Skip to content

Integration Guide

MCP Integration

The Model Context Protocol (MCP) gives AI agents a standard way to discover and call external tools. TruCore uses MCP to expose policy enforcement, operator control, and verifiable receipts as tools that any MCP-compatible agent runtime can call directly.

What is MCP?

MCP is an open protocol for connecting large language model applications to external data sources and tools. It defines a standard lifecycle for tool discovery, invocation, and response handling so agent runtimes do not need custom integrations for every service they use.

MCP includes concepts such as tools (callable operations), resources (readable data), lifecycle management, and optional authorization for HTTP transports. The current protocol version is 2025-11-25. Multiple agent runtimes and platforms now support MCP as a standard integration surface, including OpenAI's Apps SDK which uses an MCP server model to define app capabilities.

Why MCP Matters for Agent Systems

Autonomous agents that execute high-value operations (trading, transfers, contract calls) need guardrails that are not hard-coded into every agent. MCP provides a standard way for agents to call enforcement tools before execution, receive structured decisions, and verify results afterward. This means:

  • No bespoke glue. Agents call TruCore through MCP tool invocations instead of custom API wrappers.
  • Runtime-agnostic. Any agent framework that speaks MCP can use TruCore without framework-specific plugins.
  • Composable enforcement. Policy checks, simulation, and receipt verification are separate tools that agents can call in the order their workflow requires.

How TruCore Fits

TruCore's hosted MCP endpoint exposes five tools that cover the full advisory-to-enforcement loop for agent transactions:

ToolTypeDescription
probe_transactionAdvisoryLightweight policy pre-check on a candidate intent. Returns a quick pass/fail signal without full simulation.
simulate_transactionAdvisoryFull simulation against active policies and current conditions. Returns detailed evaluation results.
protect_transactionAuthoritativeBinding policy enforcement decision. Returns an approved permit with receipt or a denial. This is the enforcement gate.
verify_receiptVerificationDeterministic hash verification on an execution receipt. Confirms the receipt has not been tampered with.
explain_decisionAdvisoryHuman-readable explanation of a prior decision with reason codes. Useful for observability and debugging.

The integration model is straightforward: an MCP server exposes protected transaction tools. Agents call TruCore through MCP instead of building bespoke integration code. TruCore remains the policy and receipt layer while the agent runtime handles tool orchestration, signing, and submission.

Canonical MCP Flow

  1. Agent runtime discovers TruCore tools via the MCP endpoint.
  2. Agent calls probe_transaction for a lightweight pre-check on a candidate intent.
  3. Agent calls simulate_transaction for full policy simulation.
  4. Agent calls protect_transaction to get a binding enforcement decision (approved permit or denial).
  5. If approved, the agent signs and submits the transaction independently.
  6. Agent calls verify_receipt to confirm receipt integrity.
  7. Optionally, agent calls explain_decision for human-readable audit output.

Important

MCP does not sign or submit transactions. The agent remains responsible for key management and chain submission. TruCore evaluates, enforces, and produces receipts.

Security and Trust

  • Policy gate before execution. Every intent passes through policy evaluation before the agent can proceed. Denied intents never reach signing or submission.
  • Deterministic outputs. The same input produces the same decision. Receipt hashes are reproducible from canonicalized decision data.
  • Verifiable receipts. Every enforcement decision produces a tamper-evident receipt that can be independently verified without contacting TruCore.
  • Operator control. Operators define spend caps, slippage bounds, protocol allowlists, and cooldown windows. Agents cannot override these policies.
  • Tier-scoped entitlement. MCP access is scoped to each tenant's entitlement tier. Tooling availability follows the same plan-based gating as the REST API.

Current Status

AvailableHosted MCP Endpoint

TruCore's hosted MCP endpoint is available today with five tools covering the full advisory-to-enforcement loop. Agents can discover tools, probe and simulate intents, request binding enforcement decisions, verify receipts, and explain decisions through the MCP protocol surface.

For full tool inventory, endpoint details, and tier-based access, see Integration Surfaces: Hosted MCP.

Next Steps