Fianu Compliance Intelligence MCP Server

1

Add it to Claude Code

Run this in a terminal.

Run in terminal
claude mcp add -e "AUTH0_CLIENT_ID=${AUTH0_CLIENT_ID}" -e "AUTH0_CLIENT_SECRET=${AUTH0_CLIENT_SECRET}" fianu-compliance -- npx -y @fianulabs/mcp
Required:AUTH0_CLIENT_IDAUTH0_CLIENT_SECRET+ 1 optional
README.md

AI-powered compliance intelligence for your software supply chain.

Fianu Compliance Intelligence MCP Server

AI-powered compliance intelligence for your software supply chain. This Model Context Protocol (MCP) server enables AI assistants like Claude Desktop to query Fianu's compliance data in natural language.

Features

MCP Tools

Tool Description Example Question
get_asset_compliance_status Get compliance status for a specific asset with all passing/failing controls "What is the compliance status of my-repo?"
list_controls List all compliance controls with filtering by severity or framework "What controls do we have?"
get_compliance_summary Executive-level organization-wide compliance overview with risk categorization "How healthy is my compliance posture right now?"
get_attestation_details Get attestation details - supports org-wide (control only) or asset-specific queries "Show me pass/fail status for cycode.secret.detection across all repos"
get_deployment_attestations Show all attestations from a specific deployment record "Show me attestations from the last deployment of my-app"
get_pipeline_vulnerabilities Get security vulnerabilities from pipeline scans (SAST, SCA, secrets, container) "What vulnerabilities were found in my-repo?"
get_evidence_chain Trace evidence lineage from origin through occurrences to attestations "Show me the evidence chain for the secret detection failure in my-repo"
get_policy_violations Get failing controls as "policy violations" across the org or for a specific asset "What are all the policy violations?" or "Which assets are failing secret detection?"
get_compliance_trends Analyze compliance trends over time using smart sampling "How has compliance changed over the last 30 days?" or "Is my compliance improving?"
get_deployment_blockers Find what's blocking an application from deploying to a specific gate/environment "What's blocking DBX from deploying to production?" or "Can my-app deploy to staging?"
get_policy_exceptions List and analyze policy exceptions (waivers/exemptions from controls) "What policy exceptions are active?" or "Which controls have exceptions?"
resolve_external_artifact Resolve artifact URI from Artifactory/container registries to Fianu dashboard "Take me to Fianu for sha256:abc123..." or "Find Fianu dashboard for this container image"
analyze_control_failure Analyze OPA Rego policy for a control to understand what it checks and why it fails "Why is cycode.secret.detection failing?" or "Show me the OPA Rego for dependabot.alerts"
list_releases List upcoming (pending) or past (released) releases for an application "What are the upcoming releases for DBX?" or "Show me the last 5 releases for Digital Banking Experience"

Security

  • OAuth 2.0 authentication via Auth0
  • Tenant isolation - Users can only access their own organization's data
  • Audit logging - All API calls and tool invocations logged to Cloudflare Analytics Engine
  • JWT validation - Cryptographically verifies all tokens

Technology Stack

  • Cloudflare Workers - Serverless runtime
  • Durable Objects - Stateful MCP sessions
  • KV Namespace - Response caching
  • Analytics Engine - Audit trail and monitoring
  • TypeScript - Type-safe development

Prerequisites

  • Node.js 18+ and npm
  • Cloudflare account (Account ID: 6841d88809021dab1138d0451d92f94e)
  • Auth0 credentials (Client ID & Secret from fianu.io application)
  • Access to Fianu Dev environment

Setup

1. Clone and Install

cd /Users/petezimmerman/Documents/dev/mcp-compliance-intelligence
npm install

2. Configure Cloudflare

The wrangler.toml file is already configured with:

  • Account ID
  • Worker name
  • Durable Object bindings
  • KV namespace binding (needs creation)
  • Analytics Engine binding

3. Create KV Namespace

npx wrangler kv:namespace create CACHE_KV

Copy the namespace ID and update wrangler.toml:

[[kv_namespaces]]
binding = "CACHE_KV"
id = ""

4. Set Secrets

Set Auth0 credentials (get these from the fianu.io Auth0 application):

npx wrangler secret put AUTH0_CLIENT_ID
# Paste client ID when prompted

npx wrangler secret put AUTH0_CLIENT_SECRET
# Paste client secret when prompted

# Optional: Set audience if Consulta requires it
npx wrangler secret put AUTH0_AUDIENCE
# Enter: https://fianu.io/api

5. Configure Auth0 Application

In the Auth0 dashboard for the fianu.io application, add these callback URLs:

  • https://noah-684.workers.dev/mcp-compliance-intelligence/callback
  • https://noah-684.workers.dev/mcp-compliance-intelligence/token
  • http://localhost:8788/callback (for local testing)
  • http://localhost:8788/token (for local testing)

Tools (14)

get_asset_compliance_statusGet compliance status for a specific asset with all passing/failing controls
list_controlsList all compliance controls with filtering by severity or framework
get_compliance_summaryExecutive-level organization-wide compliance overview with risk categorization
get_attestation_detailsGet attestation details - supports org-wide or asset-specific queries
get_deployment_attestationsShow all attestations from a specific deployment record
get_pipeline_vulnerabilitiesGet security vulnerabilities from pipeline scans
get_evidence_chainTrace evidence lineage from origin through occurrences to attestations
get_policy_violationsGet failing controls as policy violations across the org or for a specific asset
get_compliance_trendsAnalyze compliance trends over time using smart sampling
get_deployment_blockersFind what's blocking an application from deploying to a specific gate/environment
get_policy_exceptionsList and analyze policy exceptions
resolve_external_artifactResolve artifact URI from Artifactory/container registries to Fianu dashboard
analyze_control_failureAnalyze OPA Rego policy for a control to understand what it checks and why it fails
list_releasesList upcoming or past releases for an application

Environment Variables

AUTH0_CLIENT_IDrequiredClient ID from the fianu.io Auth0 application
AUTH0_CLIENT_SECRETrequiredClient secret from the fianu.io Auth0 application
AUTH0_AUDIENCEAPI audience for Auth0 token validation

Configuration

claude_desktop_config.json
{"mcpServers": {"fianu": {"command": "npx", "args": ["-y", "@fianulabs/mcp"]}}}

Try it

What is the compliance status of my-repo?
How healthy is my compliance posture right now?
What vulnerabilities were found in my-repo?
What's blocking DBX from deploying to production?
Why is cycode.secret.detection failing?

Frequently Asked Questions

What are the key features of Fianu Compliance Intelligence?

Query compliance status for specific assets. Analyze security vulnerabilities from pipeline scans. Trace evidence lineage for compliance audits. Identify deployment blockers for specific environments. Analyze OPA Rego policy failures.

What can I use Fianu Compliance Intelligence for?

Security engineers investigating why a specific repository is failing compliance checks.. DevOps teams identifying what is preventing a deployment to production.. Compliance officers reviewing organization-wide risk and policy violations.. Developers checking the evidence chain for a failed secret detection scan..

How do I install Fianu Compliance Intelligence?

Install Fianu Compliance Intelligence by running: npm install

What MCP clients work with Fianu Compliance Intelligence?

Fianu Compliance Intelligence works with any MCP-compatible client including Claude Desktop, Claude Code, Cursor, and other editors with MCP support.

Turn this server into reusable context

Keep Fianu Compliance Intelligence docs, env vars, and workflow notes in Conare so your agent carries them across sessions.

Need the old visual installer? Open Conare IDE.
Open Conare