🔐

Confidential Disclosure

This page contains security research shared under responsible disclosure. Enter the access code to continue.

Invalid access code
FEAT-192 + FEAT-188 · Patent Claims 612–744 · Responsible Disclosure Filed

Your AI Agents Have
Zero Security at the Tool Boundary

MCP gives agents powerful tool access. But nobody verifies what the agent does with those tools. We found 8 blind spots. We built the fix. We disclosed it responsibly.

8
Blind Spots Fixed
7-Step
Defense Pipeline
<5ms
Fast-Path Latency
48
Patent Claims
🏗️ See Architecture 🔍 See the Blind Spots 📂 View Source Code
🏗️ System Architecture

The Complete AEGIS↔MCP Bridge

Every AI agent tool call flows through a 7-step defense pipeline — from intent classification to cryptographic session proofs. Zero GPU. Zero cloud dependency. Full sovereignty.

flowchart TB subgraph Agents["🤖 AI Agents"] AG1["Antigravity"] AG2["Cline / Cursor"] AG3["Custom Agent"] end subgraph Gateway["🚪 MCP Gateway Controller"] direction TB IG["① Intention Gate\n42-layer AEGIS cascade"] TO["② Trust Orbit Check\nO0→O4 capability gating"] MM["③ Multimodal Screening\nFingerprint + Sovereign Analyzer"] RE["④ Route & Execute\nTool dispatching"] CS["⑤ CATS Response Scan\nRAG poisoning defense"] FM["⑥ FMSP Recording\nFibonacci Merkle proof"] TR["⑦ Trust Recording\nInteraction tracking"] end subgraph MCP["🔌 MCP Servers"] R["ohm-rules-mcp\nsearch_rules, list_workflows"] M["ohm-metrics-mcp\nread_aegis_metrics"] L["ohm-logs-mcp\nread_logs"] X["External MCP\n3rd-party servers"] end subgraph AEGIS["🛡️ AEGIS Defense Layer"] CATS["CATS\n3-Tier RAG Scanner"] MFP["Modality Fingerprint\n2ms fast-path"] SLA["Sovereign Analyzer\n3-layer CPU/NPU"] POAW["POAW\nCryptographic proofs"] end subgraph Storage["💾 Sovereign Storage"] Redis["Redis\nSession store"] Proof["FMSP Proofs\n25x compression"] Audit["Audit Trail\nFull trajectory"] end Agents -->|"POST /api/mcp/invoke"| IG IG -->|"PASS"| TO IG -->|"BLOCK"| Audit TO -->|"capability OK"| MM MM -->|"clean"| RE MM -->|"suspicious"| SLA SLA -->|"deep result"| RE RE --> R & M & L & X R & M & L & X -->|"response"| CS CS -->|"safe"| FM CS -->|"poisoned"| Audit FM -->|"proof leaf"| TR TR --> Proof FM --> Redis MFP -.->|"fingerprint"| MM CATS -.->|"scan"| CS POAW -.->|"seal"| FM style Agents fill:#1e293b,stroke:#3b82f6,color:#e2e8f0 style Gateway fill:#0f172a,stroke:#10b981,color:#e2e8f0 style MCP fill:#1e293b,stroke:#a855f7,color:#e2e8f0 style AEGIS fill:#0f172a,stroke:#06b6d4,color:#e2e8f0 style Storage fill:#1e293b,stroke:#fbbf24,color:#e2e8f0
flowchart LR subgraph Orbits["Trust Orbit Model"] direction TB O0["O0 Unknown - READ only"] O1["O1 Observed - SEARCH"] O2["O2 Recognized - WRITE approved"] O3["O3 Trusted - WRITE any"] O4["O4 Verified - EXECUTE"] end O0 -->|"10 clean interactions"| O1 O1 -->|"50 + POAW attestation"| O2 O2 -->|"100 + 3 vouches"| O3 O3 -->|"250 + crypto identity"| O4 Anomaly["Anomaly Detected"] -->|"instant -2 levels"| O0 Decay["Phi Decay"] -->|"idle timeout"| O0 style O0 fill:#7f1d1d,stroke:#ef4444,color:#fecaca style O1 fill:#78350f,stroke:#f59e0b,color:#fef3c7 style O2 fill:#1e3a5f,stroke:#3b82f6,color:#bfdbfe style O3 fill:#064e3b,stroke:#10b981,color:#a7f3d0 style O4 fill:#312e81,stroke:#8b5cf6,color:#c4b5fd
flowchart TB Input["MCP Response Data"] --> T0 subgraph CATScan["Context-Aware Tiered Scanning"] T0["Tier 0 Metadata - Trusted source? 0.5ms"] T1["Tier 1 Intent Coherence - Semantic role 2ms"] T2["Tier 2 Full Cascade - Jaccard+Shannon+AEGIS 7ms"] end T0 -->|"70 pct trusted"| PASS["PASS"] T0 -->|"30 pct unknown"| T1 T1 -->|"25 pct educational"| FPS["FP-Saved"] T1 -->|"5 pct suspicious"| T2 T2 -->|"safe"| PASS T2 -->|"poisoned"| BLOCK["BLOCKED"] FPS --> Note["Context FP Save - Educational security content not flagged as attack"] style CATScan fill:#0f172a,stroke:#06b6d4,color:#e2e8f0 style PASS fill:#064e3b,stroke:#10b981,color:#a7f3d0 style BLOCK fill:#7f1d1d,stroke:#ef4444,color:#fecaca style FPS fill:#064e3b,stroke:#10b981,color:#a7f3d0

