MCP Registry/Gateway
The Model Context Protocol (MCP) is a standardized way for AI models to securely interact with external tools, services, and data sources.
Within Javelin, MCP acts as a bridge between LLMs and external systems, enabling richer AI capabilities while enforcing enterprise-grade security, policy compliance, and continuous vulnerability checks.
MCP Configuration Guide
Field Descriptions
name
string
Yes
—
Unique key for this MCP server (for example, deepwiki)
description
string
No
—
Human-readable description
type
string
Yes
—
MCP server type/transport (for example, streamable-http)
endpoint
string
Yes
—
Base URL for the MCP server
is_active
boolean
No
true
Whether the MCP registry is enabled
config.authorization_token
string
No
—
Optional; credential used to authenticate with the MCP server, if needed.
Policy Fields
dlp
prompt_safety
indirect_prompt_safety
Tool Enable/Disable Payload
Use this payload to enable or disable a specific tool for an MCP server.
enabled
boolean
Yes
Whether the tool is enabled for this MCP server
MCP Benefits
Enhanced AI Capabilities
Tool Integration: Connect AI to APIs, databases, and enterprise services.
Controlled Access: Enable/disable specific tools per MCP server, ensuring only approved tools are usable
Application-Centric Usage: All MCP interactions are tied to the Application that invoked them, keeping usage, logs, and policies scoped to the right context.
Enterprise Security
Policy Enforcement: Apply filters (e.g., Malicious Instruction Injections, Data Protection, Security Filters).
Audit Trail: Every request and tool invocation is logged.
Vulnerability Scan: Whenever you enable/disable a tool or open the Tools tab, Javelin automatically runs a vulnerability scan to detect security risks in that tool.
Operational Efficiency
Simple Management: Easy setup of servers and tool configs.
Monitoring & Analytics: Usage tracking, vulnerability status, and performance insights.
MCP Features
Tool Management
Registration – Add new MCP servers.
Configuration – Define endpoints, tokens, and tool details.
Tool Status & Vulnerabilities – Enable/disable tools and review vulnerability scan results.
Security Policies
Malicious Instruction Injections – Defend against jailbreaks or injection attempts.
Data Protection – Prevent sensitive data leakage.
Security Filters – Protect against MCP Tool security vulnerabilities.
MCP Registry
In Javelin, MCP registries define how your gateway connects to external MCP servers and exposes their tools to applications.
Each registry includes connection details, authentication credentials, and baseline policy controls. You can also selectively enable tools on a per-registry basis to safely extend application capabilities.
Creating an MCP Registry
Navigate to the MCP Registries page within your gateway.
Click Add MCP Registry button.
In the Details tab, fill in the required fields.
The Details tab provides the core configuration for your MCP Registry. It includes:
Name: Unique identifier for your MCP server (e.g.,
deepwiki,github).URL: The base URL of the MCP server.
Request URL: The endpoint Javelin uses to send MCP requests for this server.
This URL is automatically generated after registration and is required when connecting LLMs to MCP tools.
Example:
https://api.javelin.live/v1/mcp/deepwiki
Description: A human-readable purpose or context for the MCP registry.
Authorization Token: Token used to authenticate with the MCP server.
Store this securely, as it may grant direct access to the MCP server’s tools.
The token can be updated at any time if compromised.
This tab serves as the foundation for connecting Javelin to your MCP server, ensuring all requests are routed securely.
Click Save to create the registry.
Once an MCP Registry is created, it will appear in the MCP Registries list.
From here, selecting a registry takes you to its dedicated page where you can configure and manage it further.
Tools Tab
The Tools tab allows you to:
View all tools exposed by the registered MCP server.
Enable or disable individual tools for controlled access.
See Vulnerability scan results for each tool.
Whenever you enable/disable a tool or open the Tools tab, Javelin automatically runs a vulnerability scan on that tool. The results are displayed directly in this tab, showing potential security vulnerabilities.
This ensures that every tool made available through MCP is continuously assessed for risk, giving developers and admins clear visibility into tool security posture before use.
Policy Tab
The Policy tab displays all MCP Registry-level policies currently applied.
Policies ensure safer usage of MCP tools by applying filters such as:
Malicious Instruction Injections – Defends against prompt injection or jailbreak attempts.
Data Protection – Prevents exposure of sensitive data like PII, credentials, or secrets.
Security Filters – Defends against MCP tool vulnerabilities such as command injection, path traversal, secrets leakage, and SQL injection.
These registry-level guardrails are enforced after a tool response is received when requests are made using an application key.
Application Graph Tab
Displays all MCP tools accessed via this application's key.
Shows tool name, MCP server, number of requests, and last used in a graph format.
Helps you analyze MCP tool usage patterns and identify high-traffic integrations.
Hitting an MCP Server: DeepWiki Example
You can invoke MCP servers such as DeepWiki through an OpenAI LLM (e.g., GPT-4.1).
Below is an example curl request:
Authorization: Bearer OPENAI_SECRET_KEY → Authenticates with the OpenAI LLM provider.
X-Javelin-Apikey: APPLICATION_DEVELOPER_KEY → Authenticates the request in Javelin and logs it under the Application.
tools block → Connects the LLM to the MCP server (here:
deepwiki).Authorization (inside tools block): Bearer APPLICATION_DEVELOPER_KEY → Authenticates requests made by the LLM to the MCP server via Javelin Gateway. This ensures the MCP tool invocation is also tracked under the same Application’s Chronicles.
Payload Example
Chronicles for MCP Requests
Any request made to an MCP server using an Application Developer Key will appear in that Application’s Chronicles tab.
There you can see:
Input sent in the request
Output received in the response
Tool invocations (e.g., DeepWiki calls)
Guardrail checks
This ensures that all MCP-related activity is auditable under the Application whose key was used.
Last updated