How CyberCage Works
CyberCage is an AI security platform that provides comprehensive protection for AI-powered development environments by securing communications between AI assistants and MCP (Model Context Protocol) servers.
Multi-Layered Protection Approach
Server Approval and Vetting
Before any MCP server can run, it must be approved through the CyberCage Dashboard. Unknown servers are automatically blocked until you review and approve them. This prevents unauthorized or malicious servers from executing on your machine.
Request Analysis and Filtering
Every request sent to an MCP server is analyzed for security threats before execution. CyberCage identifies and blocks malicious requests including:
- Attempts to access credentials
- Dangerous command execution
- Unauthorized file access
- Data exfiltration attempts
Response Monitoring and Sanitization
All responses from MCP servers are scanned for:
- Leaked credentials or secrets
- Hidden malicious instructions
- Data exfiltration attempts
- Prompt injection attacks
Protection in Action
Example: Blocking Credential Theft
When an MCP server attempts to access sensitive files like SSH keys or AWS credentials, CyberCage:
- Detects the unauthorized access attempt
- Blocks the request immediately
- Creates a threat report in your Dashboard
- Notifies administrators of the incident
Example: Preventing Prompt Injection
If a server response contains hidden instructions trying to manipulate AI behavior, CyberCage:
- Identifies the malicious content
- Blocks the response from reaching your AI assistant
- Logs the threat for review
- Alerts your security team
Continuous Protection
Real-Time Updates
CyberCage continuously updates its protection:
- New threat patterns are automatically applied
- Approved and blocked servers sync across your organization
- Security policies update in real-time
Secure by Default
CyberCage prioritizes security:
- Unknown servers are blocked by default
- Suspicious activity triggers immediate protection
- All communications are encrypted
Next Steps
- Quick Start - Get protected in minutes
- Dashboard Overview - Navigate the Dashboard
- Core Concepts - Understand key components