🌳 Intellectual Lineage — Why We Built This

The Model Context Protocol (MCP) was created by Anthropic in 2024 to standardize how AI agents interact with external tools — databases, APIs, file systems. It's a brilliant protocol. But like TCP/IP before firewalls, it shipped without a security layer at the boundary.

We know this because we built the AEGIS 42-layer cascade — a CPU-only AI safety stack that has processed 14.30 million prompts at V48. When we integrated MCP into our architecture, we discovered 4 gaps that no vendor — including Anthropic — has addressed. We documented them, built mitigations, filed 24 patent claims (612–635), and submitted a responsible disclosure to Anthropic's security team. This page shows you exactly what we found.

Depth Level 4: Claim → Protocol Gap → CVE Evidence → Patent Filing → Responsible Disclosure

🔴 The Problem

MCP Has 4 Architectural Blind Spots

The Model Context Protocol revolutionized how AI agents interact with tools. But it shipped without security at the tool boundary — and real CVEs prove it.

🔴 Critical

No Tool Integrity Verification

Tool definitions can be silently modified after trust is established. A benign tool today can exfiltrate credentials tomorrow — the "rug pull" attack.

CVE-2025-6514 · CVE-2026-22785
🔴 Critical

No Intent Classification

Agent sandboxing stops at the agent. MCP servers run OUTSIDE the sandbox with their own permissions. A prompt-injected agent's tool call passes through unchecked.

OWASP LLM Top 10 · #1 Prompt Injection
🟠 High

No Response Sanitization

MCP returns raw data to agents. Malicious strings planted in database records become part of the agent's context — indirect prompt injection through the data layer.

Checkmarx MCP Report 2026
🟠 High

No Multi-Agent Isolation

Multiple agents sharing MCP servers have zero cross-agent access controls. A compromised agent can inject instructions into a peer agent's session — lateral movement.

CVE-2025-49596 · MCP Inspector RCE
⚡ Before vs. After

The Gap We Close

Standard cybersecurity vocabulary: this is a Deep Packet Inspection for AI agent tool calls — powered by the AEGIS Intention Gate.

💀

Without AEGIS MCP Gateway

1 Attacker plants malicious string in a database record
2 Agent reads the record via MCP — poison enters context
3 Agent follows injected instruction: DROP TABLE users
4 MCP Server faithfully executes — it has DB credentials
💀 Database destroyed. No audit trail. No alert. No recovery.
🛡️

With AEGIS MCP Gateway

1 Attacker plants malicious string in a database record
2 Sanitization Proxy strips injection patterns before agent reads
3 Agent calls DROP TABLE — Intention Gate classifies as MALICIOUS
4 BLOCKED. POAW receipt generated. Human alerted. Pattern learned.
Database safe. Full audit trail. Attacker pattern fed back to improve model.
🚀 The Solution

AEGIS MCP Gateway — 4 Patented Innovations

Defense-in-depth for the agent-tool boundary. Each layer works independently.
Together, they create 12-Sigma safety for autonomous AI operations.

🛡️

Intention Gate

Deep Packet Inspection — powered by AEGIS Cascade™

Every MCP tool invocation passes through a multi-layer safety cascade that classifies intent, not just schema compliance. 42 layers, CPU-only.

<5ms
Fast-path classifier latency
🔐

Sealed Tool Manifests

Software Bill of Materials — powered by POAW™

SHA-256 hashed, quantum-timestamped tool definitions. Any silent modification triggers an instant block. Rug-pull attacks become structurally impossible.

100%
Tamper detection rate
🧹

Self-Sanitizing Responses

Content Disarm & Reconstruct — powered by SIREN™

MCP responses are stripped of PII, injection patterns, and encoded payloads before entering the agent context. Sanitization data improves the safety model.

3-Layer
Regex + NER + Entropy scoring
🔑

Agent Identity Isolation

Zero Trust Network Segmentation — powered by ML-KEM™

Ephemeral per-session tokens with 30-minute TTL, max 100 calls. No cross-agent state sharing. Every invocation logged to a specific identity.

30min
Maximum token TTL

5 New Innovations Shipped

Beyond the original 4 blind spots — these 5 innovations close the remaining gaps in multimodal safety, RAG poisoning defense, and session auditability.

