage (e.g., 80%)
- Flexible Enforcement: Block requests at threshold or continue with warnings
- Automatic Monthly Reset: Budgets automatically reset at month start
- Manual Reset: Reset budgets on-demand via API or web interface
- Real-Time Tracking: Monitor current spending, utilization, and remaining budget
- Dashboard Metrics: View budget status across all teams
- Request Blocking: Automatic blocking when budget exceeded (HTTP 402 Payment Required)
๐ Multi-Proxy Management โ
- Unlimited Proxy Instances: Run multiple MCP and LLM proxies simultaneously
- Transport Protocol Support: HTTP, WebSocket, and Server-Sent Events (SSE)
- Centralized Management: Create, configure, start, stop, and restart via web interface
- Database Persistence: Configurations, alerts, and audit logs stored in SQLite
- Per-Proxy Monitoring: Individual health checks and performance metrics
- Auto-Start Support: Configure proxies to start automatically on system boot
๐ก๏ธ Custom Security Policies โ
- 159+ Detection Rules: Built-in rules across critical, high, medium, and low severity
- JSON-Based Configuration: Easy-to-customize policy definitions
- Real-Time Threat Detection: SQL injection, command injection, path traversal, XSS, and more
- Policy Templates:
critical-security,standard-security,mcp-advanced-security,llm-securityand many more - Per-Proxy Assignment: Different security levels for different use cases
- Custom Policy Creation: Organization-specific security requirements
- Advanced Pattern Matching: Regex-based rules with polymorphic detection
๐ฌ System Prompt Injection (Experimental) โ
- Automatic Injection: Security controls injected into LLM requests automatically
- Per-Proxy Assignment: Different prompts for different LLM proxies
- Per-User Group Assignment: Fine-grained control via API keys/groups
- Security & Compliance: Enforce data protection, compliance, and behavioral guidelines with system prompts injected into requests
- Audit Logging: Complete logging of all prompt operations
๐ OAuth Proxy with Dynamic Client Registration โ
- Dynamic Client Registration (DCR): RFC 7591 compliant automatic client registration
- Dual Operating Modes:
- Upstream Mode: Pass-through proxy forwarding tokens to OAuth providers
- Gateway Mode: Full OAuth 2.1 Authorization Server managing tokens
- Automatic Discovery: RFC 8414 compliant well-known endpoints
- PKCE Enforcement: Complete RFC 7636 support with dual PKCE flows
- Supported Providers: Google, GitHub, Azure AD, Okta, Auth0, GitLab, Keycloak, custom OAuth 2.0/2.1
- Hybrid Authentication: OAuth tokens AND API keys work simultaneously
- User Attribution: Full request attribution with identity, email, timestamps, risk scores
- Secure Token Management: AES-256-GCM encrypted storage with automatic refresh
- Consent Screens: Optional user consent for OAuth flows
- Audit Logging: Complete OAuth transaction logging for compliance (SOC2, ISO 27001, HIPAA, GDPR)
- Zero Configuration Clients: Works with Cursor IDE, Claude Desktop, and other MCP clients
๐ Real-Time Monitoring & Analytics โ
- Live Dashboard: Real-time metrics, request rates, error rates, security alerts
- Traffic Analysis: Monitor all requests and responses through proxies
- MCP Tool Discovery & Control: Automatic discovery with fail-closed security (disabled by default)
- LLM Token Usage Tracking: Monitor consumption, costs, and usage patterns per proxy
- WebSocket Integration: Real-time updates without polling
- Alert Management: Advanced filtering, pagination, status workflow
- Observability & Monitoring: Langfuse, Prometheus, Grafana, OpenTelemetry, Jaeger integration
- Integrations & Notifications: SIEM, SOAR, Slack notifications
๐ Observability & Metrics Monitoring โ
- Langfuse: Send LLM traces to Langfuse for observability and analytics, easily configured from the Settings
- Prometheus Metrics: Native metrics endpoint (
/api/v1/metrics/prometheus) - Grafana Integration: Pre-built dashboard queries and panels
- OpenTelemetry Tracing: Distributed tracing via OTLP protocol
- Jaeger Integration: Full support for trace visualization and debugging
- Comprehensive Metrics: Request percentiles (p50, p95, p99), database performance, connection pools, policy stats, WebSocket metrics, system resources
- Production Ready: Configurable sampling rates, trace propagation, OTLP-compatible backends
- Zero Configuration: Metrics enabled by default; tracing configurable via environment
๐ก๏ธ MCP Vulnerability Scanner โ
- Runtime Security Analysis: Real-time vulnerability scanning of active MCP servers
- Tool Permission Auditing: Monitor and validate MCP tool capabilities and access levels
- API Surface Assessment: Comprehensive scanning of exposed methods and resources
- Malicious Payload Detection: Identify security risks in tool responses
- Compliance Validation: Ensure MCP servers meet security standards
- Policy Integration: Automatic blocking of vulnerable endpoints
๐จ MCP Tool Change & Rug Pull Detection โ
- Tool Behavior Monitoring: Continuous analysis of execution patterns and capabilities
- Change Detection: Alert on unauthorized modifications to tool definitions, permissions, behavior
- Rug Pull Prevention: Detect sudden removal, disabling, or functionality changes
- Supply Chain Security: Monitor for malicious updates or compromised dependencies
- Baseline Establishment: Create security baselines and alert on deviations
- Attribution Tracking: Audit trails of configuration changes
- Automated Response: Automatically disable or quarantine suspicious tools
๐ค Agent-to-Agent (A2A) Registry โ
- Agent Registration: Auto-discover via AgentCard URLs or manual JSON registration
