toolhive
cedar
toolhive | cedar | |
---|---|---|
10 | 8 | |
746 | 1,093 | |
40.8% | 7.0% | |
9.9 | 9.6 | |
2 days ago | 4 days ago | |
Go | Rust | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
toolhive
-
Who are your MCP servers talking to?
With the new network isolation features in ToolHive, you don’t have to trust. You can verify – and enforce.
-
ToolHive Operator: Multi-Namespace Support for Enhanced Security and Flexibility
GitHub
-
From Unknown to Verified: Solving the MCP Server Trust Problem
At Stacklok, we created ToolHive because we saw a gap in running MCP servers easily but also securely. As security engineers, we knew there had to be a better way.
-
Show HN: MCP Defender – OSS AI Firewall for Protecting MCP in Cursor/Claude etc.
This looks interesting, but anytime security is offloaded to an LLM I am extremely skeptical. IMO the right way to do this is to enforce permissions explicitly through a AuthZ policy. Something like what Toolhive [0] is doing is the right way I think.
All MCP comms from client to server go through an SSE proxy which has AuthN and AuthZ enabled. You can create custom policies for AuthZ using Cedar [1].
[0] https://github.com/stacklok/toolhive, https://github.com/stacklok/toolhive/blob/main/docs/authz.md
- A secure way to find and run MCP servers
-
ToolHive: An MCP Kubernetes Operator
Building on our earlier discussion about enterprises needing dedicated hosting for MCP servers and ToolHive's Kubernetes-based solution, we're excited to announce our new Kubernetes Operator for ToolHive. This specialised tool streamlines the secure deployment of MCP servers to Kubernetes environments for enterprise and engineers.
-
No Dockerfile? No problem! Running Node and Python MCPs with ToolHive
For more details, check out the README .
-
ToolHive: Secure MCP in a Kubernetes-native World
The team at Stacklok, empowered by our CEO, Craig McLuckie (and co-creator of Kubernetes), recently released ToolHive, an open source project that offers a convenient way to run MCP servers with familiar technologies with authentication, authorization and network isolation. Let’s take a closer look at how ToolHive and Kubernetes come together to support MCP in an enterprise environment.
-
Secure-by-Default Authorization for MCP Servers powered by ToolHive
As more teams start deploying MCP servers to power tool-calling agents, one question comes up fast: how do you control who can call what? It’s not just about verifying identity, it’s about enforcing the right permissions, without bloating every server with bespoke auth logic. ToolHive was built to solve exactly this problem. It separates authentication from authorization, integrates cleanly with existing identity providers, and uses Amazon’s Cedar policy language to define clear, auditable access rules. The result is a simple but powerful way to lock down tool access without embedding auth logic into every server you run.
-
ToolHive: Making MCP Servers Easy, Secure, and Fun
We are excited about the potential of Model Context Protocol (MCP) servers and inspired to make it more consistent to set up, easier to configure and overall secure. So, we're releasing ToolHive as an open-source project that uses existing technology (e.g. Docker and Kubernetes) for better packaging, security utilities, and more. Let's build on MCP together!
cedar
-
Secure-by-Default Authorization for MCP Servers powered by ToolHive
The heart of ToolHive’s authorization is the Cedar policy language. Cedar is a flexible, expressive, and formally verified language for access control, supporting both role-based and attribute-based rules. ToolHive leverages Cedar to define who can do what in terms of MCP operations.
-
PEP and PDP for Secure Authorization with AVP
Amazon Verified Permissions (AVP) uses Cedar, a purpose-built, policy-as-code language designed for fine-grained authorization. Cedar enables us to define and enforce access control policies that dictate who can perform what actions on which resources.
-
Unlocking Fine-Grained Authorization with Amazon Verified Permissions: An Underrated AWS Service
Amazon Verified Permissions is a fully managed, scalable authorization service designed for custom applications. It uses the Cedar policy language to define and enforce fine-grained permissions, allowing developers to externalize authorization logic and centralize policy management.
-
Awsviz.dev simplifying AWS IAM policies
Cedar, the new language by AWS that's currently used by Verified Access, is looking good; https://www.cedarpolicy.com
- Cedar: Rust Implementation of AWS Cedar Policy Language
-
Ubicloud Enabled ARM64 VMs
Amazon has open sourced their policy engine https://github.com/cedar-policy/cedar
-
Open Policy Agent
Curious what folks think about this versus cedar (https://www.cedarpolicy.com/), the open source policy engine behind aws verified permissions.
- Cedar is a language for writing and enforcing auth policies in your applications
What are some alternatives?
playwright-mcp - Playwright MCP server
ladon - A SDK for access control policies: authorization for the microservice and IoT age. Inspired by AWS IAM policies. Written for Go.
github-mcp-server - GitHub's official MCP Server
topaz - Cloud-native authorization for modern applications and APIs
Playwright - Playwright is a framework for Web Testing and Automation. It allows testing Chromium, Firefox and WebKit with a single API.
aws-iam-managed-policies - Automatically populated repository of AWS IAM Managed Policies