How to ship internal MCP tools securely with hyper-mcp
Wann einsetzen: You need to give engineers a curated toolset and can't trust them to vet every npm MCP package.
Voraussetzungen
- hyper-mcp binary installed — Download release from github.com/hyper-mcp-rs/hyper-mcp/releases
- An OCI registry to host plugins — GHCR or a private Harbor/ECR
Ablauf
-
Publish a signed pluginI've built a WASM plugin at ./my-plugin.wasm. Push it to ghcr.io/acme/my-plugin:v1 and sign with sigstore.✓ Kopiert→ Plugin available on registry with signature
-
Configure hyper-mcp to pull and verify itEdit ~/.config/hyper-mcp/config.json to add the plugin URL with required signer identity.✓ Kopiert→ Plugin appears in
hyper_mcp-list_pluginsafter restart -
Call the tool from ClaudeUse the tool exposed by my-plugin to do <X>.✓ Kopiert→ Tool runs sandboxed; attempts to exceed granted capabilities are denied
Ergebnis: A locked-down internal toolbelt where every plugin is signed, versioned, and sandboxed.
Fallstricke
- Granting network access to all plugins by default — Configure per-plugin
allowed_hosts; deny-by-default - Plugin signed by the wrong identity — hyper-mcp will reject — check sigstore/rekor logs for signer mismatch