- AgentCard Management: Automatic fetching and updating of capabilities/metadata
- Access Control: Fine-grained user group-based access with per-agent rate limiting
- Agent Invocation: Send messages with streaming response support (SSE)
- Task Management: Track stateful operations (submitted, working, completed, failed)
- Security Integration: All invocations validated by policy engine with risk scoring
- Audit Logging: Complete audit trails with user attribution and request/response payloads
- Real-Time Monitoring: View invocation logs, task states, agent usage analytics
๐ Cross App Access (XAA) - ๐งช Experimental โ
Okta Identity-JAG token support for cross-application access control:
- ID-JAG Token Exchange: Validate and exchange Okta Identity-JAG tokens for cross-app authorization
- Client ID Mapping: Configure mappings between IdP client IDs and resource authorization server client IDs
- Token Revocation: Revoke ID-JAG tokens individually by JTI or in bulk by subject/IdP provider
- JWKS Caching: Automatic fetching and caching of JWKS from Okta IdP for efficient token validation
- Per-Proxy Configuration: Enable XAA on specific proxy instances through the web interface
- Statistics Dashboard: Real-time monitoring of ID-JAG token usage, JWKS cache status, and client mapping counts
- Audit Integration: Complete audit logging of XAA events (token exchange, validation, revocation) for compliance
- Web UI Management: UI components for managing client mappings, viewing stats, and revoking tokens
โ ๏ธ Experimental Feature: XAA currently supports Okta's proprietary ID-JAG token format. This feature is under active development and may change significantly as cross-app access standards evolve. Use with caution in production environments.
๐ฆ Deployment & Distribution โ
Release Packages โ
- Pre-built Binaries: Linux (amd64/arm64), macOS (amd64/arm64), Windows (amd64)
- Helper Scripts:
install.sh,verify.sh,start.sh(Unix) /start.ps1(Windows) - Service Files: Systemd (Linux), Launchd (macOS) for production deployment
- Pre-built Frontend: Production-optimized Vue.js app
- Docker Configuration:
docker-compose.frontend.ymlandDockerfile.frontend - Security Policies: 7 JSON policy files with 159+ detection rules
- Configuration Templates:
env.example,config.example.yaml - Documentation: Complete setup and usage guides
Deployment Options โ
- Docker Frontend: Nginx-based container serving Vue.js app (recommended)
- Manual Web Server: Deploy to nginx/apache with reverse proxy configuration
- Native Binary: Go binary for optimal performance (no Docker required for backend)
- Hybrid Deployment: Mixed environment support (binary + Docker, manual web server)
๐ Security Features โ
- JWT Authentication: Secure token-based authentication with role-based access control (RBAC)
- OAuth 2.1 Support: Full OAuth integration with Dynamic Client Registration (DCR)
- Session Encryption: AES-256-GCM encryption for OAuth session tokens
- Policy-Based Blocking: Real-time threat blocking based on security policies
- Audit Logging: Comprehensive logging of all security events and user actions
- CORS Protection: Configurable CORS policies with security headers
- Rate Limiting: Per-user and per-IP rate limiting to prevent abuse
- Input Validation: Comprehensive validation of all API inputs
- SQL Injection Prevention: Parameterized queries throughout the application
๐ Documentation โ
Complete documentation suite included:
- Installation and setup guides
- Multi-proxy management documentation
- A2A Agent Registry guide
- Security policies and custom policy creation
- OAuth proxy setup and configuration
- API reference with 90+ endpoints
- Alert system and traffic analysis guides
- Observability and monitoring integration
- Docker and hybrid deployment guides
- Troubleshooting and best practices
๐งช Testing & Quality โ
- Unit Tests: Comprehensive test coverage for core components
- Integration Tests: End-to-end testing with mock servers
- Benchmarks: Performance testing suite
- CI/CD: GitHub Actions workflow with automated testing
- Code Quality: golangci-lint with security rules enabled
- Security Scanning: gosec security analysis
โ ๏ธ Known Limitations โ
- Beta Software: Thorough testing recommended before production deployment
- Static Analysis Limits: Cannot detect all vulnerability types (e.g., semantic issues, prompt injection)
- Performance Variability: May vary with large codebases or high-traffic environments
- MCP Protocol Coverage: Some advanced features may not be fully covered
- Test Environments: Recommended for testing and development environments
๐ Project Metrics โ
- 159+ Detection Rules: Across all security policies
- 90+ API Endpoints: Complete REST API coverage
- 35+ Audit Event Types: Comprehensive compliance logging
- 6 Database Models: Efficient data persistence layer
- 7 Pre-built Policies: Ready-to-use security configurations
- 3 Transport Protocols: HTTP, WebSocket, SSE support
- 5 Platform Builds: Linux, macOS, Windows (multiple architectures)
๐ฏ Next Steps โ
- Community feedback incorporation
- Performance optimization based on real-world usage
- Enhanced security policy templates
- Additional enterprise integrations
- Extended observability features
- Stable release planning
Note: This is a beta release intended for testing and development. While the software has been thoroughly tested, users should conduct their own validation in production-like environments. Community feedback is welcomed and encouraged to help improve the software.
For detailed release information and downloads, see the GitHub Releases page.