Early teams & pilots
Named logos and case studies go here when customers are ready to share. Running MCP Trail in production? We’d love your feedback.
Free MCP Playground for Fast Testing
Use the Free MCP Playground to test MCP endpoints through Guardian, inspect risky tool behavior, and validate safe configuration before production rollout. It also includes a free MCP session risk calculator and a free MCP traffic monitor.
free MCP Playground, free MCP session risk calculator, free MCP traffic monitor.
Open Free MCP PlaygroundModel Context Protocol (MCP) lets AI reach real tools and data. Without an MCP firewall–style control point, that traffic is hard to see, hard to prove, and easy to misuse.
HTTP, npm, or Docker—one Guardian setup
Cover HTTP, npm, and Docker-based MCP servers with the same control plane: one proxy URL per server, tokens scoped per server, shared policies.
Stdio-only servers usually need a bridge first; point Guardian at that HTTP URL. Double-check transports in the live product docs.
| How you run MCP | How Guardian fits in |
|---|---|
| HTTP / remote MCP | The usual production setup: MCP over HTTPS. Register your server URL in MCP Trail; assistants call Guardian’s proxy instead of hitting the upstream directly. |
| npm / Node-based MCP | Many Node servers start with npm or npx (often over stdio in dev). When Guardian needs HTTP, add a small JSON-RPC bridge and register that HTTP address. |
| Docker MCP servers | Containers typically expose HTTP for the proxy—or sit behind the same kind of bridge. Guardian stores that URL; clients never need the raw container endpoint. |
What you configure in the dashboard is what the proxy enforces: registered servers, shared state, and a full audit trail in one product.
Where MCP Trail fits
AI security has three layers. MCP Trail focuses on the MCP layer—the path between assistants and your servers and tools.
AI and agents
Prompt safety, which tools an app may use, and policies on the assistant side.
MCP layer
Guardian lives here—your MCP firewall on the wire: policies, logging, data checks, approvals, and limits on MCP traffic before it reaches your servers.
APIs and backends
Traditional API security, auth, and hardening for the systems behind your tools.
Spikes, noisy tools, and error rates show up next to the same audit records you already rely on for reviews.
When someone asks what called what, what was blocked, and who approved it, the answer should be in the log. We build for that—not for slide decks.
What Guardian does for you
A proxy in front of your MCP servers, tool allowlists, data-loss checks, optional human approval, full audit history, and rate limits—so you can show what ran and what you stopped.
Coming soon — with permission
We don’t publish made-up quotes or stock photos. When teams approve public write-ups and logos, they’ll show up here.
What we hear most in pilots
- A clear audit trail: what called what, what was blocked, and who approved the exception.
- Human review for sensitive tool calls without freezing every developer.
- Rules that look at arguments and payloads, not just the tool name on the label.
Try Guardian on your next MCP rollout
Add a server, point clients at the proxy, and read the audit trail. Get started in the app—no purchase order required.
Low-volume MCP security notes
We send mail when we have something worth reading: product changes, rough edges we fixed, and occasional threat write-ups. Unsubscribe anytime.