Nobulex MCP Compliance Server MCP Server

1

Add it to Claude Code

Run this in a terminal.

Run in terminal
claude mcp add nobulex-mcp -- npx -y @nobulex/mcp-server
README.md

Covenant rule checking, hash-chained audit logs, and integrity verification.

@nobulex/mcp-server

Nobulex MCP compliance server — covenant rule checking, hash-chained audit logs, and integrity verification for any MCP-compatible agent.

Tools

Tool Description
set_rules Set covenant rules using permit/forbid/require syntax
check_action Check if an action is allowed or blocked by current rules
get_audit_log Return the full hash-chained audit trail
verify_log Verify integrity of the audit chain (detect tampering)

Rule Syntax

forbid delete_user Users cannot be deleted
permit read_data Safe to read
require approval Must get approval first
forbid admin.* All admin actions blocked
forbid * Lockdown mode

Rules are evaluated in order — first match wins. Unmatched actions are allowed by default.

Setup

Claude Desktop

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "nobulex": {
      "command": "npx",
      "args": ["-y", "@nobulex/mcp-server"]
    }
  }
}

Config file locations:

  • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
  • Windows: %APPDATA%\Claude\claude_desktop_config.json

Cursor

Add to your Cursor MCP settings:

{
  "mcpServers": {
    "nobulex": {
      "command": "npx",
      "args": ["-y", "@nobulex/mcp-server"]
    }
  }
}

Any MCP Client

The server uses stdio transport. Run it with:

npx @nobulex/mcp-server

Development

npm install
npm run build
npm test

License

MIT

Tools (4)

set_rulesSet covenant rules using permit, forbid, and require syntax.
check_actionCheck if an action is allowed or blocked by current rules.
get_audit_logReturn the full hash-chained audit trail.
verify_logVerify integrity of the audit chain to detect tampering.

Configuration

claude_desktop_config.json
{"mcpServers": {"nobulex": {"command": "npx", "args": ["-y", "@nobulex/mcp-server"]}}}

Try it

Set a rule to forbid all admin actions.
Check if the action 'delete_user' is currently allowed.
Retrieve the full audit log to review recent agent activity.
Verify the integrity of the audit log to ensure no tampering has occurred.

Frequently Asked Questions

What are the key features of Nobulex MCP Compliance Server?

Covenant rule enforcement using permit, forbid, and require syntax. Hash-chained audit logging for all agent actions. Integrity verification to detect tampering in the audit trail. Rule evaluation with first-match-wins logic.

What can I use Nobulex MCP Compliance Server for?

Enforcing strict security policies on AI agents in enterprise environments. Maintaining a tamper-evident record of all actions taken by an MCP agent. Auditing agent behavior to ensure compliance with internal governance rules. Implementing lockdown modes for sensitive system operations.

How do I install Nobulex MCP Compliance Server?

Install Nobulex MCP Compliance Server by running: npx -y @nobulex/mcp-server

What MCP clients work with Nobulex MCP Compliance Server?

Nobulex MCP Compliance Server works with any MCP-compatible client including Claude Desktop, Claude Code, Cursor, and other editors with MCP support.

Turn this server into reusable context

Keep Nobulex MCP Compliance Server docs, env vars, and workflow notes in Conare so your agent carries them across sessions.

Need the old visual installer? Open Conare IDE.
Open Conare