MCP Catalogs
Homeironcurtain screenshot

ironcurtain

by provos·419·Score 50

A secure runtime for AI agents with policy enforcement via natural language constitutions.

securitydeveloper-toolsai-llm
56
Forks
5
Open issues
this month
Last commit
2d ago
Indexed

Overview

IronCurtain provides a secure runtime environment for autonomous AI agents, where security policies are derived from human-readable constitutions. It enforces policies through an MCP-based architecture, allowing or denying tool calls based on plain-language security rules. The system assumes the LLM may be compromised and enforces security boundaries without trusting the model's intent.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:Secure code development with automated git operations and file management
you:AI agent orchestration with custom security policies
you:Production deployment of autonomous AI systems with safety guardrails
you:How does IronCurtain enforce security?
you:What isolation mechanisms are used?

When to choose this

Choose IronCurtain when building autonomous AI agents that need strong security boundaries and policy enforcement, especially when working with sensitive operations like file system access, git operations, or API interactions.

When NOT to choose this

Avoid IronCurtain if you need high-performance computing with minimal overhead, as the security enforcement adds latency; or if you require deterministic behavior without human approval workflows.

Tools this server exposes

6 tools extracted from the README
  • git_status

    Check git status of a repository

  • git_diff

    Show differences between files in git

  • git_push

    Push commits to a remote git repository

  • git_clone

    Clone a git repository

  • git_pull

    Pull changes from a remote repository

  • git_fetch

    Fetch changes from a remote repository

Note: Tool names inferred from policy examples and documentation. MCP servers like filesystem and git are mentioned but specific tools not exhaustively listed.

Comparable tools

deepsecrets-mcpsandboxed-toolllm-guardrails

Installation

# Install globally
npm install -g @provos/ironcurtain

# Setup API keys
export ANTHROPIC_API_KEY=sk-ant-...

# Run setup wizard
ironcurtain setup

# Start with terminal multiplexer (recommended)
ironcurtain mux

FAQ

How does IronCurtain enforce security?
It enforces security through a policy engine that checks every MCP tool call against compiled rules from a natural language constitution, allowing, denying, or escalating actions.
What isolation mechanisms are used?
IronCurtain uses V8 sandboxes for code execution, Docker containers for agents with no network access, and semantic interposition through MCP servers.

On Hacker News

Recent discussion from the developer community.

Compare ironcurtain with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.