Proxy Layer Architecture
The Quint Proxy is a transparent interception layer that wraps around an agent system. It captures every outbound action before it executes, scores it, and either allows, flags, or blocks it in real time.Three Deployment Modes
- MCP Gateway (Recommended)
- SDK Middleware
- API Event Stream
Quint acts as an MCP proxy server between the agent and all downstream MCP servers.Integration effort: Change one config value — point agent’s MCP server URL to
Tool poisoning detection: On every
quint-gateway.customer.com. 5-minute setup.What’s intercepted:| MCP Method | Canonical Action |
|---|---|
tools/list | mcp:server:list_tools |
tools/call | mcp:{server}:{tool}.{verb} |
resources/read | mcp:{server}:resource.read |
prompts/get | mcp:{server}:prompt.get |
notifications | mcp:server:notification |
tools/list response, Quint hashes each tool’s description and parameter schema. If a hash changes, it triggers a mcp:server:tool.description_changed event at elevated risk.Transport support: stdio (local servers) and Streamable HTTP (remote servers).Onboarding Path
Week 1-2: Shadow Mode
Proxy intercepts and scores everything but blocks nothing. Customer sees risk distribution in dashboard.
Week 3-4: Selective Enforcement
Enable blocking for specific high-confidence rules: “Block all external data sends from the support bot.”
Latency Budget
| Component | Target |
|---|---|
| Event capture + classification | < 2ms |
| Canonical action mapping | < 1ms |
| Subgraph construction | < 5ms |
| Scoring (all 4 layers) | < 35ms |
| Decision + forward/block | < 2ms |
| Total proxy overhead (p95) | < 45ms |
| With LLM fallback | < 3s |
Data Privacy
What the proxy stores:- Event metadata (action, agent, session, timestamps, scores)
- Data field classifications (“SSN was accessed”) but NOT field values
- Tool call parameters (sanitized — secrets redacted)
- Raw query results or API responses
- Actual PII values
- LLM conversation content
- User messages (only hashes for correlation)