Skip to content

goweft/heddle

Repository files navigation

heddle

Heddle

The policy-and-trust layer for MCP tool servers.

Heddle turns declarative configs into Model Context Protocol servers
with trust enforcement, credential brokering, and tamper-evident audit logging built in.

See It Work · Why Heddle · Current Status · Security · Quick Start


See It Work

Heddle CLI demo

One config, one MCP server. This YAML is a complete tool server — no Python, no boilerplate:

agent:
  name: prometheus-bridge
  version: "1.0.0"
  description: "Bridges Prometheus for natural language metric queries"
  exposes:
    - name: query_prometheus
      description: "Run a PromQL query"
      parameters:
        query: { type: string, required: true }
    - name: get_alerts
      description: "List active Prometheus alerts"
  http_bridge:
    - tool_name: query_prometheus
      method: GET
      url: "http://localhost:9090/api/v1/query"
      query_params: { query: query }
    - tool_name: get_alerts
      method: GET
      url: "http://localhost:9090/api/v1/alerts"
  runtime:
    trust_tier: 1  # enforced: GET/HEAD only, no writes, no cross-agent calls

Run it:

heddle run agents/prometheus-bridge.yaml

Claude can now query Prometheus in natural language.

Current demo environment: 46 tools from 9 active configs through a single MCP connection (11 configs total, 2 excluded for incompatible transports).

daily-ops        (T3): daily_briefing, system_health_check, threat_landscape
gitea-api-bridge (T1): list_user_repos, list_repo_issues
grafana-bridge   (T1): list_dashboards, get_dashboard, list_datasources, get_alert_rules, grafana_health
ai-platform      (T1): health, ai_status, routing_stats, routing_costs, list_apps, detect_drift, ...
ollama-bridge    (T2): list_models, list_running, generate, show_model
prometheus-bridge(T1): query_prometheus, query_range, get_targets, get_alerts, get_metric_names
rsshub-bridge    (T1): get_hacker_news, get_github_trending, search_arxiv, get_reuters_news
vram-orchestrator(T3): vram_status, smart_load, smart_generate, optimize_vram, unload_model, model_library
intel-rag-bridge (T2): ask_intel, get_dossier, get_trending, get_patterns, get_communities, get_stats, ...

Security is always on. Every tool call passes through trust enforcement, credential brokering, and audit logging.

Example: a T1 (read-only) agent attempted a POST and was blocked:

{
  "event": "trust_violation",
  "agent": "reader",
  "trust_tier": 1,
  "action": "http_POST",
  "detail": "T1 agent cannot use POST. Allowed: ['GET', 'HEAD', 'OPTIONS']",
  "severity": "high",
  "chain_hash": "92c189e3..."
}

The request was rejected, the violation was logged, and the hash chain links this entry to every event before and after it.


Why Heddle Instead Of...

Heddle Hand-written FastMCP OpenAPI wrapper gen n8n / workflow tools
New tool Write YAML, done Write Python handler per tool Generate stubs, then customize Drag nodes, wire connections
Security Trust tiers, credential broker, input validation, config signing, anomaly detection — all built in You build it yourself None Platform-level auth only
Isolation Docker sandboxing: --cap-drop=ALL, read-only root, pids limit, image digest pinning, watchdog Process-level only None None
AI-generatable heddle generate "wrap the Gitea API" → valid config in 20s LLM can write code but can't validate it Not designed for LLM generation Visual-only, not scriptable
Credentials {{secret:key}} resolved at runtime, never in config Hardcoded or env vars Hardcoded or env vars Platform credential store
Audit trail Hash-chained, tamper-evident, anomaly-flagged, every call logged You build it yourself None Platform logs only
Composability Configs become MCP tools, mesh them together Manual wiring Separate services Workflow-scoped

Heddle is for exposing APIs as MCP tools with real runtime controls — not just connectivity. If you only need one tool with no policy layer, hand-written FastMCP is simpler. If you need a visual workflow builder, use n8n. Heddle sits between those worlds: declarative like a workflow tool, programmable like a framework, secure by default.


How It Works

Heddle runtime pipeline

Current Status

What Heddle can do today, what is partially implemented, and what is still planned:

Layer Status Detail
Config → MCP server Shipped YAML configs become typed MCP tools with HTTP bridging
Trust tiers (T1–T4) Shipped Runtime-enforced, violations blocked and logged
Credential broker Shipped Per-config secret policy, {{secret:key}} resolution
Audit logging Shipped Hash-chained JSON Lines, tamper-evident
Input validation Shipped Type checking, injection detection, rate limiting
Access mode annotations Shipped read/write on tools, T1 write blocked at load + runtime
Escalation rules Shipped Conditional hold-for-review on parameter thresholds
Config signing Shipped HMAC-SHA256, tamper detection
Config quarantine Shipped AI-generated configs staged for review
AI config generator Shipped Natural language → validated YAML via local LLM
Container sandboxing Shipped Docker-based isolation with hardening flags, image digest pinning, watchdog
Anomaly detection Shipped Novel tool calls, rate-limit breaches, repeated credential denials
Registry integrity Shipped Per-row HMAC verification, heddle reg verify
Network isolation Partial --network=none baseline shipped; per-host nftables enforcement planned (v0.3)

Core Features

Declarative Tool Configs

Define tools in YAML. Heddle validates the config with Pydantic, generates typed MCP tools, and bridges HTTP with {{param}} template rendering. Cross-field validation catches bad configs before they run.

