Skip to content

MCP Tools

The Tentacular MCP server exposes tools via the Model Context Protocol. These tools are used by the tntc CLI and can be called directly by AI agents.

ToolDescription
enclave_provisionProvision a new enclave (namespace + quota + policies + exoskeleton services) with owner and optional initial members
enclave_infoGet enclave details including ownership, membership, quota, and exoskeleton service status
enclave_listList accessible enclaves, optionally filtered by caller email
enclave_syncUpdate enclave membership, status (freeze/unfreeze), or transfer ownership
enclave_deprovisionPermanently delete an enclave and all its resources (irreversible)
ToolDescription
wf_applyApply workflow manifests to the cluster. The exoskeleton intercepts this to run registrars, enrich contracts, and inject credentials.
wf_removeRemove a workflow’s K8s resources. When cleanup is enabled, also runs unregistrars.
wf_listList all tentacular-managed workflows in a namespace
wf_statusGet deployment status (replicas, conditions, image)
wf_describeDetailed workflow description including pods and events
wf_runTrigger a deployed workflow via HTTP POST to /run
wf_restartRestart a workflow deployment (rolling restart)
wf_logsGet pod logs (snapshot, not streaming)
wf_podsList pods for a workflow
wf_eventsGet recent events for a workflow’s resources
wf_jobsList jobs associated with a workflow
ToolDescription
wf_healthHealth check for a single workflow (Green/Amber/Red classification)
wf_health_nsHealth check for all workflows in a namespace
ToolDescription
cluster_preflightPreflight validation: MCP connectivity, namespace creation, RuntimeClass, NetworkPolicy
cluster_profileCluster capability snapshot: K8s version, CNI, storage, gVisor, extensions, exoskeleton service inventory (host, port, protocol, availability), and OIDC auth configuration
health_cluster_summaryOverall cluster health summary
health_nodesNode health and resource usage
health_ns_usageNamespace resource usage
ToolDescription
audit_rbacVerify service account has minimal permissions
audit_netpolVerify NetworkPolicy matches contract
audit_psaVerify Pod Security Admission labels

Authorization is enforced only when OIDC authentication is active. Bearer-token requests bypass authorization entirely. Enclave permissions are managed through enclave_sync. Tentacle permissions are managed through enclave_sync (enclave-level) and deployment annotations (tentacle-level).

ToolDescription
proxy_statusCheck ESM module proxy status and cached modules

Tools are organized into functional groups:

  1. Enclaveenclave_provision, enclave_info, enclave_list, enclave_sync, enclave_deprovision (5 tools)
  2. Workflow Lifecyclewf_apply, wf_remove, wf_list, wf_status, wf_describe, wf_run, wf_restart, wf_logs, wf_pods, wf_events, wf_jobs (11 tools)
  3. Workflow Healthwf_health, wf_health_ns (2 tools)
  4. Clustercluster_preflight, cluster_profile (2 tools)
  5. Healthhealth_cluster_summary, health_nodes, health_ns_usage (3 tools)
  6. Auditaudit_rbac, audit_netpol, audit_psa (3 tools)
  7. Module Proxyproxy_status (1 tool)

All MCP tools require authentication. The server supports dual auth:

  • OIDC tokens — from Keycloak/Google SSO, tried first
  • Bearer tokens — fallback, always accepted

Tools that modify state (deploy, undeploy, credential operations) record deployer provenance when OIDC authentication is used.

When OIDC authentication is active, the MCP server enforces POSIX-like permissions on both namespaces and tentacles. Namespaces act as directories and tentacles as files — both layers must pass for an operation to succeed. Each has an owner, group, and mode that control who can read (list/status), write (deploy/update/remove), or execute (run/restart) it. Bearer-token requests bypass authorization entirely.

See the Authorization guide for details on the permission model, annotation schema, and configuration.

See MCP Server Setup for installation and authentication details.