经 AI Skill Hub 精选评估,oktsec安全通信层 获评「推荐使用」。这款MCP工具在功能完整性、社区活跃度和易用性方面表现出色,AI 评分 7.5 分,适合有一定技术背景的用户使用。
为AI智能体间通信提供安全加密层。采用ED25519数字签名确保消息真实性和完整性,支持身份验证和审计日志。适合需要安全可信的多智能体系统开发者和企业级AI应用场景。
oktsec安全通信层 是一款遵循 MCP(Model Context Protocol)标准协议的 AI 工具扩展。通过 MCP 协议,它可以让 Claude、Cursor 等主流 AI 客户端直接访问和操作外部工具、数据源和服务,实现 AI 能力的无缝扩展。无论是文件操作、数据库查询还是 API 调用,都可以通过自然语言在 AI 对话中直接触发,极大提升生产效率。
为AI智能体间通信提供安全加密层。采用ED25519数字签名确保消息真实性和完整性,支持身份验证和审计日志。适合需要安全可信的多智能体系统开发者和企业级AI应用场景。
oktsec安全通信层 是一款遵循 MCP(Model Context Protocol)标准协议的 AI 工具扩展。通过 MCP 协议,它可以让 Claude、Cursor 等主流 AI 客户端直接访问和操作外部工具、数据源和服务,实现 AI 能力的无缝扩展。无论是文件操作、数据库查询还是 API 调用,都可以通过自然语言在 AI 对话中直接触发,极大提升生产效率。
# 方式一:通过 Claude Code CLI 一键安装
claude skill install https://github.com/oktsec/oktsec
# 方式二:手动配置 claude_desktop_config.json
{
"mcpServers": {
"oktsec-----": {
"command": "npx",
"args": ["-y", "oktsec"]
}
}
}
# 配置文件位置
# macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
# Windows: %APPDATA%/Claude/claude_desktop_config.json
# 安装后在 Claude 对话中直接使用 # 示例: 用户: 请帮我用 oktsec安全通信层 执行以下任务... Claude: [自动调用 oktsec安全通信层 MCP 工具处理请求] # 查看可用工具列表 # 在 Claude 中输入:"列出所有可用的 MCP 工具"
// claude_desktop_config.json 配置示例
{
"mcpServers": {
"oktsec_____": {
"command": "npx",
"args": ["-y", "oktsec"],
"env": {
// "API_KEY": "your-api-key-here"
}
}
}
}
// 保存后重启 Claude Desktop 生效
<p align="center"> <strong>Runtime security for AI agents.</strong> </p>
<p align="center"> Oktsec runs locally between AI agents and the tools they execute. For surfaces routed through it — MCP calls, shell/file/browser actions, agent-to-agent messages, and outbound requests — Oktsec applies policy before those actions become production changes. </p>
<p align="center"> <a href="https://github.com/oktsec/oktsec/actions/workflows/ci.yml"><img src="https://github.com/oktsec/oktsec/actions/workflows/ci.yml/badge.svg" alt="CI"></a> <a href="https://goreportcard.com/report/github.com/oktsec/oktsec"><img src="https://goreportcard.com/badge/github.com/oktsec/oktsec" alt="Go Report Card"></a> <a href="https://pkg.go.dev/github.com/oktsec/oktsec"><img src="https://pkg.go.dev/badge/github.com/oktsec/oktsec.svg" alt="Go Reference"></a> <a href="https://github.com/oktsec/oktsec/releases"><img src="https://img.shields.io/github/v/release/oktsec/oktsec" alt="GitHub Release"></a> <a href="LICENSE"><img src="https://img.shields.io/badge/license-Apache%202.0-blue.svg" alt="License"></a> </p>
<p align="center"> <a href="#quick-start">Quick Start</a> · <a href="#why-oktsec">Why Oktsec</a> · <a href="#how-it-works">Architecture</a> · <a href="#dashboard">Dashboard</a> · <a href="#how-it-compares">Compare</a> · <a href="https://oktsec.com/docs">Docs</a> </p>
---
<p align="center"> <img src="documentation/assets/screenshots/dashboard-overview.png" alt="Oktsec dashboard - Overview" width="820"> </p>
---
Latest: v0.15 adds tamper-evident audit chain v2, Redis-backed distributed rate limiting, key rotation with version pinning, and OpenTelemetry tracing. See CHANGELOG.
