The Problem
AI agents execute real-world actions — reading emails, querying databases, sending money. The dominant protocol for this (MCP) has no built-in security layer:
- ❌ No identity verification for tool calls
- ❌ No content scanning for sensitive data
- ❌ No audit trail
- ❌ No permission gating
SIGIL fills this gap.
What SIGIL Provides
SIGIL defines 5 traits (interfaces) that any agent system can implement:
┌─────────────────────────────────────────────────────┐
│ SIGIL Envelope │
│ │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ │
│ │ Identity │ │ Scanner │ │ Policy │ │
│ │ Provider │ │ │ │ │ │
│ └────┬─────┘ └────┬─────┘ └────┬─────┘ │
│ │ │ │ │
│ ▼ ▼ ▼ │
│ ┌──────────────────────────────────────────┐ │
│ │ Audit Logger │ │
│ └──────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ ┌──────────────────────────────────────────┐ │
│ │ Vault Provider │ │
│ └──────────────────────────────────────────┘ │
└─────────────────────────────────────────────────────┘
| Trait | Purpose |
|---|---|
IdentityProvider |
Bind users to verifiable trust levels (OIDC, eIDAS, SSI) |
SensitivityScanner |
Detect secrets, PII, financial data before they reach the LLM |
VaultProvider |
Encrypt and store intercepted sensitive content |
AuditLogger |
Tamper-evident logging of every security event |
SecurityPolicy |
Gate actions by risk level, rate, and authorization |
Plus a reference MCP server (SigilMcpServer) that wraps any tool set with all five layers.
Quick Start
[]
= "0.1"
Implement a Scanner
use SensitivityScanner;
;
Secure an MCP Server (4 lines)
use ;
use Arc;
let scanner = new;
let audit = new;
let mut server = new;
server.register_tool;
// Every tool call is now identity-gated, scanned, and audited
let response = server.handle_request.await;
Trust-Gate Sensitive Tools
use TrustLevel;
// This tool requires eIDAS-verified identity
server.register_tool_with_trust;
// Low-trust caller tries to use it → DENIED + audit logged
MCP Extension
SIGIL extends MCP JSON-RPC with a _sigil metadata field:
Responses are scanned automatically:
Conformance Levels
| Level | Requirements | Use Case |
|---|---|---|
| SIGIL-Core | Identity + Audit | Minimum — who did what, when |
| SIGIL-Guard | Core + Scanner + Vault | Full interception — sensitive data never leaks |
| SIGIL-MCP | Guard + MCP Server | Agent tool security — every tool call is gated |
Adoption
SIGIL integrates with any agent framework:
| Platform | Integration |
|---|---|
| MCP Hosts (Claude Desktop, Cursor) | Add _sigil envelope to tool calls |
| LangChain / LlamaIndex | Wrap tool executors with SIGIL policy gate |
| Enterprise agents | Enforce eIDAS/LDAP identity before sensitive operations |
| Banking / Healthcare | Domain-specific SensitivityScanner for PII, PHI |
| Self-hosted AI (Ollama, vLLM) | Add audit trails to local LLM tool usage |
| MyMolt | Reference implementation (SIGIL-MCP conformant) |
Specification
- Overview — Purpose, architecture, conformance levels
- Identity — TrustLevel, IdentityBinding, trust gating
- Interception — Scanner, vault envelope, opaque pointers
- Audit — Event schema, tamper evidence
- MCP Extension — SIGIL as MCP security wrapper
- Security Handshake — MCP initialization trust negotiation
- Registry — Distributed Scanners and Policies ecosystem
License
SIGIL Protocol is dual-licensed:
- Open Source (EUPL-1.2): Free for open-source projects and personal use.
See
LICENSE. - Commercial: Required for proprietary or closed-source applications.
See
LICENSE-COMMERCIALor contact info@sigil-protocol.org.
Note: Using SIGIL as a library dependency in a proprietary project does NOT automatically require a commercial licence, provided you do not modify and redistribute SIGIL itself in closed-source form.