🖼️
TC-1

Modality Fingerprint

2ms fingerprinting for images, audio, and video using byte entropy, edge density, and LSB steganography detection.

85%
Fast-pass rate (no deep scan needed)
🌐
TC-2

Trust Orbits

5-orbit dynamic trust (O0→O4) with φ⁻¹ decay, anomaly-based instant demotion, and community vouching.

O0→O4
Earned trust, never assumed
📄
TC-3

CATS RAG Defense

3-tier context-aware scanning with semantic role classification. Educational content doesn't trigger false positives.

≤0.3%
False positive rate
🛡️
TC-4

Sovereign Analyzer

3-layer CPU/NPU analysis stack. Shannon entropy, MFCC, Heim vectors. Zero cloud dependency at any layer.

100%
On-device sovereignty
📐
TC-5

Session Proofs (FMSP)

50+ tool calls → 1 Fibonacci Merkle proof. 25× storage reduction with selective Fibonacci-indexed verification.

25×
Storage reduction per session
📂 Source Code Evidence

Don't Trust. Verify.

Every innovation traces to real production code. These aren't mockups — they're running on our live API right now, processing 1,988 prompts/sec.

AEGIS Intention Gate — 42-Layer Cascade Coordinator

// Real production code: backend/src/aegis/aegis.service.ts
async scan(prompt: string, context?: ScanContext): Promise<AegisResult> {
  // 42 detectors execute in cascade — CPU only, no GPU
  const cascade = await this.cascadeCoordinator.execute(prompt, {
    mode: 'production',
    layers: 42,
    stellschrauben: this.phiHarmonicConfig,
  });
  // POAW receipt generated for every decision
  const receipt = await this.poawService.seal(cascade);
  return { decision: cascade.finalDecision, receipt };
}
    
📁 backend/src/aegis/aegis.service.ts · backend/src/poaw/poaw.service.ts

POAW Cryptographic Proof — Quantum-Timestamped Sealing

// Real production code: backend/src/poaw/shared/poaw-core.ts
export function generatePoawReceipt(data: PoawInput): PoawReceipt {
  const hash = createHash('sha256')
    .update(JSON.stringify(data))
    .digest('hex');
  const quantumSeed = this.qrngService.getEntropy(32);
  return {
    hash, quantumSeed,
    timestamp: Date.now(),
    signature: mlDsaSign(hash, this.privateKey), // ML-DSA post-quantum
  };
}
    
📁 backend/src/poaw/shared/poaw-core.ts · backend/src/shared/quantum/ml-dsa-signer.service.ts

Live API — Test Right Now

$ curl https://destill.ai/api/v1/redteam/health

{
  "status": "operational",
  "aegisVersion": "V48",
  "cascadeLayers": 42,
  "avgLatency": "0.50ms",
  "totalPromptsProcessed": 7930000,
  "gpuRequired": false
}
    
🔗 destill.ai/api/v1/redteam/health — live, right now

⚠️ What We Don't Have Yet — Ehrlichkeit (Honor-Driven Honesty)

🛡️ Regulatory Compliance

Built for the Regulations That Are Already Here

EU AI Act enforcement begins August 2026. Every feature maps to a specific article.

EU AI Act (Art. 9, 12, 14, 55)

Risk management via Intention Gate. Immutable logging via POAW. Human oversight for re-registration. Red Team API access for transparency.

GDPR (Art. 25, 32)

Data protection by design: sanitization proxy strips PII before agent context. Zero-credential MCP architecture.

NIS2 (Art. 21)

Cybersecurity risk management with measurable metrics (AEGIS_MCP_Score). Multi-layer defense-in-depth.

DORA (Financial Services)

Operational resilience through fail-closed architecture. Dual AEGIS Gateway with <10s auto-failover.

OWASP LLM Top 10 (2025)

#1 Prompt Injection: blocked at tool boundary. #2 Insecure Output: sanitized. #5 Supply Chain: sealed manifests.

Patent Protection (Claims 612–635)

24 claims covering Intention Gate, Sealed Manifests, Self-Sanitizing Proxy, and Agent Isolation. Parent filing #63/994,444.

💰 Transparent Pricing

Simple. No Hidden Costs. No GPU Ever.

Pay per MCP tool invocation. Deploy on your servers or ours. Switch or leave anytime — no lock-in.

Starter
€0.001
per tool invocation
  • Intention Gate (fast-path only)
  • Basic response sanitization
  • Audit log (30-day retention)
  • Up to 100K invocations/month
  • Community support
Sovereign
€200K
per year · on-premise
  • Everything in Enterprise
  • On-premise deployment
  • Post-quantum crypto (ML-KEM)
  • Custom cascade tuning
  • Patent cross-license
  • 24/7 incident response

Ready to Secure Your AI Agents?

The AEGIS MCP Gateway is the missing security layer between your AI agents and their tools.
24 patent-pending innovations. CPU-only. Deploys in one line.

📊 Open Live Dashboard 🔑 Request Access