45
grade D
10 days ago
glama

VibeGuard MCP

Enables policy-style auditing of content through the audit_vibe MCP tool to enforce configurable guardrails. Supports both local stdio and serverless Streamable HTTP deployment via Vercel for flexible integration with MCP clients.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
Open source with a license and README
Anyone can audit the code, the license is declared, and the publisher documents what it does.
🔐
You'll be asked for 3 credentials: AMBIT_SIGNING_KEY, AMBIT_VERIFYING_KEY, MCP_AUTH_TOKEN
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
🔐 secretAMBIT_SIGNING_KEY
🔐 secretAMBIT_VERIFYING_KEY
configAWS_LAMBDA_FUNCTION_NAME
configDATABASE_URL
configGIT_BRANCH
🔐 secretMCP_AUTH_TOKEN
configOPA_POLICY_PATH
configOPA_URL
configPRISMA_LOG
configVERCEL
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 1 concrete improvement we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/mckaystu-vibeguard-mcp-1mmw8c)](https://m8ven.ai/mcp/mckaystu-vibeguard-mcp-1mmw8c)
commit: 451c341bdfa70eae3c7af0efc6a34d90a43a70df
code hash: d13b8fea6e4329f82645d7dada7ee5605fa7ece428372aae8421cce3bca3c021
verified: 4/11/2026, 2:20:36 PM
view raw JSON →