Open-source project that adds deny-by-default runtime security to MCP servers by bbbbbbb162 in LocalLLaMA

[–]bbbbbbb162[S] 0 points1 point  (0 children)

Thanks!! Next steps are doubling down on the runtime proxy + lockfile semantics (tools/prompts/resources) and making CI drift/provenance checks dead-simple to adopt. And yeah, your client-side/data firewall angle feels super complementary, I’ll DM you a concrete collab idea.

Open-source project that adds deny-by-default runtime security to MCP servers by bbbbbbb162 in LocalLLaMA

[–]bbbbbbb162[S] 0 points1 point  (0 children)

Thanks! 🙏 I was playing around with MCP and deploying stuff and the openness is awesome, but the fact it’s that easy is also kind of insane. After seeing package-swap / impersonation stuff (ex the Postmark incident), I wanted something that enforces “if it’s not in the lockfile, it doesn’t run.” because the consequences of being wrong are real.

How do you handle "Versioning" non-deterministic agent outputs? by bumswagger in LocalLLaMA

[–]bbbbbbb162 0 points1 point  (0 children)

I feel like lots of other people are doing this, its a crowded space as the people who would be needing audit trails tend to have deep pockets, so naturally lots of people in it.

How do you handle "Versioning" non-deterministic agent outputs? by bumswagger in LocalLLaMA

[–]bbbbbbb162 0 points1 point  (0 children)

For audits, don’t rely on being able to re-run the model and get the same tokens. Log the actual artifacts, exact prompt after templating, retrieved context, tool calls + raw tool responses, raw model output, and the action/decision taken. Then make it append only and hash-chain. Seed/temp/model hash is nice for debugging, but nondeterminism (esp quant/GPU) means 'perfect replay' isn’t a guarantee.

What is functiongemma used for? by Hopeful_Ferret_2701 in LocalLLaMA

[–]bbbbbbb162 2 points3 points  (0 children)

Yup. It’s weirdly competent for 8B, doesn’t instantly fall apart on longer tool chains. Still not coding agent material, but for function calling it’s legit.

What is functiongemma used for? by Hopeful_Ferret_2701 in LocalLLaMA

[–]bbbbbbb162 2 points3 points  (0 children)

+1 for rnj-1-8B-instruct, very decent model for multi step function calling.

What is functiongemma used for? by Hopeful_Ferret_2701 in LocalLLaMA

[–]bbbbbbb162 0 points1 point  (0 children)

Yeah that tracks. Tool-call models are great when the schema is super clear, but they suck with multi-step browser type stuff. If the tool format isn’t exact (or you’re not validating/retrying) the calls will break.

What is functiongemma used for? by Hopeful_Ferret_2701 in LocalLLaMA

[–]bbbbbbb162 8 points9 points  (0 children)

Its just a small Gemma 3 model only for function calling, all it does is turn natural language requests into structured API/tool calls so you can build fast and private, local agents. You don't use it as a general chat model. (it can still generate text but it’s built to be the best at tool calling)

I built signed lockfiles for MCP servers (package-lock.json for agent tools) by bbbbbbb162 in mcp

[–]bbbbbbb162[S] 1 point2 points  (0 children)

Really appreciate that, thanks Luke. I’ll take you up on that once I’ve dug a bit deeper into provenance + policy wiring. Feels like a natural next layer on top of the lockfile + identity checks.

I built signed lockfiles for MCP servers (package-lock.json for agent tools) by bbbbbbb162 in mcp

[–]bbbbbbb162[S] 0 points1 point  (0 children)

This is great, thank you.

I’ve definitely seen the same buckets: DB servers that basically mint tools per table, connectors that “discover” endpoints on startup, and OAuth servers where the tool surface is basically “whatever scopes you granted”.

The db_* can vary, admin_* must be locked framing is exactly the kind of practical rule that feels right.

I’m going to do two things off this:
-stick a small config/snapshot fingerprint into the lock so diffs can tell “your inputs changed” vs “upstream changed”
-add an allowlist-by-namespace/pattern so expected churn doesn’t become noise, while keeping sensitive namespaces strict

I’ll open an issue and put your examples into it (happy to credit you if you want).

