AIR Blackbox

EU AI Act compliance scanner for Python AI agents — 10 tools for scanning, analysis, and remediation

AIR Blackbox MCP Server

EU AI Act compliance scanning for Claude Desktop, Cursor, and any MCP-compatible client.

Unlike other compliance scanners that only report problems, AIR Blackbox also remediates — generating working code fixes, trust layer integrations, and full compliance reports.

10 Tools

TierToolWhat it does
Scanningscan_codeScan Python code string for all 6 EU AI Act articles
Scanningscan_fileRead and scan a single Python file
Scanningscan_projectRecursively scan all .py files in a directory
Analysisanalyze_with_modelDeep analysis via local fine-tuned model (Ollama)
Analysischeck_injectionDetect prompt injection attacks (15 patterns)
Analysisclassify_riskClassify tools by EU AI Act risk level
Remediationadd_trust_layerGenerate trust layer integration code
Remediationsuggest_fixGet article-specific fix recommendations
Documentationexplain_articleTechnical explanation of EU AI Act articles
Documentationgenerate_compliance_reportFull markdown compliance report

Supported Frameworks

LangChain, CrewAI, AutoGen, OpenAI, Haystack, LlamaIndex, Semantic Kernel, and generic RAG pipelines.

Install

pip install air-blackbox-mcp

Claude Desktop Setup

Edit ~/Library/Application Support/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "air-blackbox": {
      "command": "python3",
      "args": ["-m", "air_blackbox_mcp"]
    }
  }
}

Restart Claude Desktop. The 10 tools will appear automatically.

Cursor Setup

Add to .cursor/mcp.json in your project:

{
  "mcpServers": {
    "air-blackbox": {
      "command": "python3",
      "args": ["-m", "air_blackbox_mcp"]
    }
  }
}

Usage Examples

In Claude Desktop or Cursor, just ask:

  • "Scan this code for EU AI Act compliance"
  • "Add a trust layer to this LangChain agent"
  • "Check this text for prompt injection"
  • "What does Article 12 require?"
  • "Generate a compliance report for my project at ~/myproject"
  • "Classify the risk level of send_email"

Optional: Deep Analysis with Ollama

For AI-powered analysis beyond regex patterns:

# Install Ollama
brew install ollama

# Pull the fine-tuned compliance model
ollama pull air-compliance-v2

# The analyze_with_model tool will automatically use it

What Makes This Different

Other MCP compliance tools only scan. AIR Blackbox:

  1. Scans — 18+ regex patterns across 6 EU AI Act articles
  2. Analyzes — local fine-tuned model catches what regex misses
  3. Remediates — generates working code to fix findings
  4. Verifies — checks for prompt injection with 15 weighted patterns
  5. Classifies — maps tools to EU AI Act risk levels
  6. Documents — produces full compliance reports

Links

Related Servers