FaultKey CausalLayer
Deterministic AI-liability attribution — signed, Bitcoin-anchored certificates that compute vendor/deployer/user fault splits for AI incidents. No LLMs, byte-identical reproducible.
FaultKey · CausalLayer MCP Server
Deterministic fault math for multi-party AI incidents. When an AI causes harm and three parties argue over who pays, FaultKey returns a signed, Bitcoin-anchored certificate of fault allocation in under 200 ms — no LLM, no probabilistic scoring, no vendor cooperation needed for a third party to verify.
This is the official Model Context Protocol (MCP) server for the CausalLayer engine, packaged as a Cloudflare Worker. It lets AI agents (Claude Desktop, Cursor, Cline, Continue, Windsurf) call the four core liability-attribution tools without writing a single line of integration code.
Live demo
The public Worker is deployed on Cloudflare's global edge network and is fully functional in standalone demo mode (deterministic responses, watermarked, rate-limited 5 calls / IP / day):
- Endpoint:
https://mcp.faultkey.com/mcp(live, custom domain) - Mirror:
https://causallayer-mcp-demo.zykm9qkk7j.workers.dev/mcp - Healthcheck:
/healthz - Demand telemetry:
/stats(public, aggregated, no PII)
Quick start
Claude Desktop
Add this to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
{
"mcpServers": {
"faultkey": {
"command": "npx",
"args": ["-y", "causallayer-mcp"]
}
}
}
Restart Claude. Type "List the FaultKey tools."
Cursor
Settings → MCP Servers → Add new:
- Name:
faultkey - Command:
npx -y causallayer-mcp
Cline / Continue / Windsurf
{
"name": "faultkey",
"command": "npx",
"args": ["-y", "causallayer-mcp"]
}
Direct HTTP (no CLI)
curl -X POST https://causallayer-mcp-demo.zykm9qkk7j.workers.dev/mcp \
-H "Content-Type: application/json" \
-H "Accept: application/json, text/event-stream" \
-d '{"jsonrpc":"2.0","id":0,"method":"initialize","params":{"protocolVersion":"2024-11-05","capabilities":{},"clientInfo":{"name":"test","version":"0"}}}'
The response includes a Mcp-Session-Id header that you reuse for subsequent calls.
Tools
| Tool | Description | Demo limit | Paid cost |
|---|---|---|---|
submit_incident | Submit an AI incident for deterministic liability attribution. Returns a signed CausalCertificateV1 with per-agent fault allocation, evidence-chain completeness, and Bitcoin-anchored proof. | 5 / IP / day | 50 credits |
verify_certificate | Independently verify a certificate (signature, Merkle integrity, issuer status) without calling FaultKey. | 50 / IP / day | 1 credit |
get_anchor_status | Return the index of all Tessera anchor batches or one batch's full JSON (signed Merkle root, OpenTimestamps proof reference). | Unlimited | Free |
query_issuer_registry | List all trusted CausalLayer issuer public-key fingerprints, status, and validity windows. | Unlimited | Free |
Why deterministic?
Insurers, banks, and APRA-regulated entities cannot accept LLM-based fault attribution because the same prompt produces different answers on different days. FaultKey uses a closed-form causal scoring algorithm (graph-theoretic, version-pinned, byte-identical reproducible across runs) so two adversarial parties get the same number — that's the whole point.
The math is published as an Australian Standards-aligned paper. The signed certificate, issuer registry, and Merkle anchor log are all independently verifiable by a third party using only Node's built-in crypto and the causallayer-verifier tool — no network calls back to the vendor.
Guardrails (enforced at the Cloudflare edge)
- NO-PII — Payloads are regex-scanned for emails, Tax File Numbers, Medicare numbers, SSNs, and credit cards. Rejected unless the caller sets
pii_acknowledged: true(which is logged in the certificate as a compliance acknowledgement). - DETERMINISTIC-ONLY — The engine rejects any request lacking
deterministic_only: true. This is the agent's binding acknowledgement that FaultKey output is closed-form, not probabilistic. - EVIDENCE-REQ — At least one identified agent and one timestamped event with description must be supplied or the request is rejected with
400 evidence_insufficient.
