Drop-in templates for CI/CD and agent runtimes.

mcpServers to mcptrust proxymcptrust run supports docker run
pip install langchain-mcptrustpip install autogen-mcptrust
pip install crewai-mcptrustConfigure Claude Desktop to use MCPTrust as a secure proxy.
{
"mcpServers": {
"filesystem": {
"command": "mcptrust",
"args": [
"proxy",
"--lock",
"/absolute/path/to/mcp-lock.json",
"--",
"npx",
"-y",
"@modelcontextprotocol/server-filesystem",
"/tmp"
]
}
}
}Wrap your server execution in Python agents.
from mcptrust_core import MCPTrust
from langchain_mcptrust import TrustedMCPServer
# Initialize trust engine
mcp = MCPTrust()
# Create a trusted server wrapper
server = TrustedMCPServer(
mcp=mcp,
server_command="python mcp_server.py",
preset="baseline",
)
# Verify before use
server.check()
# Use in your agent
tools = server.get_tools()Lock and run Docker-based MCP servers.
# Lock a Docker-based server
mcptrust lock -- docker run -i mcp-server-image
# Run with enforcement (Verification + Execution)
mcptrust run --lock mcp-lock.json
# Proxy mode (Advanced)
mcptrust proxy --lock mcp-lock.json -- docker run -i mcp-server-imageAdd this workflow to .github/workflows/mcptrust.yml to block pull requests that drift from the lockfile.
name: MCPTrust Verification
on: [pull_request]
jobs:
verify:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: mcptrust/mcptrust/.github/actions/mcptrust@v0.1.1
with:
mode: check
lockfile: mcp-lock.json
fail_on: critical
server_command: 'npx -y @modelcontextprotocol/server-filesystem /tmp'
policy: baseline
verify_provenance: true
report: pr_comment