← Back to project

MCP Tooling Specification & Security/Compliance Checklist



This report details the Model Context Protocol (MCP) interface that allows external AI assistants to query the audit overlay, and provides a security/compliance checklist for IT approval. It also outlines a low‑risk pilot proposal.

---

1. MCP Server Interface



MCP (Model Context Protocol) is a JSON‑RPC‑based standard for tools that AI agents can invoke. Running the overlay as an MCP server enables direct integration with ChatGPT, Claude, or other MCP‑aware clients.

Transport



Available Tools



| Tool | Description | Parameters | Returns |
|------|-------------|------------|---------|
| `audit.search_events` | Free‑text search over event payloads | `query` (string) | list of matching events (id, type, timestamp, entity, snippet) |
| `audit.get_daily_summary` | Natural‑language summary for a date | `date` (YYYY‑MM‑DD) | `summary` (string) |
| `audit.get_anomalies` | Retrieve flagged anomalies | `start_date`, `end_date` (YYYY‑MM‑DD), optional `severity` (string) | list of anomalies with explanation |
| `audit.trace_entity` | Full timeline for an entity | `entity_type` (string), `entity_id` (string) | list of events sorted chronologically |
| `audit.export_report` | Export data in various formats | `format` ("json"|"csv"|"md"), `type` (e.g., "sales"), `start`, `end` dates | file content (base64 or direct) |


All tools are read‑only and execute in milliseconds for cached data. The `get_daily_summary` may trigger an on‑the‑fly generation if not pre‑computed; that’s the only LLM call that might take seconds.

Example MCP Call (JSON‑RPC)



json
{
"jsonrpc": "2.0",
"method": "audit.trace_entity",
"params": { "entity_type": "product", "entity_id": "SKU12345" },
"id": 42
}


Response:

json
{
"jsonrpc": "2.0",
"result": {
"events": [
{
"event_id": "uuid...",
"type": "inventory.adjustment",
"timestamp": "2026-02-15T10:30:00Z",
"payload": { "reason": "SALE", "qty_change": -2 }
},
...
]
},
"id": 42
}


Implementation in Go



The overlay binary will support a `mcp` subcommand:

bash
audit-overlay mcp --stdio


It will:


No external dependencies beyond the core library.


---

2. Security & Compliance Checklist



When presenting to a customer’s IT or security team, address these points:

2.1 Privileges



Database:


2.2 Network Layout



2.3 Encryption



2.4 Audit Logging of the Overlay Itself



2.5 Data Minimization



Before any data leaves the host (e.g., if using a cloud LLM), we apply a masking filter:


2.6 On‑Prem vs Cloud LLM



Recommendation for pilot: Start on‑prem; if summaries are too weak, discuss cloud option with customer.


---

3. Pilot Proposal Outline (Low‑Risk Engagement)



Goal: Prove value in 2 weeks on a representative environment with minimal friction.

Installation



Support



Success Criteria



Exit



If the customer decides not to proceed, they simply stop the containers. No database changes were made beyond read‑only access; the overlay can be cleanly removed.

---

4. Recommended MVP Stack (Recap from Report 2)



This stack meets the “easy install, on‑prem friendly, value in days” mandate.


---

Word count: ~950