ShellWard is an AI agent security middleware that protects against prompt injection, data exfiltration, and dangerous command execution by intercepting tool calls at runtime.
From the registry: AI agent security: 7 MCP tools for injection detection, PII scanning, command safety, DLP.

$ git clone https://github.com/jnMetaCode/shellward && cd shellward && npm installhttps://github.com/jnMetaCode/shellwardPlease install the `shellward` MCP server into my current AI client (that's you).
Required prerequisites (do these first if not already done):
- **Clone repository** — Must clone repo first, then run via tsx Run: `git clone https://github.com/jnMetaCode/shellward && cd shellward && npm install` (https://github.com/jnMetaCode/shellward)
Canonical MCP server config (stdio transport):
- command: `npx`
- args: ["tsx","<path-to-shellward>/src/mcp-server.ts"]
- optional environment variables:
- `SHELLWARD_MODE`: enforce or audit mode (default: enforce) (example: `enforce`)
Note: AI agent security middleware. 8-layer defense: prompt injection detection, PII scanning, dangerous command blocking, DLP data flow control. 7 MCP tools. Zero dependencies. Also available as npm SDK.
Add this MCP server to my current client's config in the correct format for you. If you need secrets or credentials I haven't provided, ASK me — do not invent values or leave raw placeholders. After adding it, tell me how to verify the server is connected.SHELLWARD_MODErequiredSets the mode of operation, either 'enforce' or 'audit'.SHELLWARD_LOCALErequiredSets the locale for the middleware, options include 'auto', 'zh', or 'en'.SHELLWARD_THRESHOLDrequiredSets the risk score threshold for injection detection, ranging from 0 to 100.AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch