How to ship internal MCP tools securely with hyper-mcp
언제 쓸까: You need to give engineers a curated toolset and can't trust them to vet every npm MCP package.
사전 조건
- hyper-mcp binary installed — Download release from github.com/hyper-mcp-rs/hyper-mcp/releases
- An OCI registry to host plugins — GHCR or a private Harbor/ECR
흐름
-
Publish a signed pluginI've built a WASM plugin at ./my-plugin.wasm. Push it to ghcr.io/acme/my-plugin:v1 and sign with sigstore.✓ 복사됨→ Plugin available on registry with signature
-
Configure hyper-mcp to pull and verify itEdit ~/.config/hyper-mcp/config.json to add the plugin URL with required signer identity.✓ 복사됨→ Plugin appears in
hyper_mcp-list_pluginsafter restart -
Call the tool from ClaudeUse the tool exposed by my-plugin to do <X>.✓ 복사됨→ Tool runs sandboxed; attempts to exceed granted capabilities are denied
결과: A locked-down internal toolbelt where every plugin is signed, versioned, and sandboxed.
함정
- Granting network access to all plugins by default — Configure per-plugin
allowed_hosts; deny-by-default - Plugin signed by the wrong identity — hyper-mcp will reject — check sigstore/rekor logs for signer mismatch