curl -fsSL https://raw.githubusercontent.com/oktsec/oktsec/main/install.sh | bash
go install github.com/oktsec/oktsec/cmd/oktsec@latest
bash
49 checks across Oktsec (18), OpenClaw (18), NanoClaw (7), and MCP servers (6). Outputs a health score with remediation guidance.
oktsec audit
oktsec audit --sarif # SARIF v2.1.0 for CI integration
```
Health Score: 72 / 100 (Grade: C)
Oktsec (18 checks) ------------------ [CRITICAL] require_signature is false Fix: Set identity.require_signature: true in oktsec.yaml
Summary: 2 critical, 3 high, 1 medium, 43 passed ```
```bash
Config resolution: --config flag, $OKTSEC_CONFIG, ./oktsec.yaml, ~/.oktsec/config.yaml.
version: "1"
server:
port: 8080
bind: 127.0.0.1
identity:
keys_dir: ./keys
require_signature: true
default_policy: deny # recommended for enforcement
agents:
research-agent:
can_message: [analysis-agent]
blocked_content: [credentials, pii]
allowed_tools: [read_file, search]
tool_policies:
create_payment:
max_amount: 10000
require_approval_above: 5000
Validate: oktsec verify --config oktsec.yaml
Full configuration reference in the docs.
Oktsec lives at the runtime execution layer - the tool calls and messages agents emit while they run. Adjacent projects protect different layers.
| Capability | Oktsec | Prompt classifiers (Lakera, PromptArmor) | WAFs (Cloudflare, AWS) |
|---|---|---|---|
| Agent-to-agent message control | Yes | No | No |
| MCP tool-call interception | 10-stage pipeline | No | No |
| Deterministic hot path (no LLM) | Yes | LLM-based | Regex |
| Ed25519 identity + tamper-evident audit | Yes | No | No |
| On-prem single binary (Apache 2.0) | Yes | SaaS | SaaS |
Different layer, complementary. A typical deployment runs a WAF at the edge, a prompt classifier at the LLM boundary, and Oktsec at the agent-to-tool boundary where actual actions happen.
创新型MCP工具,针对AI智能体通信安全痛点提供加密签名方案。代码量适中,定位清晰,但项目成熟度有待验证。
AI Skill Hub 为第三方内容聚合平台,本页面信息基于公开数据整理,不对工具功能和质量作任何法律背书。
建议在沙箱或测试环境中充分验证后,再部署至生产环境,并做好必要的安全评估。
✅ Apache 2.0 — 宽松开源协议,可商用,需保留版权声明和 NOTICE 文件,含专利授权条款。
AI Skill Hub 点评:oktsec安全通信层 的核心功能完整,质量良好。对于Claude Desktop / Claude Code 用户来说,这是一个值得纳入个人工具库的选择。建议先在非生产环境试用,再逐步推广。
| 原始名称 | oktsec |
| 原始描述 | 开源MCP工具:Security layer for AI agent-to-agent communication. Every message is signed, ins。⭐12 · Go |
| Topics | 安全通信智能体消息签名身份验证审计 |
| GitHub | https://github.com/oktsec/oktsec |
| License | Apache-2.0 |
| 语言 | Go |
收录时间:2026-05-22 · 更新时间:2026-05-22 · License:Apache-2.0 · AI Skill Hub 不对第三方内容的准确性作法律背书。
选择 Agent 类型,复制安装指令后粘贴到对应客户端