AI News Hub Logo

AI News Hub

MCP Sentinel v1.0 Is Out: A Lockfile for MCP Tool Schemas

DEV Community
Wannavf

A few days ago I posted about a problem I hit with MCP tool schema drift. The short version: An MCP server changed a parameter from location to city. My agent kept sending location. Nothing warned me before runtime. That first version of MCP Sentinel was just the basic idea: sentinel init sentinel snapshot sentinel check sentinel diff Since then, I shipped MCP Sentinel v1.0.0. GitHub: https://github.com/Wannavf/mcp-sentinel npm: npm install -g @wannavf/mcp-sentinel The original problem was annoying because it broke my tools silently. But after feedback, I think the bigger point is this: MCP tool schemas are contracts. If a tool changes its parameters, required fields, enum values, return shape, or descriptions, that is not just a small implementation detail. It changes what an agent can ask for. It can also change when the agent decides to use that tool. That matters a lot for MCP servers around: databases filesystems cloud infrastructure admin tools internal APIs A broken weather tool is annoying. A silently changed database or infrastructure tool can be much worse. The first version was basically: snapshot check diff v1.0 now has a fuller workflow. sentinel init sentinel discover --write sentinel doctor sentinel snapshot sentinel check sentinel diff You can now ask Sentinel to find MCP servers from common config locations: sentinel discover sentinel discover --write It can look for MCP-shaped configs and help import servers into sentinel.config.json. This makes onboarding less manual. There is now a setup check: sentinel doctor It checks whether Sentinel can see your config, whether servers are configured correctly, and whether the lockfile exists. Instead of guessing why something does not work, you get a quick sanity check. There is also a terminal dashboard: sentinel dashboard or: sentinel db It lets you inspect configured servers, snapshots, checks, activity, and drift locally. It is not the main feature, but it is useful when testing MCP servers during development. The main use case is still CI. sentinel check If a server changed its tool contract, CI can fail before the agent discovers the break at runtime. There is also a GitHub Action: name: MCP Schema Check on: [pull_request] jobs: drift: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 - uses: Wannavf/mcp-sentinel@main with: fail-on: MAJOR Sentinel can output diffs in multiple formats: sentinel diff --format json sentinel diff --format markdown sentinel diff --format sarif SARIF can be uploaded to GitHub Code Scanning. v1.0 supports: stdio Streamable HTTP SSE Example stdio config: { "compatibility": "BACKWARD", "failOn": "MAJOR", "servers": { "filesystem": { "transport": "stdio", "command": "npx", "args": ["-y", "@modelcontextprotocol/server-filesystem", "."] } } } Example HTTP config: { "servers": { "remote": { "transport": "http", "url": "http://localhost:3000/mcp" } } } Sentinel classifies changes as MAJOR, MINOR, or PATCH. Examples of MAJOR changes: tool removed required parameter removed parameter type changed optional parameter made required constraint tightened enum value removed output field removed Examples of safer changes: optional parameter added tool added enum value added description updated The goal is not to block every change. The goal is to make tool contract changes explicit. Without a lockfile: MCP server changes agent breaks later you debug at runtime With a lockfile: MCP server changes CI detects drift you review the contract change you decide whether to accept it That feels like a missing piece in MCP tooling. Package managers have lockfiles. APIs have contracts. MCP tool schemas should have a review point too. npm install -g @wannavf/mcp-sentinel or: npx -y @wannavf/mcp-sentinel --help GitHub: https://github.com/Wannavf/mcp-sentinel npm: https://www.npmjs.com/package/@wannavf/mcp-sentinel I would especially like feedback from people using MCP with database, filesystem, infrastructure, or internal admin tools.