Add guardrails for agent tool calling. Enforce access control, rate limits, and cost management across MCP pipelines without code changes. Swap one URL and you're protected.
How it works: deterministic, in-path policy enforcement → View the policy model
MCP servers expose powerful tools with zero restrictions
GitHub, Slack, databases - these integrations give AI agents direct access to production systems with no access controls, no rate limits, no audit trail.
One misconfigured agent can delete repositories, spam customers, or rack up unexpected API costs. You need guardrails before going to production.
Add protection with a single URL change
Direct connection, no protection
mcp.github.com/v1Protected with policies
abc123.keypost.ai/mcpPoint it to your upstream MCP server
Access control, rate limits, DLP, and more
Update your agent config and you're protected
Protect your systems with flexible, composable policies
Allow or deny specific tools with granular permissions
Validate and restrict parameter values
Schedule tool availability by day and time
Block sensitive data patterns automatically
Control request frequency at multiple levels
Track and limit spending by team or project
Rust-powered policy enforcement designed for speed and reliability
Typical policy evaluation adds minimal latency
Single instance throughput for high-scale deployments
End-to-end response time at the 99th percentile
SSE passthrough for real-time responses
Change rules instantly without restarting or dropping requests
Works seamlessly with Claude Desktop, Cursor, and any MCP-compatible agent
Secure policy namespaces with team-level separation
Built on Rust and Tokio. Performance targets based on architecture design.