A single-binary Rust gateway that secures AI agent tool calls with JWT authentication, RBAC, rate limiting, and audit logging.
AI agents connect directly to MCP servers with no security layer — no auth, no access control, no audit trail. Any process on the same host can call any tool. This isn't theoretical.
| Threat | Severity | Detail |
|---|---|---|
| CVE-2026-25253 | CVSS 8.8 | One-click RCE via stolen auth tokens in OpenClaw Control UI |
| Exposed Instances | CRITICAL | 1,800+ OpenClaw instances found leaking API keys and credentials |
| Plugin Attack Surface | HIGH | 92% exploitation probability with just 10 MCP plugins (Pynt) |
| Microsoft Advisory | HIGH | “Treat as untrusted code execution. Not for standard workstations.” |
| No MCP Auth | CRITICAL | Any local process can call MCP servers directly — no authentication |
| No Audit Trail | HIGH | Zero visibility into which tools were called, by whom, with what data |
Sentinel sits between your agent and its MCP servers. Every tool call passes through authentication, authorization, rate limiting, and audit logging before reaching any backend.
All backends are optional and configurable. Use any combination of HTTP and stdio MCP servers — the gateway doesn't care what's behind it, only that it's secured.
Enterprise security controls for AI agent tool calls, without modifying either the agent or the MCP servers.
Sentinel has been tested end-to-end in a distributed multi-server deployment: an OpenClaw agent on a Hetzner ARM64 server invoking tools through Sentinel running on a Hostinger x86_64 server, connected via WireGuard VPN.
The 18.8 second end-to-end time includes SSH tunnel setup, WireGuard hop, JWT authentication, a full website scrape via Firecrawl, LLM summarization of results, and audit logging to PostgreSQL. The gateway itself adds under 1ms of overhead for auth and routing.
The setup script generates secrets and config automatically. Edit sentinel.toml to uncomment the backends you need. Full deployment guide in the docs.
Using OpenClaw? See the dedicated integration guide for step-by-step setup including SSH stdio tunnels, recommended RBAC policies, and multi-server deployment patterns.
| Sentinel | RunLayer | No Gateway | |
|---|---|---|---|
| Self-hosted | YES | No (SaaS) | — |
| Open source | BSL 1.1 | Proprietary | — |
| JWT + RBAC | YES | Limited | NO |
| Audit logging | PostgreSQL | Yes | NO |
| Circuit breakers | YES | NO | NO |
| Kill switch | YES | NO | NO |
| Single binary | ~14 MB Rust | No | — |
| Offline capable | YES | NO | Yes |
v1.0 shipped — 47/47 requirements from the IBM/Anthropic MCP Gateway whitepaper, 145 tests, 3,776 LOC Rust.
Production-tested with Claude Code (local stdio) and OpenClaw (remote SSH stdio tunnel via mcporter). Cross-architecture validated: ARM64 agent ↔ x86_64 gateway over WireGuard VPN.
Licensed under BSL 1.1 — free to use, modify, and deploy. Converts to Apache 2.0 in 2030. The only restriction: you can't resell it as a hosted gateway service.
Tested it with OpenClaw? Open an issue — we want to hear about your experience.