The Native Security Layer
for the Model Context Protocol
SIGIL stands for the Sovereign Identity-Gated Interaction Layer.
It seamlessly extends the MCP ecosystem with indispensable zero-trust security. Identify AI callers, intercept sensitive data leaks, enforce host policies, and generate tamper-evident audit trails.
What can SIGIL prevent?
Without SIGIL, the Model Context Protocol (MCP) assumes a fully trusted local environment. By wrapping requests in the SIGIL envelope, you can proactively close the security gap between Hosts, Clients, and Servers.
Leaking API Keys to LLMs
The SIGIL SensitivityScanner intercepts secrets, IBANs, or PII before they ever
reach the AI model, replacing them securely with opaque vault pointers.
Unauthorized Tool Execution
The SecurityPolicy layer gates destructive MCP tools (e.g., drop_table)
based on cryptographically verified Host and User identity.
Shadow IT & Agent Ambiguity
Every MCP JSON-RPC tool request and response is signed and logged by the
AuditLogger, creating
a tamper-evident record of exactly what agents did on the host.
Unknown Host Connections
Using the IdentityProvider, a SIGIL-secured MCP Server can mandate that only
verified Clients
can successfully connect, preventing arbitrary malware from invoking tools.
Why does SIGIL matter?
SIGIL provides distinct value across the entire MCP ecosystem, from AI application developers to the end-users they serve.
Hosts & Clients
Reduce liability and increase trust by enforcing global security policies across all connected servers.
"We can deploy agents knowing they can't leak secrets or run unauthorized commands."
Servers
Secure tools by default. Wrap existing MCP servers with auth, scanning, and auditing without rewriting logic.
"We can publish enterprise tools safely, knowing SIGIL handles PII interception."
Humans
Granular transparency and control over what autonomous agents are doing on your behalf.
"I can review exactly what the agent read before I approve this transaction."
The SIGIL Envelope
SIGIL acts as a standard extension to the MCP JSON-RPC protocol. It wraps standard tool calls with identity and security metadata, processed seamlessly through a 5-layer zero-trust pipeline.
🪪 Identity Binding
Bind AI callers to verifiable trust levels (OIDC, eIDAS). Validated seamlessly on the host or server.
🔍 Content Interception
Scan MCP Tool requests and responses for API keys or PII before LLMs process them.
🔒 Encrypted Vault
Intercepted MCP secrets are encrypted, stored locally, and replaced by opaque LLM-safe pointers.
📋 Tamper-Evident Audit
Every MCP security event is securely logged with HMAC signatures creating an immutable trace over Agent actions.
🛡️ Policy Enforcement
Declare MCP tool risk classifications and required confirmation gates. Zero-trust by default.
🔌 SIGIL Server Wrapper
Wrap any MCP tool set with all five security layers in 4 lines of rust. Drop-in ready for the ecosystem.
Detect a Leaked Secret in 3 Lines
Install, scan, done. The registry provides 43 verified patterns — no configuration required.
Live registry · 43 verified patterns · Frankfurt, EU · free & open source
Go Further — Secure your MCP Server
Wrap your existing Rust MCP toolsets with the full SIGIL intercept pipeline in 4 lines.
Developer Ecosystem
Your Project
Building with SIGIL? Open a PR to list your project. Any MCP server, client, or agent host is welcome.
Contribute on GitHub →SIGIL Inspector
A native developer tool for visualizing security envelopes, policy verdicts, and audit logs locally. Coming soon as a web app.
SIGIL Registry
The did:sigil: DID registry and community-curated crowdsourced scanner + policy
registry are live at registry.sigil-protocol.org. 43 verified patterns · 35
security policies. Docs →
Where SIGIL is Today
As of February 2026, SIGIL is a live, published open-source protocol with a working Rust implementation, a formal specification, and a reference platform. Here is the honest current state.
Core Library
sigil-protocol v0.1.4 published on crates.io. All five traits implemented and tested
with full test coverage.
Formal Specification
SIGIL Protocol Spec v1.0.0-draft published on GitHub and sigil-protocol.org on 2026-02-21. Constitutes public prior art disclosure.
DID Registry
registry.sigil-protocol.org is live resolving did:sigil:
identifiers over HTTPS with TLS 1.3. Crowdsourced scanner (43 patterns) and policy registry (35
policies) now included.
Python SDK
sigil-protocol published on PyPI. First-class middleware and tool gating support for
LangChain, CrewAI, AutoGen, and mcp-agent.
OpenClaw & ZeroClaw
Official security integrations published for the Claw AI ecosystem. Transparent
Observability auditing for ZeroClaw and drop-in skill for OpenClaw.
Node.js / TypeScript SDK
sigil-protocol npm package — RemoteScanner auto-fetches 43+ community
patterns at startup, with offline fallback. SigilClient for signed pattern/policy
submissions.
SIGIL Inspector UI
Visual developer tool for inspecting live security envelopes, policy verdicts, and audit logs. Available soon as a local web app.
Add SIGIL to Your Agent Stack
Dual-licensed: EUPL-1.2 for open-source use. Commercial licence available for proprietary deployments.