Protected MCP tool-call governance

Resolve Action Cards through protected MCP before developer-owned execution

Official MCP Registry listing active: com.neurarelay/relay-mcp

Run the public example

Clone relay-action-card

Activate sandbox MCP

Copy a one-time sandbox token

Connect your MCP client

Use POST /mcp with bearer auth

Keep execution yours

Your application still executes

Connect through protected MCP

Use POST /mcp with bearer auth from Workspace or controlled private access

Endpoint
https://www.neurarelay.com/mcp
Header
Authorization: Bearer <token>
Boundary
401 without auth; GET returns 405
Remote MCP
JSON
{  "server_url": "https://www.neurarelay.com/mcp",  "transport": "streamable_http",  "headers": {    "Authorization": "Bearer <RELAY_MCP_TOKEN>"  }}
Expand full example
{  "server_url": "https://www.neurarelay.com/mcp",  "transport": "streamable_http",  "headers": {    "Authorization": "Bearer <RELAY_MCP_TOKEN>"  },  "allowed_tools": ["validate_action_card", "resolve_action_card"],  "require_approval": "always"}
{ "server_url": "https://www.neurarelay.com/mcp", "transport": "streamable_http", "headers": { "Authorization": "Bearer <RELAY_MCP_TOKEN>" }, "allowed_tools": ["validate_action_card", "resolve_action_card"], "require_approval": "always" }

Five narrow tools

Each tool returns governance proof or safe refs; none executes the downstream action

validate_action_card

Check Action Card shape

Read-only

resolve_action_card

Return receipt and trace refs

Creates proof

get_decision_receipt

Fetch a safe receipt summary

Read-only

get_trace_replay

Fetch redacted trace replay

Read-only

lookup_agent_passport

Check Registry standing

Read-only

Data boundary

Receipts, trace refs, transaction refs, Registry context

Production identity

Production agents need Registry Agent Passport standing

Support path

Use GitHub issue templates with safe refs only