AI Config Generator

Describe what you need in plain English. A local LLM generates valid YAML, Heddle validates it against schema rules, retries on failure, and saves the result.

$ heddle generate "agent that wraps the Gitea API" --model qwen3:14b
✓ Generated gitea-api-bridge.yaml (2 tools) in 20.3s

Security Architecture

Heddle's security controls map to OWASP Agentic Top 10, NIST AI RMF, and MAESTRO. See the full threat model and security controls reference.

Control What It Does Framework
Trust tiers 4 levels (observer → privileged), runtime-enforced, violations blocked and logged OWASP Agentic #3
Credential broker Per-config secret access policy, {{secret:key}} resolved at runtime, never stored in YAML OWASP Agentic #7
Audit log Hash-chained JSON Lines, tamper-evident, 5 event types, secret redaction OWASP Agentic #9
Input validation Type checking, length limits, injection pattern detection (shell, SQL, LLM prompt) OWASP Agentic #1
Config signing HMAC-SHA256 on all agent configs, tamper detection OWASP Agentic #8
Config quarantine AI-generated configs staged for review before promotion OWASP Agentic #8
Rate limiting Sliding window per-config per-tool OWASP Agentic #4
Container sandboxing Docker isolation: --cap-drop=ALL, --no-new-privileges, --read-only, pids limit, image digest pinning, watchdog timeout OWASP Agentic #6
Anomaly detection Flags novel tool calls, rate-limit breaches, repeated credential denials via audit observer OWASP Agentic #9
Registry integrity Per-row HMAC-SHA256 on agent registry, heddle reg verify detects tampering OWASP Agentic #8
Escalation rules Conditional hold-for-review when parameters match thresholds or patterns OWASP Agentic #3

Starter Packs

Ready-made configs for common services. Copy one into agents/, update the base URL or credentials, validate, and run. See packs/ for full docs.

Pack Tools Trust Description
prometheus 5 T1 read-only PromQL queries, targets, alerts, metric discovery
grafana 5 T1 read-only Dashboards, datasources, alert rules
git-forge 3 T1 read-only Repos, issues (Gitea/GitHub/Forgejo)
ollama 4 T2 worker Model listing, text generation, VRAM status
sonarr 6 T1 read-only TV library, download queue, search, calendar, history
radarr 6 T1 read-only Movie library, download queue, search, calendar, history
cp packs/prometheus.yaml agents/
heddle validate agents/prometheus.yaml
heddle run agents/prometheus.yaml --port 8200

Advanced Examples

These show Heddle beyond simple API bridging.

Tool Mesh

Multiple configs share a single MCP connection to Claude Desktop. The mesh launcher loads all configs, merges tools, and serves them through one stdio transport.

VRAM Orchestrator

A higher-trust agent that manages GPU memory across Ollama and a local GGUF model library, including smart loading and automatic eviction when VRAM is constrained.

Daily Ops Orchestrator

An orchestration agent that queries Prometheus, a RAG search API, and Ollama in parallel, then synthesizes a daily operations briefing with a local model.

Web Dashboard

A FastAPI + React dashboard for mesh topology, agent status, live audit stream, credential policy, and config signatures.


Quick Start

Clone and install

git clone https://github.com/goweft/heddle.git
cd heddle
python -m venv venv
source venv/bin/activate
pip install -e ".[dev]"

Validate and run a config

heddle validate agents/prometheus-bridge.yaml
heddle run agents/prometheus-bridge.yaml --port 8200

Generate a new config

heddle generate "agent that wraps the weather API at localhost:5000"

Run the full mesh

heddle mesh agents/

Security operations

heddle audit show -n 20
heddle audit verify
heddle sign all agents/
heddle sign verify agents/
heddle secrets policy
heddle sandbox agents/my-agent.yaml

Audit log lifecycle

Heddle's audit log at ~/.heddle/audit/audit.jsonl is a hash-chained JSONL file: every entry includes the SHA-256 of the previous entry, so a single tampered or missing line invalidates the chain from that point on. heddle audit verify walks the chain and exits non-zero on the first break.

Policy: rotate-on-break, not tolerate-and-document. A hash chain is either whole or it is broken; there is no useful middle ground. If heddle audit verify reports a break, the chain is sealed and a fresh one is started — the broken file is preserved as raw event data but is no longer the active chain. We do not carry a "known break, please ignore" exception forward, because each such exception weakens what verify is claiming and forces every consumer (CI, anomaly detection, future auditors) to special-case it.

When you'd rotate:

  • heddle audit verify reports a break (most commonly from concurrent writers without file locking — fixed for new entries by commit a50e203, but historical breaks pre-dating that fix remain).
  • The active log has grown unwieldy (hundreds of MB) and you want an archive cut at a known-good boundary.
  • You're cutting a release and want a clean baseline chain for the next development cycle.

