FaultKey CausalLayer
Deterministic AI-liability attribution — signed, Bitcoin-anchored certificates that compute vendor/deployer/user fault splits for AI incidents. No LLMs, byte-identical reproducible.
FaultKey · CausalLayer MCP Server
Deterministic fault math for multi-party AI incidents. When an AI causes harm and three parties argue over who pays, FaultKey returns a signed, Bitcoin-anchored certificate of fault allocation in under 200 ms — no LLM, no probabilistic scoring, no vendor cooperation needed for a third party to verify.
This is the official Model Context Protocol (MCP) server for the CausalLayer engine, packaged as a Cloudflare Worker. It lets AI agents (Claude Desktop, Cursor, Cline, Continue, Windsurf) call the four core liability-attribution tools without writing a single line of integration code.
Live demo
The public Worker is deployed on Cloudflare's global edge network and is fully functional in standalone demo mode (deterministic responses, watermarked, rate-limited 5 calls / IP / day):
- Endpoint:
https://mcp.faultkey.com/mcp(live, custom domain) - Mirror:
https://causallayer-mcp-demo.zykm9qkk7j.workers.dev/mcp - Healthcheck:
/healthz - Demand telemetry:
/stats(public, aggregated, no PII)
Quick start
Claude Desktop
Add this to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
{
"mcpServers": {
"faultkey": {
"command": "npx",
"args": ["-y", "causallayer-mcp"]
}
}
}
Restart Claude. Type "List the FaultKey tools."
Cursor
Settings → MCP Servers → Add new:
- Name:
faultkey - Command:
npx -y causallayer-mcp
Cline / Continue / Windsurf
{
"name": "faultkey",
"command": "npx",
"args": ["-y", "causallayer-mcp"]
}
Direct HTTP (no CLI)
curl -X POST https://causallayer-mcp-demo.zykm9qkk7j.workers.dev/mcp \
-H "Content-Type: application/json" \
-H "Accept: application/json, text/event-stream" \
-d '{"jsonrpc":"2.0","id":0,"method":"initialize","params":{"protocolVersion":"2024-11-05","capabilities":{},"clientInfo":{"name":"test","version":"0"}}}'
The response includes a Mcp-Session-Id header that you reuse for subsequent calls.
Tools
| Tool | Description | Demo limit | Paid cost |
|---|---|---|---|
submit_incident | Submit an AI incident for deterministic liability attribution. Returns a signed CausalCertificateV1 with per-agent fault allocation, evidence-chain completeness, and Bitcoin-anchored proof. | 5 / IP / day | 50 credits |
verify_certificate | Independently verify a certificate (signature, Merkle integrity, issuer status) without calling FaultKey. | 50 / IP / day | 1 credit |
get_anchor_status | Return the index of all Tessera anchor batches or one batch's full JSON (signed Merkle root, OpenTimestamps proof reference). | Unlimited | Free |
query_issuer_registry | List all trusted CausalLayer issuer public-key fingerprints, status, and validity windows. | Unlimited | Free |
Why deterministic?
Insurers, banks, and APRA-regulated entities cannot accept LLM-based fault attribution because the same prompt produces different answers on different days. FaultKey uses a closed-form causal scoring algorithm (graph-theoretic, version-pinned, byte-identical reproducible across runs) so two adversarial parties get the same number — that's the whole point.
The math is published as an Australian Standards-aligned paper. The signed certificate, issuer registry, and Merkle anchor log are all independently verifiable by a third party using only Node's built-in crypto and the causallayer-verifier tool — no network calls back to the vendor.
Guardrails (enforced at the Cloudflare edge)
- NO-PII — Payloads are regex-scanned for emails, Tax File Numbers, Medicare numbers, SSNs, and credit cards. Rejected unless the caller sets
pii_acknowledged: true(which is logged in the certificate as a compliance acknowledgement). - DETERMINISTIC-ONLY — The engine rejects any request lacking
deterministic_only: true. This is the agent's binding acknowledgement that FaultKey output is closed-form, not probabilistic. - EVIDENCE-REQ — At least one identified agent and one timestamped event with description must be supplied or the request is rejected with
400 evidence_insufficient.
