Integrates AI safety analysis, red-teaming, and prompt auditing directly into MCP-compatible clients like Claude Desktop and Cursor IDE, allowing real-time analysis of prompts and detection of jailbreak attempts.
The Enkrypt AI MCP Server allows you to integrate red-teaming, prompt auditing, and AI safety analysis directly into any Model Context Protocol (MCP)–compatible client such as Claude Desktop or Cursor IDE.
With this server, you can analyze prompts, detect jailbreak attempts, simulate adversarial attacks, and bring AI safety tooling directly into your assistant-driven workflows.
Before getting started, ensure you have uv
installed on your machine.
git clone https://github.com/enkryptai/enkryptai-mcp-server.git cd enkryptai-mcp-server
uv pip install -e .
To use the Enkrypt tools, you’ll need a free API key from:
https://app.enkryptai.com/settings/api
You can connect this MCP server to any MCP-compatible client. Here's how to do it with Cursor and Claude Desktop.
mcp.json
file:{ "mcpServers": { "EnkryptAI-MCP": { "command": "uv", "args": [ "--directory", "PATH/TO/enkryptai-mcp-server", "run", "src/mcp_server.py" ], "env": { "ENKRYPTAI_API_KEY": "YOUR ENKRYPTAI API KEY" } } } }
Replace:
PATH/TO/enkryptai-mcp-server
with the absolute path to the cloned repoYOUR ENKRYPTAI API KEY
with your API keyThe server will launch and appear in your MCP tools list.
This opens or creates the MCP config file at:
~/Library/Application Support/Claude/claude_desktop_config.json
%APPDATA%\Claude\claude_desktop_config.json
Replace the contents with:
{ "mcpServers": { "EnkryptAI-MCP": { "command": "uv", "args": [ "--directory", "PATH/TO/enkryptai-mcp-server", "run", "src/mcp_server.py" ], "env": { "ENKRYPTAI_API_KEY": "YOUR ENKRYPTAI API KEY" } } } }
Make sure to:
Finally, restart Claude Desktop. Once it reloads, you’ll see a hammer icon in the chat box, indicating your MCP tools are active.
Discover shared experiences
Shared threads will appear here, showcasing real-world applications and insights from the community. Check back soon for updates!