Manual rotation procedure (until heddle audit rotate lands; see below):

# 1. Stop the broker so no writer is active
systemctl --user stop heddle-dashboard.service   # or just kill heddle-mesh / dashboard

# 2. Capture a seal record alongside the file
cd ~/.heddle/audit
SEAL_DATE=$(date -u +%Y-%m-%dT%H-%M-%SZ)
sha256sum audit.jsonl > "audit-archive-${SEAL_DATE}.sha256"
wc -l audit.jsonl >> "audit-archive-${SEAL_DATE}.sha256"

# 3. Move the broken/old chain aside
mv audit.jsonl "audit-archive-${SEAL_DATE}.jsonl"

# 4. Restart the broker; the next event creates a fresh audit.jsonl
systemctl --user start heddle-dashboard.service

# 5. Verify the new chain
heddle audit verify        # should exit clean immediately

Archived chains are kept in the same directory (they're still useful as event history) but are not re-verified by heddle audit verify — that command only walks the active chain. To inspect a sealed file directly, jq -c '. | {ts, event, agent}' audit-archive-<date>.jsonl reads it as plain JSONL.

Existing 2026-03-29 break: development machines that ran the dashboard plus the test suite concurrently before the file-lock fix landed have a chain break around that date. There is no recovery path for the contiguous chain; rotating per the procedure above is the supported answer. Production-equivalent deployments (single broker writer, file locking present) should not see new breaks.

Tracked follow-up: heddle audit rotate is on the v0.2 backlog. It will (a) atomically rename the active file to a timestamped archive, (b) write a .sha256 seal alongside, and (c) seed the fresh chain with a chain_seal_predecessor event whose payload references the archive's hash so that an external auditor can chain the archives together. Until then, the manual procedure above is the documented path.

Claude Desktop Integration

To expose a unified Heddle mesh to Claude Desktop (and optionally to CAS):

{
  "mcpServers": {
    "heddle-mesh": {
      "command": "/path/to/heddle/venv/bin/heddle-mesh"
    }
  }
}

CLI Reference

Command Description
heddle run <config> Run a single agent from YAML
heddle validate <config> Validate a config without running it
heddle generate "<prompt>" Generate a config from natural language
heddle mesh <dir> Start all agents as a unified mesh
heddle list List registered agents
heddle registry Show all registered tools
heddle info <agent> Show detailed agent info
heddle probe <server> Discover tools on a running MCP server
heddle audit show Inspect audit log entries
heddle audit verify Verify hash chain integrity
heddle secrets Manage credential broker
heddle sign Sign and verify configs
heddle quarantine Stage AI-generated configs for review
heddle sandbox <config> Show generated sandbox configuration
heddle reg verify Verify HMAC integrity of all registry rows
heddle reg resign Recompute HMACs for all registry rows

Project Structure

heddle/
├── agents/              # YAML agent configs
├── packs/               # Starter pack configs
├── docs/
│   ├── threat-model.md  # Threat analysis, framework-mapped
│   └── security-controls.md
├── src/heddle/
│   ├── cli.py           # CLI entrypoint
│   ├── config/          # Pydantic schema and YAML loader
│   ├── mcp/             # MCP server builder, client, registry
│   ├── runtime/         # Agent runner and mesh runtime
│   ├── generator/       # AI config generator and API discovery
│   ├── security/        # Trust, credentials, audit, validation,
│   │                    #   signing, sandbox, escalation
│   ├── agents/          # Custom higher-level handlers
│   └── web/             # Dashboard backend and frontend
├── tests/
└── pyproject.toml       # Entry points: heddle, heddle-dashboard, heddle-mesh

Tech Stack

Python 3.11+ · FastMCP · FastAPI · Pydantic v2 · httpx · Click · SQLite · Ollama

The WEFT Ecosystem

Heddle is the trust and policy layer. The rest of the stack:

Project Language What it does
cas Go Conversational Agent Shell — terminal TUI where conversation generates workspaces. Heddle adds optional trust enforcement and audit logging.
tenter Python Pre-publish artifact scanner — catches source maps, secrets, debug artifacts before they ship. On GitHub Marketplace.
tenter-rs Rust tenter v2 — static binary, no runtime required.
unshear Rust Fork divergence detector — reveals where safety mechanisms were stripped from a forked agent codebase.
ratine Python Agent memory poisoning detector.
crocking Python AI authorship detector for git repositories.

Heddle + CAS

CAS runs standalone. Heddle integration is optional and adds:

  • Trust enforcement — every tool call CAS makes passes through Heddle's tier system
  • Credential brokering{{secret:key}} resolution, credentials never in config
  • Audit logging — hash-chained, tamper-evident record of every workspace operation
{
  "mcpServers": {
    "heddle-mesh": {
      "command": "/path/to/heddle/venv/bin/heddle-mesh"
    }
  }
}

License

MIT — see LICENSE.

About

Heddle — The policy-and-trust layer for MCP tool servers. Turn YAML configs into validated, policy-enforced MCP tools.

Topics

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors