Connect to MCP Servers
Connect to external MCP servers via STDIO, HTTP, or SSE protocols with automatic retry logic
Model Context Protocol (MCP) is an open standard that enables AI models to seamlessly discover and execute external tools at runtime. Instead of being limited to text generation, AI models can interact with filesystems, search the web, query databases, and execute custom business logic through external MCP servers.
DeepIntShield provides a comprehensive MCP integration that goes beyond simple tool execution:
Key Security Principles:
| Principle | Description |
|---|---|
| Explicit Execution | Tool calls from LLMs are suggestions only - execution requires separate API call |
| Granular Control | Filter tools per-request, per-client, or per-virtual-key |
| Opt-in Auto-execution | Agent mode with auto-execution must be explicitly configured |
| Stateless Design | Each API call is independent - your app controls conversation state |
Connect to MCP Servers
Connect to external MCP servers via STDIO, HTTP, or SSE protocols with automatic retry logic
OAuth Authentication
Secure OAuth 2.0 authentication with automatic token refresh
Tool Execution
Execute tools with full control over approval and conversation flow
Agent Mode
Enable autonomous tool execution with configurable auto-approval
Code Mode
Let AI write Python to orchestrate multiple tools in one request
Connection Resilience
Automatic exponential backoff retry logic handles transient failures gracefully
MCP Gateway URL
Expose DeepIntShield as an MCP server for Claude Desktop and other clients
Tool Hosting
Register custom tools directly in your Go application
Tool Filtering
Control which tools are available per request or per virtual key
DeepIntShield acts as both an MCP client (connecting to external tool servers) and optionally as an MCP server (exposing tools to external clients like Claude Desktop).
graph TB App["<b>Your Application</b>"] Gateway["<b>DeepIntShield Gateway</b><br/>MCP Client | MCP Server<br/>Tool Filtering & Agent Mode"] Servers["<b>MCP Servers</b><br/>filesystem, web search,<br/>databases, etc."] Clients["<b>MCP Clients</b><br/>Claude Desktop,<br/>other apps"]
App -->|Connect| Gateway Gateway -->|Connect to| Servers Clients -->|Connect to| Gateway
style App fill:#E3F2FD,stroke:#0D47A1,stroke-width:2.5px,color:#1A1A1A style Gateway fill:#E8F5E9,stroke:#1B5E20,stroke-width:2.5px,color:#1A1A1A style Servers fill:#FFF3E0,stroke:#BF360C,stroke-width:2.5px,color:#1A1A1A style Clients fill:#F3E5F5,stroke:#4A148C,stroke-width:2.5px,color:#1A1A1AFor detailed architecture information, see the MCP Architecture documentation.
The default tool calling pattern in DeepIntShield is stateless with explicit execution:
1. POST /v1/chat/completions → LLM returns tool call suggestions (NOT executed)
2. Your app reviews the tool calls → Apply security rules, get user approval if needed
3. POST /v1/mcp/tool/execute → Execute approved tool calls explicitly
4. POST /v1/chat/completions → Continue conversation with tool resultsThis pattern ensures:
If you’re planning to use 3+ MCP servers, read the Code Mode documentation carefully.
Code Mode reduces token usage by 50%+ and execution latency by 40-50% compared to classic MCP by having the AI write Python code to orchestrate tools in a sandbox, rather than exposing 100+ tool definitions directly to the LLM.
Set up your first MCP client connection →
Learn about header-based and OAuth 2.0 authentication →
Learn how Code Mode reduces costs by 50% →
Learn the tool execution workflow →