VINKIUS
Any API → MCP server in 30s

No escape. No compromise.Runtime isolation, by design.

Every MCP tool handler runs inside a sealed V8 isolate. No process access, no filesystem, no network escape — with hard CPU limits, memory ceilings, and automatic lifecycle cleanup.

Try for Free·No credit card
Sealed Runtime

Sealed Runtime Architecture.

Every tool handler deployed to Vinkius runs inside its own V8 isolate. The runtime starts empty — no process, no require, no filesystem. Only your handler logic and the Vurb.ts Framework are injected. Everything else is absent from the runtime.

// Every handler runs with these guarantees — by default
The V8 Isolate

Sealed by Default.

01
Memory

Heap Isolation

Each isolate owns its private V8 heap. Objects cannot cross isolate boundaries. A handler in Isolate A cannot read, write, or reference any object in Isolate B.

V8 enforces memory isolation at the engine level — the same isolation model used by Chrome to separate tabs from different origins. This is hardware-grade isolation, not application-level sandboxing.

02
Surface

Zero API Surface

Every dangerous host API is physically absent from the runtime. Not restricted by policy. Removed entirely.

The isolate starts empty. Only the Vurb.ts Framework and your handler logic are loaded. Every dangerous API that Node.js provides by default simply doesn't exist inside the isolate.

03
Protection

AST-Level Stripping

Source code is compiled to V8 bytecode before execution. The original source is never readable at runtime inside the isolate.

Your code is never read by the platform. AST stripping guarantees that even in the unlikely event of an isolate breach, the source code of your enterprise handlers cannot be exfiltrated.

04
Binding

Lifecycle Binding

Isolate lifetime is bound to the SSE connection. When the TCP connection drops, the AbortController cascades through every pending fetch, timer, and promise. Then the isolate is destroyed.

Zero zombie processes. Zero orphaned sockets. Zero dangling state. The death of the connection is the death of the isolate. No garbage collection, no cleanup — annihilation.

05
Performance

V8 Snapshots

MCP definition is pre-loaded into the isolate snapshot. Your handler starts executing with zero cold-start overhead.

The snapshot contains the compiled Vurb.ts Framework, governance rules, and schema validators. When a connection arrives, the isolate is instantiated from the snapshot in microseconds.

Hard Limits

CPU Guillotine. Memory Ceiling.

Zero Tolerance.
5sCPU

5s hard timeout — infinite loop? Isolate.terminate(). Instantly.

128MBMEMORY

128MB fixed ceiling — exceed it, killed. No swap. No negotiation.

TCP†ABORT CASCADE

TCP death → AbortController cascade → every fetch, timer, promise killed.

DNSSSRF

DNS-resolved, IP-pinned egress. All reserved and private ranges blocked at network layer.

RAMDLP

Sensitive data patterns scanned per response. Detected matches redacted in RAM, never logged.

OTelTELEMETRY

Every enforcement action emits a structured OpenTelemetry span. Full observability.

"The ceiling is the ceiling. Exceed it, and the isolate dies."

Fully Auditable

Read every line. Before you trust us.

View on GitHub

Apache 2.0

Vurb.ts Framework is fully open-source. Governance rules, introspection engine, CLI — every line visible on GitHub.

Cryptographic Lockfiles

Every deployment generates a SHA-256 signed lockfile. Contract drift is detected at build time, not in production.

No eval. No new Function.

Dynamic code generation is blocked at the AST level. Your handlers execute exactly what you wrote — nothing injected, nothing modified.

Governance Audit Trail

Every capability check, every DLP scan, every SSRF block — logged as structured OpenTelemetry spans. Export to Jaeger, Datadog, or your own collector.

Deploy Now

Deploy to sealed V8.

Every handler sealed in a V8 isolate. CPU guillotine, memory ceiling, SSRF proxy, DLP — all enforced by default. No configuration required.

Try for Free·No credit card

No credit card · Free tier forever