Self-hosting
You can deploy your own copy to your own Cloudflare account if you want to enforce a corporate firewall, custom rate limits, or bring your own KV namespace:
git clone https://github.com/smq9sn5jck-coder/causallayer-mcp.git
cd causallayer-mcp
pnpm install
pnpm wrangler kv namespace create LEDGER
# paste the returned id into wrangler.jsonc
pnpm wrangler deploy
The CausalLayer engine itself (the closed-form fault math) runs upstream and is available via API key. For self-hosted demos without an upstream, set STANDALONE_DEMO=true in wrangler.jsonc to short-circuit upstream calls and return deterministic, watermarked responses.
Architecture
[Claude/Cursor/Cline] ←→ [npx causallayer-mcp] ←→ [Cloudflare Worker] ←→ [CausalLayer engine]
(mcp-remote proxy) (this repo) (Fly.io Sydney)
↓
[KV: credit ledger]
[DO: per-session state]
[KV: telemetry buffer]
- Transport: Streamable HTTP (per the 2024-11-05 MCP spec — SSE is deprecated)
- Session state: Cloudflare Durable Object (
CausalLayerMCP), SQLite-backed - Billing: Cloudflare KV ledger, Stripe Checkout webhook, optional x402 USDC fallback
- Demo: Per-IP daily counter in KV, deterministic fixture responses with
[DEMO]watermark - Latency: p50 ≈ 60 ms (cold), 25 ms (warm) on Cloudflare's 300+ POPs
Pricing
| Tier | Credits | $AUD | Notes |
|---|---|---|---|
| Demo | 5 incidents / IP / day | Free | Watermarked responses |
| Starter | 1,000 | $99 | Stripe Checkout, no SLA |
| Growth | 10,000 | $749 | + 50 verify, 99.5% SLA |
| Enterprise | Unmetered | Contact | + dedicated namespace, 99.95% SLA, audit log access |
For enterprise tenants email [email protected] (or open a GitHub issue with subject "enterprise inquiry").
License
Apache 2.0. See LICENSE.
Built in Brisbane
FaultKey is built in Brisbane, Australia, with data residency in Sydney for APRA-regulated buyers. The team can be reached at [email protected].
संबंधित सर्वर
anneal-memory
Two-layer memory for AI agents with an immune system — episodes compress into identity through citation-validated graduation. Zero dependencies, 5 MCP tools.
CoinGecko MCP Server
Crypto prices, market data, and token metadata via CoinGecko.
LLM Router
Multi-LLM routing MCP server — route text, image, video, and audio tasks to 20+ providers (OpenAI, Gemini, Perplexity, Anthropic, fal, ElevenLabs, Runway) with automatic complexity-based model selection, budget control, and provider failover.
Fortnox Accounting MCP Server
MCP server for Fortnox — Sweden's largest cloud accounting platform (612K+ customers). Manage invoices, customers, suppliers, accounting, and more via AI agents.
Sunex
Enables AI assistants to search Sunex's lens and imager catalog using natural language queries. It provides tools for finding compatible lenses, sensor specifications, and product details through a public Model Context Protocol server.
Neonia
The ultimate platform for Autonomous AI Agents. Features include Autonomous Tool Discovery (dynamically finds and executes missing capabilities), Stateful Cloud Memory (remembers cross-session context), Context Packing (saves LLM tokens), and 20+ specialized dev tools.
Fathom
Financial intelligence for AI agents — 31 tools across 8 data sources including regime, derivatives, stablecoin flows, momentum, macro, weather patterns, and political cycles.
Swift Tarot
Provides tarot card readings, including single card draws, multi-card spreads, and full deck access.
Quiz MCP
MCP server for interactive quizzes
stella-mcp
MCP server for creating and manipulating Stella system dynamics models (.stmx files in XMILE format)