Getting Started¶
Install¶
The recommended path is to use uv, which bootstraps isolated environments quickly:
curl -LsSf https://astral.sh/uv/install.sh | sh
git clone https://github.com/Spidux-ai/mcp-pvp.git
cd mcp-pvp
uv venv
source .venv/bin/activate
uv pip install -e "[all]"
If you prefer pip, install the published package with the extras you need:
pip install mcp-pvp # tokenization core
pip install mcp-pvp[presidio] # high-accuracy detectors
pip install mcp-pvp[docs] # MkDocs preview tools
Run the services¶
make run-mcplaunches the MCP stub server that exposespvp.tokenize,pvp.resolve,pvp.deliveras MCP tools.examples/safe_email_sender/demonstrates a delivery-style workflow that uses the vault before reaching out to real email tooling.
Deliver mode mindset¶
- Tokenize sensitive strings with
Vault.tokenize(). - Let the agent plan with tokens instead of raw values.
- Run
Vault.deliver()(orpvp.deliver) to inject the real values locally and execute the tool. DeliverResponsenow carries both the sanitized tool result andresult_tokensdescribing every detected PII span so you can audit leaks.
Next steps¶
- Read the Protocol Specification for how tokens, policies, and sessions interact.
- Review Capability Security for advice on issuing sink-specific capabilities.
- Browse the API Reference to see the exact arguments you feed into
Vault,Policy, and the request/response models.