Skip to content

Security Consideration: Add Vedis Security Layer for MCP Servers #2345

@sypherin

Description

@sypherin

I've been building AI agents with MCP and noticed a common security gap - prompt injection attacks and secret leakage.

I built Vedis to address this - it's a security layer for MCP agents that:

Detects prompt injection attempts - Blocks malicious prompts before they reach your agent
Blocks PII - Emails, phone numbers, SSNs, credit cards
Filters secrets - AWS keys, GitHub tokens, Stripe keys, JWTs, PEM certificates
Enforces tool policies - Control what tools your agents can access

How it works

One config change, zero code changes:

vedis:
  enabled: true
  block_pii: true
  block_secrets: true
  max_tokens: 1000

Why this matters for Microsoft MCP

As the official catalog of Microsoft MCP server implementations, security is critical. Vedis can help protect users from:

  • Prompt injection attacks in MCP server implementations
  • Accidental secret leakage in server responses
  • PII exposure in data access and tool integration

Available at

https://vedis-4nexxwa4vq-as.a.run.app

Pricing

  • Free: Basic protection
  • $49/mo: Starter (up to 10 agents)
  • $199/mo: Pro (unlimited agents)

Would you be interested in integrating Vedis as an optional security layer for MCP servers? I'd be happy to contribute or provide more details.

Thanks!

Metadata

Metadata

Assignees

Labels

customer-reportedneeds-team-attentionWorkflow: This issue needs attention from Azure service team or MCP team.questionFurther information is requestedserver-Azure.McpAzure.Mcp.Servertools-CoreAZMCP Core functionality that all other tools build on top of

Type

No type

Projects

Status

Untriaged

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions