MCP Hub

The enterprise control plane for Model Context Protocol

Install vetted MCP integrations, govern every tool call with guardrails, encrypt credentials in the vault, and turn any Rylvo bot into a reusable MCP endpoint.

Tool sprawl ends here

One registry for every MCP integration. Install vetted servers, connect custom ones, and scope them to specific bots — no more shadow integrations scattered across configs.

Credentials never leak

AES-256-GCM encryption in a dedicated vault. Plaintext never touches Firestore or the client. Only the last four characters are visible in the UI.

Humans stay in control

High-risk tools auto-gate to require_approval. Refunds, deletions, and merges pause for human review via Mission Control. Nothing critical runs unsupervised.

The MCP Control Plane

registry → runtime → audit
01

Registry

verified · community · custom

02

Vault

encrypted credentials

03

Bot Hub

scope + attach

04

Runtime

guardrails + invoke

05

Approvals

human-in-the-loop

06

Audit

logs + analytics

Registry

Curated catalog with trust levels

Not all integrations are equal. Every server in the registry carries a trust label so you know exactly what you're installing before a single credential is added.

Rylvo Verified

verified

Security-reviewed by our team. Safe to install across production orgs with full confidence.

Community

community

Published by a known community author. Review permissions before installing — standard due diligence applies.

Custom

custom

Your own server or an external endpoint you connected manually. Gets the same vault, guardrails, and monitoring as registry entries.

Categories include Communication, Dev Tools, Productivity, Data, Search, Files, CRM, Finance, and Custom. Search by name, vendor, or category. Submit your own for org-wide reuse.

Vault

Credentials encrypted with AES-256-GCM

Plaintext API keys, OAuth tokens, and bearer secrets never touch Firestore or the client. They are encrypted server-side and stored in a dedicated vault. Only the last four characters are visible in the UI — just enough to know which key is which.

At invocation time, the server decrypts the credential once, forwards it to the MCP server, and never logs or persists the plaintext. Rotation is instant: re-encrypt in place without reconfiguring the server.

API KeyBearer TokenOAuth2Custom HeaderNone
Encryption
AES-256-GCM
Storage
Isolated vault
Client exposure
Last 4 chars only
Plaintext in logs
Never
Rotation
In-place re-encrypt
Decryption
Server-only at invoke
Governance

Per-tool permissions, auto-gated by risk

Every discovered tool gets a permission state. High-risk operations auto-default to require_approval — no configuration drift, no surprise escalations.

Allow

Bot calls the tool without human intervention. Use for read-only or low-risk operations.

Require Approval

Bot pauses and creates an approval request. An operator reviews and approves or denies before execution continues.

Deny

Tool is hidden from the bot entirely. Use for capabilities you never want exposed to a specific agent.

Auto-gating examples

GitHub merge PR, Stripe refunds, Jira delete issue, and Filesystem write/delete auto-default to require_approval regardless of server default. You can tighten or loosen per-tool at any time.

Approvals

Human-in-the-loop without the hang

When a high-stakes tool call triggers approval, the bot pauses gracefully. An operator reviews the payload, approves or denies, and the bot resumes automatically — or times out with a clean denial.

The Approval Pipeline

6 stages · never hangs
01

Call

bot requests tool

02

Gate

permission check

03

Queue

approval request created

04

Review

operator inspects payload

05

Decide

approve or deny

06

Resume

bot continues or exits

Args preview

Operators see a redacted JSON preview of the tool arguments, not raw secrets.

LLM rationale

The bot explains why it wants to call the tool — context that makes approval decisions faster.

Time-boxed TTL

Default 10-minute TTL. Auto-deny on expiration so conversations never hang silently.

Tab-resilient

Close the tab, come back later. The resume button picks up exactly where the conversation paused.

Immutable audit

Every approval decision is logged with operator identity, timestamp, and rationale.

Deny with reason

Operators can deny with a custom reason that the bot surfaces back to the user gracefully.

Bot Export

Turn any bot into an MCP server

One toggle and your bot's tools become discoverable MCP endpoints. Other bots call them. External clients discover them. Your team stops rebuilding the same integrations.

The exported server runs over HTTP with internal auth, trust level set to Custom, and defaults to allow so composed workflows stay fast. Disable anytime — the server pauses but history and logs are preserved.

Bot-to-bot composition

A research bot exposes its search tools; a writing bot calls them as MCP endpoints. Reuse without duplication.

Team-wide tool reuse

One bot maintains your CRM sync. Every other bot in the org calls it via MCP instead of re-implementing the same integration.

External client access

Third-party MCP clients — IDEs, chat apps, or other platforms — can discover and invoke your bot's capabilities.

Micro-agent architecture

Break monolithic bots into focused micro-agents that expose specific tools. Compose them into larger workflows.

Observability

See every call, cost, and denial

Full-stack observability for your MCP layer. Daily spend trends, top tools by volume, failure rates, and health status — all in one view.

Daily spend

Per-server, per-tool cost trends with sparklines and delta vs. prior period.

Call volume

Top tools and servers by invocation count, with failure-rate breakdown.

Health status

Latency, consecutive failures, and last-error tracking per server.

Denial rate

Which tools get blocked most — signal for permission tuning or guardrail drift.

FAQ

Questions about MCP Hub

Everything you need to know before connecting your first server.

What is MCP Hub and why do I need it?

MCP Hub is an enterprise control plane for the Model Context Protocol. It lets you install, govern, and monitor MCP servers from a single interface — with encrypted credential vaults, per-tool permissions, human-in-the-loop approvals, and full audit trails. Without it, bots connect to tools with no oversight, no guardrails, and no accountability.

Can I connect my own custom MCP servers?

Yes. You can connect any external MCP server via HTTP, SSE, or stdio transports. Configure auth headers, OAuth2 flows, timeouts, and custom metadata. Custom servers receive the same vault encryption, permission governance, and health monitoring as registry servers.

How does the approval workflow work?

When a bot calls a tool marked 'require approval,' the execution pauses and an approval request is created in the queue. An operator reviews the tool name, arguments preview, and LLM rationale, then approves or denies. The bot resumes automatically upon approval, or receives a graceful denial. Timeouts auto-deny so conversations never hang.

Can I turn a Rylvo bot into an MCP server?

Yes. Any bot can be exported as an MCP server with a single toggle. The bot's tools become discoverable MCP endpoints that other bots — or external MCP clients — can invoke over HTTP. This enables bot-to-bot composition and reuse across your organization.

What transport protocols are supported?

HTTP (recommended for hosted servers), SSE (legacy streaming), and stdio (local processes). All transports route through the same permission checks, guardrails, credential vault, and audit pipeline.

How are credentials secured?

Credentials are encrypted server-side with AES-256-GCM and stored in a dedicated vault. Plaintext never touches Firestore or the client. Only the last four characters are visible in the UI. Credentials are decrypted only at invocation time on the server, used once, and never logged.

Ready to connect your first MCP server?

Install from the registry, connect your own, or export a bot as an MCP endpoint. Full governance, encryption, and oversight from day one.