How to ship internal MCP tools securely with hyper-mcp
When to use: You need to give engineers a curated toolset and can't trust them to vet every npm MCP package.
Prerequisites
- hyper-mcp binary installed — Download release from github.com/hyper-mcp-rs/hyper-mcp/releases
- An OCI registry to host plugins — GHCR or a private Harbor/ECR
Flow
-
Publish a signed pluginI've built a WASM plugin at ./my-plugin.wasm. Push it to ghcr.io/acme/my-plugin:v1 and sign with sigstore.✓ Copied→ Plugin available on registry with signature
-
Configure hyper-mcp to pull and verify itEdit ~/.config/hyper-mcp/config.json to add the plugin URL with required signer identity.✓ Copied→ Plugin appears in
hyper_mcp-list_pluginsafter restart -
Call the tool from ClaudeUse the tool exposed by my-plugin to do <X>.✓ Copied→ Tool runs sandboxed; attempts to exceed granted capabilities are denied
Outcome: A locked-down internal toolbelt where every plugin is signed, versioned, and sandboxed.
Pitfalls
- Granting network access to all plugins by default — Configure per-plugin
allowed_hosts; deny-by-default - Plugin signed by the wrong identity — hyper-mcp will reject — check sigstore/rekor logs for signer mismatch