AI-NATIVE OPERATIONS

Your fleet, controlled by intent

Connect Claude, GPT-4, or any MCP client to TucDesk's fleet API. Run natural language commands with human-in-the-loop approval gates.

MCP INTEGRATION

12 native MCP tools for AI agents

  • list_agents — enumerate online machines with metadata
  • get_agent — fetch full agent record and security posture
  • connect_session — initiate an authenticated terminal session
  • run_command — execute a command with approval gate
  • list_sessions — recent session history with recordings
  • get_audit_log — tamper-evident action history
  • list_fleet_runs — parallel execution history
  • get_recording — retrieve session recording metadata
  • list_address_book — access controlled endpoint registry
  • get_security_posture — per-agent compliance snapshot
  • manage_acl — read/write access control policies
  • pair_agent — complete agent onboarding from MCP
{
  "mcpServers": {
    "tucdesk": {
      "command": "npx",
      "args": ["-y", "tucdesk-mcp"],
      "env": {
        "TUCDESK_API_URL": "https://api.tucdesk.app",
        "TUCDESK_API_KEY": "tdk_..."
      }
    }
  }
}
TUC-C LANGUAGE

Natural language to validated execution plan

  • Input parsing identifies the operator intent, target set, and requested action.
  • Risk assessment classifies the plan as CRITICAL, HIGH, MEDIUM, or LOW.
  • HIGH and CRITICAL plans require explicit operator approval before execution.
  • LOW and MEDIUM plans execute only after ACL evaluation and consent checks pass.
  • Post-execution results are written to the immutable audit log.
TUC-C command safety flowNL inputIntent parserRisk assessmentLOW / MEDIUMHIGH / CRITICALExecuteHuman confirmExecuteAudit
MCP TOOL REFERENCE

Available tools, scopes, and shapes

ToolInput parametersOutput shapeExample useScope
list_agentsteam_id, filtersagents[], online_countRead fleet statusagents:read
get_agentagent_idagent, posture, tagsInspect one machineagents:read
connect_sessionagent_id, modesession_id, consent_stateStart a sessionsessions:write
run_commandagent_id/tag, commandrun_id, risk, approvalExecute approved commandfleet:execute
list_sessionscursor, limitsessions[], next_cursorReview historysessions:read
get_audit_logactor, action, cursoraudit_entries[]Compliance reviewaudit:read
list_fleet_runstag, statusruns[]Review batch executionfleet:read
get_recordingrecording_idmetadata, signed_urlFetch playback metadatarecordings:read
list_address_bookqueryendpoints[]Find curated endpointaddress_book:read
get_security_postureagent_idchecks[], scoreCheck compliancesecurity:read
manage_aclpolicy_id, rulepolicy, decisionRead or update policyacl:write
pair_agentpairing_keyagent_id, statusComplete onboardingagents:write
SELF-HOSTED MCP

Point AI clients at your own API

Self-hosted deployments use the same MCP server. The only difference is the API URL and API key stored in the MCP client configuration.

{
  "mcpServers": {
    "tucdesk": {
      "command": "npx",
      "args": ["-y", "tucdesk-mcp"],
      "env": {
        "TUCDESK_API_URL": "https://api.yourdomain.com",
        "TUCDESK_API_KEY": "tdk_self_hosted_..."
      }
    }
  }
}
SAFETY MODEL

AI agents cannot bypass the consent gate

request pipelineidentity → ACL → risk → approval → execution → audit

Every AI action is evaluated like a human operator action. The model favors bounded tools, explicit target scope, and auditable decisions over autonomous shell access.

1. Scope identity

The MCP request is bound to a signed operator identity, team_id, tool scope, and target set.

2. Parse intent

TUC-C extracts action, target, command arguments, and confidence before anything reaches an agent.

3. Classify risk

Risk tiers decide whether the request can proceed directly or must wait for human confirmation.

4. Write evidence

Execution result, approval state, actor, target, and command context are recorded for audit review.

HIGH and CRITICAL actions require explicit human confirmation. LOW and MEDIUM actions still pass ACL, consent state, target validation, and immutable audit logging before results are returned to the AI client.
TucDesk