Self-hosting
You can deploy your own copy to your own Cloudflare account if you want to enforce a corporate firewall, custom rate limits, or bring your own KV namespace:
git clone https://github.com/smq9sn5jck-coder/causallayer-mcp.git
cd causallayer-mcp
pnpm install
pnpm wrangler kv namespace create LEDGER
# paste the returned id into wrangler.jsonc
pnpm wrangler deploy
The CausalLayer engine itself (the closed-form fault math) runs upstream and is available via API key. For self-hosted demos without an upstream, set STANDALONE_DEMO=true in wrangler.jsonc to short-circuit upstream calls and return deterministic, watermarked responses.
Architecture
[Claude/Cursor/Cline] ←→ [npx causallayer-mcp] ←→ [Cloudflare Worker] ←→ [CausalLayer engine]
(mcp-remote proxy) (this repo) (Fly.io Sydney)
↓
[KV: credit ledger]
[DO: per-session state]
[KV: telemetry buffer]
- Transport: Streamable HTTP (per the 2024-11-05 MCP spec — SSE is deprecated)
- Session state: Cloudflare Durable Object (
CausalLayerMCP), SQLite-backed - Billing: Cloudflare KV ledger, Stripe Checkout webhook, optional x402 USDC fallback
- Demo: Per-IP daily counter in KV, deterministic fixture responses with
[DEMO]watermark - Latency: p50 ≈ 60 ms (cold), 25 ms (warm) on Cloudflare's 300+ POPs
Pricing
| Tier | Credits | $AUD | Notes |
|---|---|---|---|
| Demo | 5 incidents / IP / day | Free | Watermarked responses |
| Starter | 1,000 | $99 | Stripe Checkout, no SLA |
| Growth | 10,000 | $749 | + 50 verify, 99.5% SLA |
| Enterprise | Unmetered | Contact | + dedicated namespace, 99.95% SLA, audit log access |
For enterprise tenants email [email protected] (or open a GitHub issue with subject "enterprise inquiry").
License
Apache 2.0. See LICENSE.
Built in Brisbane
FaultKey is built in Brisbane, Australia, with data residency in Sydney for APRA-regulated buyers. The team can be reached at [email protected].
Verwandte Server
norikae-mcp
🚃 乗換案内MCP - 乗り換え検索 / Norikae MCP - Japanese train route search using Yahoo! Transit
SignalK MCP Server
Provides AI agents with read-only access to SignalK marine data systems, enabling queries of vessel navigation data, AIS targets, and system alarms.
Energetica — Argentine Oil & Gas Data
Argentine oil & gas data — 40+ curated tables: production, wells, prices, investments, trade.
HemmaBo Federation MCP Server
AI-native vacation rental infrastructure — search properties, check availability, get quotes, and complete direct bookings via MCP. Supports multi-language, real-time calendar sync, and dynamic staircase pricing across a federated host network.
Nomad Stays
The world's platform for finding and booking digital nomad friend accommodation
OWASP Agentic Security MCP
OWASP agentic AI security — prompt injection detection, tool poisoning prevention, agent trust boundaries by MEOK AI Labs
Proxenio MCP Server
MCP server for the Proxenio verified intent network enabling AI agents to retrieve verified matches and accept introductions with inherited trust controls.
anneal-memory
Two-layer memory for AI agents with an immune system — episodes compress into identity through citation-validated graduation. Zero dependencies, 5 MCP tools.
BrokerIA Imoveis
Search Brazilian real estate listings, simulate financing, qualify leads, and schedule visits directly from any LLM.
Neonia
The ultimate platform for Autonomous AI Agents. Features include Autonomous Tool Discovery (dynamically finds and executes missing capabilities), Stateful Cloud Memory (remembers cross-session context), Context Packing (saves LLM tokens), and 20+ specialized dev tools.