Security policies. Audit logging. Daemon mode.
Project isolation. One binary. Zero tokens upfront.
$ brew install codestz/tap/mcpxEvery server dumps its schema into context. Every tool call has zero access control. mcpx fixes both.
Policies evaluate tool names, arguments, and content before the call reaches the server.
security:
enabled: true
global:
audit:
enabled: true
log: .mcpx/audit.jsonl
policies:
- name: no-path-traversal
match:
args:
"*path*":
deny_pattern: "\\.\\.\\/|\\.\\.\\\\\\/"
action: deny
message: Path traversal blocked
servers:
postgres:
security:
mode: read-onlybrew install codestz/tap/mcpxmcpx initmcpx serena find_symbol --name "Auth"Tool allow/deny, argument inspection, content regex. Global + per-server cascading rules.
Every tool call recorded in JSONL. Timestamps, args, policy decisions. Secret redaction built in.
Project-scoped daemon isolation. Each project gets its own daemon instance. No cross-session conflicts.
Daemon mode for fast startup. Security modes and path-restricted editing. Zero-config integration.
Heavy servers stay warm via unix socket. Zero spawn cost after first invocation.
Tools discovered lazily with mcpx list and --help. Zero context overhead.
stdio for local, HTTP (streamable) and SSE for remote. Auth headers and bearer tokens built in.
Go. No runtime deps. Sub-millisecond startup. Homebrew, go install, or build from source.
Security, audit, daemon mode — from CLI to production.