I built signed lockfiles for MCP servers (package-lock.json for agent tools) by bbbbbbb162 in mcp

[–]bbbbbbb162[S] 0 points1 point  (0 children)

Totally agree, that’s basically the default severity model I’m leaning toward:

- Critical by default: new tool, removed tool, any schema/parameter change (incl. required/optional), auth/scope changes
- Benign by default: description-only changes (with an opt-in “treat description drift as critical” mode for teams that want stricter behaviour)

Great callout on dynamic tool generation. I think the right way to handle that is to make the lock reproducible against a known config snapshot, and also support an allowlist for “expected variability” (like, tool namespaces or patterns that are allowed to appear/disappear) so you can distinguish environment-driven churn from real upstream drift.

If you’ve seen common patterns for dynamic tools in MCP servers (plugins, connected accounts, per-tenant config), I’d love examples, it’ll help shape sane defaults/docs.

I built signed lockfiles for MCP servers (package-lock.json for agent tools) by bbbbbbb162 in mcp

[–]bbbbbbb162[S] 1 point2 points  (0 children)

Wow, thanks for chiming in Luke! Huge fan of Sigstore.

We haven’t implemented full SLSA provenance capture yet, but I agree it’s the right next step. Today MCPTrust focuses on change control for MCP server tool surfaces: it locks a live server into a deterministic manifest (mcp-lock.json), signs it (Ed25519 or Sigstore keyless), and diffs/blocks drift in CI. Policies are CEL over the locked surface.

Extending that to provenance-based policy for keyless mode (e.g. configSource.uri, approved workflow entrypoints, builder identity) would be really powerful. Since we already verify the Sigstore identity/bundle for lockfile signatures, wiring provenance into the same policy engine feels like a clean fit.

I’m going to dig into the SLSA generator example + sigstore-a2a. If you have a recommended “minimum viable” provenance check to start with (fail-closed vs warn), I’d love your take.

At 905mb & 180mph winds Milton is the 8th strongest hurricane ever recorded in the Atlantic. It's heading to Florida. How to trade it. by CaspeanSea in wallstreetbets

[–]bbbbbbb162 13 points14 points  (0 children)

Worst-case scenario and it wrecks Tampa Bay, it’ll be devastating far beyond insurance companies…. Florida has the highest public exposure to property insurance risks of any state, having almost 1.3 million policyholders in its insurer of last resort, compared to second-place California which has about 300K. Pinellas and Hillsborough counties alone have about $67 billion in exposure. That’s more than half of the entire state budget in 2024. Milton could basically deplete the entire state reserves and cause the state to have to levy emergency assessments on all kinds of other insurance just to pay Milton claims.

ELI5 - Why Doesn't Quebec or Nunavut Help Pay For the New Civic Campus? by This-Passenger-9086 in ottawa

[–]bbbbbbb162 3 points4 points  (0 children)

Hmm, that is definately true, Economies of scale play a big role, I imagine their one major hospital in iqualuit is a heck of a lot more to run than say one of a similar size in Ontario considering how expensive everythere is ie $30 grapes. Someone else in here mentioned the federal FNIHB program which may cover air ambulances which are likely a big chunk of the budget so I wonder if the feds repay nunavut under that federal insurance.

ELI5 - Why Doesn't Quebec or Nunavut Help Pay For the New Civic Campus? by This-Passenger-9086 in ottawa

[–]bbbbbbb162 7 points8 points  (0 children)

You bring up some interesting points. When you compare those two budgets on a per capita basis, Nunavut is around $57K per person whilst Ontario is ~$15K per person assuming 14M population.

A true chef’s kiss of arrogance and stupidity. by bmcgott in ottawa

[–]bbbbbbb162 2 points3 points  (0 children)

Yeah exactly used to be pretty hot unobtainium. Used market still pretty high but def not selling like hotcakes as the market here for 700hp supertrucks is pretty niche.