3,400+ servers built on vurb.ts
Vinkius

Governance for AI Agents.
Full visibility into every action.

Every tool call, every deploy, every access decision. Recorded, chained, and impossible to tamper with.

WRITEWRITEWRITEDELETE → ✗
Pillar 01

Audit Log

Every tool call your AI agents make through MCP servers is permanently recorded. Which tool, what data, who triggered it. No edits, no deletes.

USA
Pillar 02

Identity & Access

Control which team members and AI clients can access each MCP server. Custom roles, machine accounts, and permissions scoped by project.

DLPFinOpsApprovalBreaker
Pillar 03

Data Protection

Sensitive data is redacted before reaching the AI agent. Token budgets prevent runaway costs. Deploy approvals gate every MCP server change.

Audit Log

Every AI agent action. Permanently recorded.

Every tool call, every MCP server deploy, every access decision your AI agents make is logged with a complete paper trail. Records can never be deleted or changed.

Write-once records

Every AI agent tool call and MCP server interaction is logged permanently. No deletes, no edits. Enforced at the platform level.

deploy.createdWRITEdeploy.approvedWRITEdeploy.restoredWRITEDELETE → throwRuntimeException

Tamper detection

Each activity record is chained to the one before it. Change a single entry and the system detects it instantly.

H(prev_hmac | id | event | payload)prev:GENESIShmac:a3f2c8...prev:a3f2c8...hmac:7d1e4b...prev:7d1e4b...hmac:b9c7f1...

Built-in search and export

Search and export the full AI agent activity log via dashboard or API. MCP server, tool name, actor, timestamp, and outcome included.

{"actor_type":"user""action":"deploy.approved""target":"mcp_server""ip":"10.0.1.42""hmac":"a3f2c8..."}SIEMS3 Archivepaginate(50)
Identity & Access

Control who accesses your MCP servers.

Define which team members and AI clients can interact with each MCP server. Assign roles, create machine accounts for CI/CD pipelines, and set access rules that expire on schedule.

Know who did it

Every MCP server action is tied to its exact actor. Human user, AI client, or CI/CD pipeline. IP and device captured automatically.

userid: usr_7f3a...IP: 10.0.1.42UA: Chrome/131service_accountid: sa_deploy_01UA: vurb-cli/2.1systemid: systemautomated

Custom roles and permissions

Build roles with the exact MCP server permissions needed. Clone system roles as a starting point. Assign per organization or project.

member.invitedrole.assignedproject.createdrole_binding.createdservice_account.createdorg_api_key.rotated+ every IAM mutation

Machine accounts and keyless auth

Dedicated accounts for automated pipelines that deploy and manage MCP servers. Connect from GitHub Actions or GitLab CI without storing secrets.

Request200 OKResponsesentafterResponse()AuditLog::create() → 0ms added latency
Data Protection

Protect data flowing through your AI agents.

Automated policies that remove sensitive data before it reaches AI agents, limit spending per MCP server, and require approval before changes go live.

DLP Redaction

Passwords, personal data, and secret keys are automatically removed from MCP server responses before reaching AI agents. Zero configuration required.

DLP Enginesk-proj-a8f2...[REDACTED]347 redactions this period

FinOps Guard

Set spending limits and response size caps per MCP server. Oversized responses are automatically trimmed to prevent unexpected costs.

Budget$0.02/req limitPayloadmax 4096 tokens128 truncations · $842 saved

Deploy Approval

Require human approval before any MCP server goes live. Every approval and rejection is recorded in the audit log with full attribution.

PendingApprovedLiverequire_deploy_approval: true

Circuit Breaker

Automatic safety switch when MCP server error rates spike. Prevents problems from spreading across your AI agents and connected services.

ClosedpassingHalftestingOpenblockederror_rate > threshold→ circuit opens automatically
Governance Controls

MCP server policies enforced before tools execute.

Automated rules that govern how AI agents interact with MCP servers at every layer.

Chain integrity

Verify the entire MCP server activity history in one call. Any modified records are detected and flagged instantly.

verifyChain(serverId){ valid:true, broken_at:null, total:847}UUID v7 ordered • recomputed HMAC vs stored

Retention policies

Configurable retention periods for AI agent activity logs. Legal hold blocks all purges. EU AI Act compliant.

activewarm (30d)cold (6m+)EU AI Act minLegal Hold

Deploy approval flow

Every MCP server deploy is logged with full attribution. Human approval required before AI agents can access production tools.

deploy.createdtoken: tk_7f3adeploy.approval_requireduser: usr_01deploy.approvedHMAC ✓

Server registry

Vet and approve MCP servers before AI agents can use them. Unknown servers are blocked by default. No unauthorized tool access.

github-mcpAPPROVEDslack-mcpPENDINGunknown-serverBLOCKED

AI agents never stop.
MCP Servers need Vinkius.

AI agents run around the clock. Every action is isolated, tracked, and controlled automatically. Usage limits, access rules, and data protection come built in. Nothing runs without permission. Nothing escapes without a record.

Try for Free·No credit card