MCP Gateway
Monitor and enforce policies for MCP tool calls between AI agents and external services.
The MCP Gateway sits as a transparent proxy between AI agents and MCP servers. Every tool call passes through the Palveron Verify flow: Policy Check → Budget Check → Trace → optional Flare Anchor.
Two Operating Modes
| Mode | How it works | Use case |
|---|---|---|
| Enforcement Gateway | Palveron forwards HTTP/SSE traffic — tool calls are intercepted, inspected, and forwarded | Coding agents (Cursor, Windsurf, Claude Code), in-house MCP servers |
| Governance Control Plane | SaaS platforms send events via the Extension API | Salesforce Einstein, Microsoft Copilot, ServiceNow (native agents that cannot be proxied) |
How It Works
- Register an MCP server in the dashboard or via API
- Scan the server to discover available tools and their risk levels
- Create policies that control which agents can use which tools
- Route traffic through the Palveron proxy endpoint
- Every tool call produces a tamper-evident trace with optional Flare blockchain attestation
Proxy Endpoint
Agents connect to the Palveron-generated proxy endpoint instead of directly to the MCP server:
POST /api/v1/mcp/proxy/{server_id}
Content-Type: application/json
Authorization: Bearer {project_api_key}
{
"jsonrpc": "2.0",
"method": "tools/call",
"params": { "name": "query_records", "arguments": { "query": "SELECT Id FROM Account" } },
"id": 1
}Palveron forwards the JSON-RPC request to the actual MCP server after all checks have passed.
Policy Actions
Four enforcement actions available per tool:
| Action | Behavior |
|---|---|
ALLOW | Tool call is allowed (default when no policy matches) |
DENY | Tool call is blocked — the agent receives a JSON-RPC error |
REQUIRE_APPROVAL | Tool call is queued for manual approval — 30 min expiry |
LOG_ONLY | Tool call is allowed but produces a detailed audit trace |
Security Features
- Tool poisoning detection — SHA-256 hash of tool descriptions, alerts on changes (rug-pull detection)
- Risk classification — Automatic CRITICAL/HIGH/MEDIUM/LOW based on tool capabilities
- Emergency stop — Instantly block all MCP servers or a specific server/agent
- Blockchain audit trail — BLOCKED decisions and HIGH/CRITICAL-risk calls are attested on Flare
Connector Templates
Preconfigured setups for major SaaS platforms:
| Template | Policies | Coverage |
|---|---|---|
| Salesforce Einstein | 6 | CRM queries, record CRUD, bulk export blocking |
| Microsoft Copilot | 7 | Email, documents, Teams, prevention of external sharing |
| ServiceNow | 7 | Incidents, workflows, change requests, delete blocking |
Create via API: POST /api/v1/mcp/servers/from-template { "template": "salesforce" }