What MCP servers can I use with Clampd?
Any MCP server. The proxy wraps any upstream server and discovers tools dynamically at startup. Use filesystem, Postgres, GitHub, Slack, Brave Search, or any custom server you build.
Does Clampd see my data?
Clampd inspects tool call parameters for security threats in-memory only. Nothing is stored. The audit trail records metadata (tool name, risk score, matched rules) — never raw parameters or responses.
What's the latency overhead?
Under 10ms per call for the full 9-stage pipeline. The demo runs through real gRPC calls to 9 microservices. In production (same datacenter), typical latency is 3-6ms.
How is this different from prompting the LLM to be safe?
Prompt-based safety is bypassed by injection attacks. Clampd operates at the tool call layer — after the LLM decides, before the action executes. No amount of prompt manipulation can bypass a pattern match on ../../etc/passwd or DROP TABLE.
Can I self-host Clampd?
Yes. Fully self-hosted via Docker Compose. Two compose files: proxy (9 services, 9-17MB each) and dashboard. See the
Setup Guide.
What categories do the detection rules cover?
Detection rules span SQL injection, command injection, path traversal, SSRF, prompt injection, PII exfiltration, reverse shells, schema injection, tool confusion, encoding evasion, SSTI, HTTP smuggling, and more — across all 15 tool-call categories. View the full list in the
dashboard Rules page.
What happens when an agent is kill-switched?
An 8-layer cascade in under 1 second: deny list, gateway broadcast, token flush, session termination, IdP revocation, state change, event broadcast, audit log. All in-flight requests are discarded. The agent cannot make any calls until explicitly revived.
Can Claude Desktop connect too?
Yes. Add this to your Claude Desktop config:
{ "mcpServers": { "clampd": { "url": "https://mcp.clampd.dev/sse" } } }
How do scope exemptions work?
13 of detection rules are exemptable via scopes. If an agent has the right scope (e.g., data:pii:query), the policy layer overrides the block. The majority are never-exemptable — no scope can override them.
What's rug-pull detection?
Clampd hashes every tool descriptor (name + description + schema) at startup with SHA-256. If a descriptor changes mid-session, the hash mismatch blocks the call — preventing attacks where a tool's behavior changes after approval.