VaultMesh Architect MCP Server
Enables governance and orchestration of VaultMesh deployments through subsystem spawning, multi-chain anchoring, threat mitigation, constitutional amendments, and LAWCHAIN governance tracking. Provides auditable tools for managing decentralized infrastructure with cryptographic proofs and alchemical phase orchestration.
README
VaultMesh Architect MCP Server
Constitution CLI Dry-Run: verifies that the terminal amendment workflow remains operable and JSON-RPC output parses correctly on every push.
Governance Checks
| Check | Purpose | Badge |
|---|---|---|
| CI Tests | Unit + E2E validation | |
| CLI Dry-Run | Amendment ritual canary | |
| Release Proof | Anchors artifact hashes | |
| Phoenix Verification | Cross-runtime parity + LAWCHAIN proof health |
An MCP server that exposes the VaultMesh-Architect skill as explicit, auditable tools. It supports subsystem spawning, multi-chain anchoring (dry-run), Tem invocation, LAWCHAIN governance entries, capability issuance, CRDT realm helpers, and alchemical phase orchestration.
Status: initial scaffold with safe defaults and dry-run behavior.
Quick Start
-
Install dependencies
- Requires Node.js 18+
- From
vaultmesh-architect-mcp/:
npm install -
Run as MCP server (stdio)
npm start -- --stdio -
Configure your MCP client
Example (Claude Desktop JSON config snippet):
{ "mcpServers": { "vaultmesh-architect": { "command": "node", "args": ["server.js", "--stdio"], "cwd": "${HOME}/vaultmesh-architect-mcp" } } }
Heartbeat Logging (Optional)
-
To get a visible signal in your terminal without breaking stdio, enable a stderr heartbeat:
# flag-based node server.js --stdio --heartbeat # or via env MCP_HEARTBEAT=1 MCP_HEARTBEAT_MS=15000 node server.js --stdio -
Output appears on stderr as:
vaultmesh-architect: listening on stdio (dry_run=...)vaultmesh-architect: heartbeateveryMCP_HEARTBEAT_MSms (default 30000)
Tests
-
Install dev deps and run tests:
npm test -
The test harness runs the server as a black box over stdio (JSON-RPC) and writes artifacts under a temp dir via
VM_WORKDIR.
Coverage
-
Generate coverage (c8, includes subprocesses) and open report:
npm run coverage npm run coverage:open -
Branch/line thresholds are enforced (lines 85, funcs 85, branches 80, statements 85). CI uploads
coverage/as an artifact.
Golden Manifest Snapshot
tests/hash-manifest.spec.mjssnapshots the file ordering and Merkle root fromcompute_merkle_rootusing a deterministic fixture.- Snapshot lives at
tests/__snapshots__/hash-manifest.spec.mjs.snapand will fail on ordering regressions.
Constitution Resources
Every VaultMesh deployment carries its own auditable constitution, available as a first-class MCP resource. Any amendment is ratified through a signed LAWCHAIN “charter” entry and can be anchored across chains.
Examples (JSON-RPC over stdio):
# list available resources
printf '{"jsonrpc":"2.0","method":"resources/list","id":1}\n' | node server.js --stdio
# read the constitution
printf '{"jsonrpc":"2.0","method":"resources/read","params":{"uri":"spec://digital-twin/constitution"},"id":2}\n' | node server.js --stdio
# sign and anchor it (sign only; anchor via tools/multi_anchor)
printf '{"jsonrpc":"2.0","method":"tools/call","params":{"name":"sign_constitution","arguments":{"note":"v1.0.0 ratified"}},"id":3}\n' | node server.js --stdio
Amendment Flow (Optional Governance)
-
Propose an amendment with a full replacement YAML (staged, requires approval):
printf '{"jsonrpc":"2.0","method":"tools/call","params":{"name":"propose_charter","arguments":{"replacement_yaml":"...new YAML...","note":"amendment 1"}},"id":4}\n' | node server.js --stdio -
Approve a proposal and finalize the charter (with or without applying the YAML change):
printf '{"jsonrpc":"2.0","method":"tools/call","params":{"name":"approve_charter","arguments":{"proposal_id":"<id>","approver":"dao:alice","apply_update":true}},"id":5}\n' | node server.js --stdio -
Anchor receipts as usual via
tools/compute_merkle_rootandtools/multi_anchor.
Terminal Workflow
Amend the constitution from a terminal (mirrors the MCP prompt flow):
bash scripts/amend_constitution.sh --reason "update K8s orchestration policy" --apply
The script fetches -> opens your editor -> diffs -> proposes -> optionally approves, and records LAWCHAIN entries along the way.
