NEW: New Research: AI Agents and Algorithmic Redlining

Read Now

Trinitite

PricingResearchBlog

MCP Governance

Every tool call. Checked.

A transparent proxy that sits between your AI agents and their tools. Every call is checked against your rules before it runs.

How It Works

Three Steps. Every Tool Call.

01

Agent calls a tool

Your AI agent requests a tool action through MCP — read a file, query a database, call an API.

02

Proxy checks policy

The call passes through Trinitite's proxy. Your rules are checked in under 400ms.

03

Allow, rewrite, or block

Safe calls pass. Risky calls get rewritten. Dangerous calls are stopped before they execute.

Live Demo

Watch the Proxy in Action

Live Governance Feed

0

0

0

Session Replay

Enterprise

MCP Session Replay

Agent: research-bot-v3

Policy Engine

policies

tools

sequences

PII Protection

12 rules

active

Financial Data Guard

8 rules

active

Code Secrets Filter

15 rules

active

HIPAA Compliance

22 rules

draft

Zero Code Changes

Deploys as a transparent proxy. Point your agents at Trinitite instead of directly at tools. Everything else stays the same.

Every Call Logged

Full forensic record of every tool call, every argument, every verdict. Searchable by agent, tool, time, or outcome. Auditor-ready from day one.

Real-Time Correction

When a tool call breaks a rule, parameters get rewritten so the call still works — safely. No failed requests. No downtime.

Validate Before You Deploy

Test every policy change before it goes live.

Describe a risk in plain English. The Scenario Factory generates up to 100 test cases. Run them against any policy version. When a real incident happens, turn it into a permanent regression test with one click. Policy changes never reach production without proof they work.

This is CI/CD for governance — a test harness your compliance team can run before every policy update.

Test Suite: Customer Support Policy v2.4

Running…

PII in response Block

Blocked

Refund > $50 Correct

Medical data Block

Clean response Pass

Prompt injection Block

Off-topic response Correct

External API key Block

Valid escalation Pass

Profanity filter Block

Rate limit abuse Block

Policy lifecycle

Customer Support Governance Policy

Draft

Edit Nodes

12 nodes structured

Finalize

Test

94% pass (47/50)

Activate

v2.4 Live

Full Audit Trail

From draft to production, every change tracked.

Policies go through a structured workflow: Create, Ingest, Edit, Finalize, Activate. Every change is attributed — who changed what, when, and why. Roll back in one click. Auditors get a complete chain of custody for every governance rule.

When a regulator asks “who authorized this policy?” — the answer is one search away.

Capabilities

Complete Tool Governance

Transparent Proxy

Deploys between your agents and MCP servers with zero code changes. Point your agents at Trinitite instead of directly. Everything else stays the same.

Allow/Block Lists

Choose which tools each agent can use. Block file_delete for junior agents. Allow database_read but block database_write. Your rules, per tool.

Argument Constraints

Limit what tools can access. A tool can read /tmp but not /etc. A query can access the users table but not the payments table.

Sequence Detection

Enterprise

Catch attack patterns that span multiple calls. If an agent reads credentials then calls an external API, the sequence is blocked.

Guardian AI Routing

Pro

Send high-risk tool calls through a Governor for deeper analysis. Simple calls pass through fast. Complex ones get a second opinion.

Session Replay

Enterprise

See every tool call in order, with full context. Who called what, when, with what inputs, and what happened next.

Real-Time Correction

When a tool call breaks a rule, Trinitite rewrites the parameters so the call still works — safely. No failed requests. No downtime.

Full Audit Trail

Every call, every verdict, every correction is logged. Search by agent, by tool, by time, or by outcome. Always ready for auditors.

Zero

Code Changes

<100ms

Added Latency

100%

Tool Coverage

Real-time

Enforcement

Use Cases

What Customers Protect

Data Exfiltration Prevention

Block agents from sending sensitive data to external APIs. Detect read-then-send patterns before data leaves your perimeter.

Least Privilege Enforcement

Give each agent access only to the tools and data it needs. No more over-permissioned service accounts.

Compliance Logging

Every tool interaction is logged with full context. Meet SOC 2, HIPAA, and ISO 27001 audit requirements out of the box.

