Server data from the Official MCP Registry
Governance copilot for AI-assisted coding. 72 packs, 532 rules, proof bundles.
Governance copilot for AI-assisted coding. 72 packs, 532 rules, proof bundles.
Remote endpoints: streamable-http: https://app.korext.com/api/mcp
Valid MCP server (1 strong, 0 medium validity signals). 2 code issues detected. No known CVEs in dependencies. Imported from the Official MCP Registry. 2 finding(s) downgraded by scanner intelligence.
Endpoint verified · Open access · 2 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Available as Local & Remote
This plugin can run on your machine or connect to a hosted endpoint. during install.
From the project's GitHub README.
Enforce compliance policies on AI generated code in your GitHub workflows.
72 policy packs. 532 rules. 13 languages. Violations appear as GitHub Code Scanning annotations on pull requests.
Add this to .github/workflows/korext.yml:
name: Korext Enforcement
on: [push, pull_request]
permissions:
contents: read
security-events: write
jobs:
enforce:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: Korext/enforce-action@v3
with:
api-token: ${{ secrets.KOREXT_API_TOKEN }}
Korext scans your code on every push and PR using the default web policy pack.
korext enforce against your codebase with the selected policy packViolations appear as annotations directly on the PR diff, powered by GitHub Code Scanning.
| Input | Description | Required | Default |
|---|---|---|---|
directory | Directory to scan for policy violations | No | . |
pack | Policy Pack ID to enforce | No | web |
api-token | Korext API token for authenticated mode | No | (anonymous) |
fail-on-violations | Fail workflow on critical/high violations | No | true |
sarif-upload | Upload SARIF to GitHub Code Scanning | No | true |
region | Data processing region (us, eu, apac) | No | (default) |
sign-bundles | Request signed proof bundles | No | true |
| Output | Description |
|---|---|
violations | Total number of policy violations found |
sarif-file | Path to the generated SARIF results file |
bundle-count | Number of proof bundles generated |
bundles-signed | Number of signed proof bundles |
bundle-ids | Comma separated list of proof bundle IDs |
- uses: Korext/enforce-action@v3
with:
pack: web,pci-dss-v1,owasp-v1
api-token: ${{ secrets.KOREXT_API_TOKEN }}
- uses: Korext/enforce-action@v3
with:
pack: gdpr-v1
region: eu
api-token: ${{ secrets.KOREXT_API_TOKEN }}
- uses: Korext/enforce-action@v3
with:
directory: src/
pack: hipaa-v1
api-token: ${{ secrets.KOREXT_API_TOKEN }}
- uses: Korext/enforce-action@v3
with:
pack: web
fail-on-violations: 'false'
For full access to all policy packs and signed proof bundles, create an API token in your KOREXT dashboard and add it as a GitHub secret:
KOREXT_API_TOKEN in your repo's Settings > Secrets and variables > ActionsWithout a token, the action runs in anonymous mode (20 requests per hour, limited packs).
Proprietary. See Terms of Service.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Web content fetching and conversion for efficient LLM usage
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.