AIR Blackbox MCP Server

Local setup required. This server has to be cloned and prepared on your machine before you register it in Claude Code.
1

Set the server up locally

Run this once to clone and prepare the server before adding it to Claude Code.

Run in terminal
pip install air-blackbox-mcp
2

Register it in Claude Code

After the local setup is done, run this command to point Claude Code at the built server.

Run in terminal
claude mcp add air-blackbox -- node "<FULL_PATH_TO_AIR_BLACKBOX_MCP>/dist/index.js"

Replace <FULL_PATH_TO_AIR_BLACKBOX_MCP>/dist/index.js with the actual folder you prepared in step 1.

README.md

EU AI Act compliance scanning for Claude Desktop and Cursor

AIR Blackbox MCP Server

EU AI Act compliance scanning for Claude Desktop, Cursor, and any MCP-compatible client.

Unlike other compliance scanners that only report problems, AIR Blackbox also remediates — generating working code fixes, trust layer integrations, and full compliance reports.

10 Tools

Tier Tool What it does
Scanning scan_code Scan Python code string for all 6 EU AI Act articles
Scanning scan_file Read and scan a single Python file
Scanning scan_project Recursively scan all .py files in a directory
Analysis analyze_with_model Deep analysis via local fine-tuned model (Ollama)
Analysis check_injection Detect prompt injection attacks (15 patterns)
Analysis classify_risk Classify tools by EU AI Act risk level
Remediation add_trust_layer Generate trust layer integration code
Remediation suggest_fix Get article-specific fix recommendations
Documentation explain_article Technical explanation of EU AI Act articles
Documentation generate_compliance_report Full markdown compliance report

Supported Frameworks

LangChain, CrewAI, AutoGen, OpenAI, Haystack, LlamaIndex, Semantic Kernel, and generic RAG pipelines.

Install

pip install air-blackbox-mcp

Claude Desktop Setup

Edit ~/Library/Application Support/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "air-blackbox": {
      "command": "python3",
      "args": ["-m", "air_blackbox_mcp"]
    }
  }
}

Restart Claude Desktop. The 10 tools will appear automatically.

Cursor Setup

Add to .cursor/mcp.json in your project:

{
  "mcpServers": {
    "air-blackbox": {
      "command": "python3",
      "args": ["-m", "air_blackbox_mcp"]
    }
  }
}

Usage Examples

In Claude Desktop or Cursor, just ask:

  • "Scan this code for EU AI Act compliance"
  • "Add a trust layer to this LangChain agent"
  • "Check this text for prompt injection"
  • "What does Article 12 require?"
  • "Generate a compliance report for my project at ~/myproject"
  • "Classify the risk level of send_email"

Optional: Deep Analysis with Ollama

For AI-powered analysis beyond regex patterns:

# Install Ollama
brew install ollama

# Pull the fine-tuned compliance model
ollama pull air-compliance-v2

# The analyze_with_model tool will automatically use it

What Makes This Different

Other MCP compliance tools only scan. AIR Blackbox:

  1. Scans — 18+ regex patterns across 6 EU AI Act articles
  2. Analyzes — local fine-tuned model catches what regex misses
  3. Remediates — generates working code to fix findings
  4. Verifies — checks for prompt injection with 15 weighted patterns
  5. Classifies — maps tools to EU AI Act risk levels
  6. Documents — produces full compliance reports

Links

Tools (10)

scan_codeScan Python code string for all 6 EU AI Act articles
scan_fileRead and scan a single Python file
scan_projectRecursively scan all .py files in a directory
analyze_with_modelDeep analysis via local fine-tuned model (Ollama)
check_injectionDetect prompt injection attacks (15 patterns)
classify_riskClassify tools by EU AI Act risk level
add_trust_layerGenerate trust layer integration code
suggest_fixGet article-specific fix recommendations
explain_articleTechnical explanation of EU AI Act articles
generate_compliance_reportFull markdown compliance report

Configuration

claude_desktop_config.json
{"mcpServers": {"air-blackbox": {"command": "python3", "args": ["-m", "air_blackbox_mcp"]}}}

Try it

Scan this code for EU AI Act compliance
Add a trust layer to this LangChain agent
Check this text for prompt injection
What does Article 12 require?
Generate a compliance report for my project at ~/myproject

Frequently Asked Questions

What are the key features of AIR Blackbox?

Scans Python code against 18+ regex patterns for EU AI Act compliance. Performs deep analysis using local fine-tuned Ollama models. Generates working code fixes and trust layer integrations. Detects prompt injection attacks using 15 weighted patterns. Produces full markdown compliance reports for projects.

What can I use AIR Blackbox for?

Ensuring LangChain or CrewAI agents meet EU AI Act regulatory requirements. Auditing Python codebases for potential prompt injection vulnerabilities. Automating the generation of technical compliance documentation for AI projects. Classifying the risk level of specific AI tools within a development pipeline.

How do I install AIR Blackbox?

Install AIR Blackbox by running: pip install air-blackbox-mcp

What MCP clients work with AIR Blackbox?

AIR Blackbox works with any MCP-compatible client including Claude Desktop, Claude Code, Cursor, and other editors with MCP support.

Turn this server into reusable context

Keep AIR Blackbox docs, env vars, and workflow notes in Conare so your agent carries them across sessions.

Need the old visual installer? Open Conare IDE.
Open Conare