Verification
Verify a tagged release by confirming tarball checksum and matching LAWCHAIN/receipt proofs:
bash scripts/verify_release.sh v1.0.0
This downloads the tarball + checksums, recomputes SHA-256, and ensures the hash appears in LAWCHAIN entries or anchor receipts.
Verify a Release + Receipts
bash scripts/verify_release.sh v1.0.0 --lawchain governance/lawchain --receipts governance/anchor-receipts
This verifies checksum, confirms LAWCHAIN proof, and prints RFC-3161 / ETH / BTC receipt statuses for the artifact (works in both dry-run and live modes).
Phoenix Capability Integration
-
Manifest:
governance/capabilities/phoenix_resilience_protocol.md -
Seal + token + anchor:
npm run capability:seal -
Tem plugin stubs (for integration into your Tem engine):
- Python:
tem/python/plugins/phoenix_resilience.py - Rust:
tem/rust/phoenix_resilience/(crate withTemPlugintrait andPhoenixResilience)
- Python:
-
Config + schema:
- YAML:
config/phoenix_resilience.yaml - JSON Schema:
config/schema/phoenix_resilience.schema.yaml
- YAML:
A typical Tem loop calls next_phase(current_phase, ψ, PE) and applies mitigations from on_incident() when canary events are simulated.
Live Coherence State
The badge JSON is committed to .badges/phoenix_coherence.json by the Phoenix verification workflow and updates after each successful run.
Each badge update is cryptographically anchored via LAWCHAIN (receipts under governance/anchor-receipts/).
Working Directory Override
-
To direct outputs to a specific path without changing the process CWD, set
VM_WORKDIR:VM_WORKDIR=/path/to/repo node server.js --stdio
Environment Variables
DRY_RUN(default:true) — iftrue, anchoring returns simulated receipts, no chain calls.RFC3161_URL— TSA endpoint (only used ifDRY_RUN=false).ETH_RPC_URL— Ethereum RPC URL (only used ifDRY_RUN=false).BTC_RPC_URL— Bitcoin RPC URL (only used ifDRY_RUN=false).LAWCHAIN_PRIVATE_KEY_PEM— Ed25519 PEM for signing LAWCHAIN entries and capabilities. If absent, an ephemeral key is generated per process.
Tooling Overview
-
spawn_subsystem(name, organType, rust=true)
- Generates minimal k8s manifest and Rust crate skeleton under
manifests/andcrates/. - Emits a LAWCHAIN
subsystem_spawndraft.
- Generates minimal k8s manifest and Rust crate skeleton under
-
compute_merkle_root(root=".", out="manifests/hash-manifest.json")
- Computes a repository hash manifest and Merkle-like root (SHA-256 based placeholder).
-
multi_anchor(manifestPath)
- Orchestrates RFC3161/ETH/BTC anchoring. Honors
DRY_RUN. - Writes receipts in
governance/anchor-receipts/and returns a consolidated proof object.
- Orchestrates RFC3161/ETH/BTC anchoring. Honors
-
invoke_tem(threatType, realm, autoRemediate=false, lastGoodRoot?)
- Transmutes threats into defensive capabilities. Writes an incident log and returns a suggested defense.
-
generate_lawchain_entry(type, payload)
- Creates a signed LAWCHAIN entry in
governance/lawchain/.
- Creates a signed LAWCHAIN entry in
-
issue_capability(subject, scopes, ttlSeconds)
- Issues a signed, revocable capability (Ed25519). Returns a token-like object.
-
get_phase(realm) / evolve_phase(realm, action)
- Reads or advances the alchemical cycle, enforcing Nigredo→Albedo→Citrinitas→Rubedo order.
Security Defaults
- Redacts secret-like values in tool outputs (unless explicitly requested).
- Short-lived in-memory keys if
LAWCHAIN_PRIVATE_KEY_PEMis not provided. - Writes artifacts to local dirs under the server CWD; no network calls when
DRY_RUN=true.
Notes
- Hash/Merkle calculations use SHA-256 placeholder. Swap in BLAKE3 as desired.
- Anchoring implementations are stubbed unless
DRY_RUN=falseand endpoints are set. - This server is intentionally conservative and auditable.
Sanity Check (JSON-RPC init)
You can simulate a minimal MCP handshake from the shell:
printf '{"jsonrpc":"2.0","method":"initialize","params":{},"id":1}\n' | node server.js --stdio
You should see a JSON response on stdout confirming initialization.
推荐服务器
Baidu Map
百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Playwright MCP Server
一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。
Magic Component Platform (MCP)
一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。
Audiense Insights MCP Server
通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。
VeyraX
一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。
graphlit-mcp-server
模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。
Kagi MCP Server
一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。
e2b-mcp-server
使用 MCP 通过 e2b 运行代码。
Neon MCP Server
用于与 Neon 管理 API 和数据库交互的 MCP 服务器
Exa MCP Server
模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。