Activity Dashboard

Full visibility into every agent tool interaction.

Full visibility into what your agents are doing with external tools. Every tool call governed, every block rate tracked, every latency measured. The 7-day activity overview shows you exactly where your governance layer is working — and where it's catching threats.

When leadership asks “how many tool calls did our agents make last week, and how many were blocked?” — you have the answer in seconds, not days. Real-time metrics that turn governance from a cost center into a measurable security function.

MCP Governance — 7 Day

Policy: production-v3.2 active

Total Tool Calls

13,910

Blocked

284

Corrected

772

Avg Latency

94ms

Mon

Tue

Wed

Thu

Fri

Sat

Sun

Top Tools by Volume

send_email

0.3% blocked

query_database

2.3% blocked

file_read

1.2% blocked

api_request

6.4% blocked

execute_code

11.0% blocked

MCP Server Registry

github-mcp

connected

4 tools

slack-mcp

healthy

3 tools

database-mcp

connected

5 tools

Server & Tool Discovery

Know your entire agent tooling surface.

Every connected MCP server, every tool it exposes, every governance badge applied. Discover your full agent tooling surface in one catalog. When a new server connects, you see it immediately — with its full capability manifest and governance status.

Shadow tooling is the new shadow IT. Agents connecting to unvetted MCP servers represent ungoverned risk. The server catalog makes every connection visible, every tool discoverable, and every gap in governance coverage obvious.

OAuth Consent Governance

Agent access requests, governed by policy.

Agents requesting access to external systems go through consent governance. Scopes evaluated against policy. Over-privileged requests denied automatically. Every OAuth token grant is checked, logged, and attributed to the requesting agent and its purpose.

When an agent requests admin:write scope but only needs read access, the consent governance layer catches it before the token is issued. No human in the loop needed for clear policy violations — but full escalation paths when the decision is ambiguous.

OAuth Consent Governance

Agent Request

Policy Check

Verdict

Infrastructure Health

All Systems Operational

Connection Pool

Active Connections

0

Idle Connections

0

Queue Depth

0

Avg Response

0ms

SSE Streams

governance-events

12 clients

342/min

audit-stream

5 clients

89/min

alert-feed

8 clients

12/min

Batch Processing

Throughput

0/hr

Pending

0

Failed (24h)

0

Avg Processing

12ms

Infrastructure Health

Know your governance layer is working before agents need it.

Connection pools, SSE streams, batch processing — infrastructure health for your governance layer. Know it's working before your agents need it. Real-time monitoring of every proxy component ensures zero-downtime governance enforcement.

Governance infrastructure that goes down silently is worse than no governance at all — because you think you're protected when you're not. Health monitoring catches degradation before it becomes an outage, with alerts that reach the right team before agents start failing.

Argument Constraints

Define exactly what's permissible for every tool call.

Define exactly what arguments are permissible for each tool call. Restrict email recipients to company domains. Block DELETE queries. Route high-risk calls through Guardian AI. Argument-level governance is where broad policy becomes precise, enforceable control.

Allowing a tool is only half the equation. An agent with database_query access that can run DROP TABLE is a liability. The argument builder lets you construct fine-grained rules that constrain not just which tools are available, but exactly how they can be used.

Policy Rule Builder

send_email

constraint

Recipients must match company domain

execute_query

constraint

No DELETE or DROP statements

file_write

block

Block all file writes to /etc/

api_request

constraint

External APIs require Guardian review

*

sequence

Block credential read → external call

Configuration Audit Stream

policy

server

oauth

alert

Configuration AuditEnterprise

Every configuration change, attributed and logged.

Every change to every MCP configuration is logged with attribution. Who changed what server, what policy, what OAuth client — and when. The configuration audit stream gives you a complete record of every governance decision, not just every agent action.

When an auditor asks “who authorized this MCP server connection?” or “when was this policy last modified?” — the answer is one search away. Full diff-level visibility into configuration changes, with tamper-proof logging that satisfies SOC 2 and ISO 27001 evidence requirements.

Your agents call tools. Make sure you approve every one.

Start free with 1,000 governance interactions. No credit card needed.