Trust Model
Tollgate provides a security layer between AI agents and MCP servers. This document explains the trust model and security guarantees.Architecture
Security Guarantees
Policy Enforcement
- All tool calls are evaluated - No bypass mechanism exists
- Policies are evaluated locally - No external API calls
- Fail-closed by default - If policy evaluation fails, access is denied
Audit Trail
- Complete logging - Every tool call is recorded
- Tamper-evident - SQLite database with integrity checks
- PII redaction - Sensitive data redacted by default
No Network Dependencies
- Runs entirely locally - No cloud services
- No telemetry - Usage data never leaves your machine
- Works offline - No internet required
Threat Model
What Tollgate Protects Against
| Threat | Protection |
|---|---|
| AI agent exceeding scope | Policy-based access control |
| Accidental destructive operations | Analyzer detection + denial |
| Unreviewed database modifications | Prompt-based approval |
| Audit trail gaps | Complete logging |
What Tollgate Does NOT Protect Against
| Threat | Why | Mitigation |
|---|---|---|
| Malicious MCP server | Tollgate trusts upstream responses | Use trusted servers only |
| Compromised Tollgate binary | Attacker has local access | Verify package integrity |
| Social engineering approval | User approves malicious operation | Train users, use strict policies |
Trust Boundaries
Trusted Components
- Tollgate binary - Assumed to be uncompromised
- Configuration file - Assumed to be correct
- Local filesystem - Assumed to be secure
Untrusted Components
- AI agent - May attempt unauthorized operations
- Tool arguments - May contain malicious content
- User input in prompts - May be manipulated
Verification
Open Source
Tollgate is open source. Audit the code yourself:Package Verification
Verify npm package integrity:Security Best Practices
Configuration
-
Use deny-by-default policies
-
Be specific about allowed operations
-
Use analyzers for smart decisions
Operations
-
Review audit logs regularly
-
Export logs for long-term retention
-
Monitor for anomalies
- Unusual tool calls
- High denial rates
- Repeated dangerous operations
Deployment
-
Use fail-closed mode in production
-
Restrict file permissions
-
Run with minimal privileges
- Don’t run as root
- Use dedicated service user
Incident Response
If you suspect a security incident:-
Export audit logs immediately
-
Review all tool calls
-
Check for policy violations
- Rotate any exposed credentials
Reporting Security Issues
Report security vulnerabilities to:- Email: [email protected]
- GitHub Security Advisories: https://github.com/dotsetlabs/cli/security