Demo: Mitrity Gateway
Run a self-contained Docker demo that exercises every governance capability through a realistic, scripted scenario. A Claude-powered AI agent performs tool calls through Mitrity Gateway while your policies, DLP rules, injection detection, and hold workflows are enforced in real-time.
The demo takes about 10 minutes and requires only Docker Desktop and API keys.
Looking for the sidecar version? See Demo: Mitrity MCP Sidecar for the single-upstream variant.
Prerequisites
- Docker Desktop (or any Docker runtime)
- A MITRITY account with an active tenant
- An Anthropic API key for the Claude agent
Step 1: Configure your dashboard
Before running the demo, set up three things in the MITRITY dashboard:
Register an agent
Go to Agents > Register Agent and create an agent:
- Name:
demo-agent - Mission scope: "Workspace file management and system operations"
Copy the Agent ID (UUID). Also copy the Agent Key (ak_...). Save it — it cannot be retrieved later.
Create policies
Create the following policies to see the full range of governance decisions:
| Policy | Type | Pattern | Scope |
|---|---|---|---|
| Allow workspace reads | allow | fs:read_file | path starts with /workspace |
| Allow workspace writes | allow | fs:write_file | path starts with /workspace |
| Allow safe commands | allow | shell:run_command | ls, pwd, cat, echo, whoami |
| Block system files | deny | fs:read_file, fs:delete_file | path outside /workspace |
| Block destructive commands | deny | shell:run_command | rm, curl, wget, nc, chmod |
| Block dangerous SQL | deny | api:query_database | contains DROP, DELETE, TRUNCATE |
| Hold production deploys | hold | api:call_api | url contains "production" |
Also enable these global settings:
- Prompt injection detection
- DLP with PII and credential patterns
Note: Tool names are namespaced in the gateway demo (
fs:read_file,shell:run_command,api:call_api) because Mitrity Gateway aggregates tools from multiple upstream servers with namespace prefixes.
Step 2: Clone and configure
git clone git@github.com:mitrity-io/iag-demo-mcp-gateway.git
cd iag-demo-mcp-gateway
cp .env.example .env
Edit .env with your values:
ANTHROPIC_API_KEY=sk-ant-... # Anthropic API key for Claude
MITRITY_AGENT_KEY=ak_... # Agent key from dashboard
MITRITY_CONTROL_PLANE_URL=https://api.mitrity.com
MITRITY_AGENT_ID=<uuid> # Agent UUID from dashboard
Step 3: Run the demo
docker compose up --build
The container builds locally (pulls the Mitrity Gateway binary from ghcr.io), then runs the scenario. Watch your terminal for the output.
What the demo does
The scenario runs five phases:
Phase 1 — Normal Operations. The agent reads workspace files, writes summaries, lists directories, runs safe shell commands, and calls APIs. All actions pass through the gateway and are allowed by your policies.
Phase 2 — Policy Violations. The agent attempts to read /etc/passwd, run rm -rf, execute curl, and issue a DROP TABLE query. The gateway blocks each action and returns the policy reason.
Phase 3 — Prompt Injection. The agent processes "user input" that contains embedded injection payloads. The gateway's injection detection engine catches and blocks the attacks before any tool executes.
Phase 4 — DLP & Data Protection. The agent tries to write files containing API keys and AWS secrets, send notifications with PII (SSNs, credit card numbers), and include credentials in API calls. The gateway's DLP engine blocks data exfiltration.
Phase 5 — Escalation & Hold. The agent attempts a production deployment. The gateway's hold policy pauses the action and creates an approval request visible in your MITRITY dashboard.
What to look for
While the demo runs, open your MITRITY dashboard to see:
- Audit Log: Every tool call with its governance decision, latency, and policy match
- Agent Detail: The demo agent's activity timeline and drift score
- Approval Requests: The held production deployment waiting for your approval (Phase 5)
At the end, the terminal prints a summary with counts of allowed, blocked, and held actions.
Architecture
The entire demo runs inside a single Docker container:
Docker Container
└── Python scenario runner (Claude Agent SDK)
└── Mitrity Gateway (governed MCP server)
├── upstream "fs": filesystem tools (read, write, list, delete)
├── upstream "shell": command execution
└── upstream "api": mock API, database, and notification tools
The gateway connects to your MITRITY control plane via HTTPS. Filesystem and shell tools execute for real against the container's /workspace directory. API tools return mock responses.
Environment variables
| Variable | Required | Description |
|---|---|---|
ANTHROPIC_API_KEY | Yes | Anthropic API key for Claude |
MITRITY_AGENT_KEY | Yes | Agent key from dashboard |
MITRITY_CONTROL_PLANE_URL | Yes | Control plane URL |
MITRITY_AGENT_ID | Yes | Agent UUID from dashboard |
MITRITY_DEMO_SPEED | No | normal (default) or fast (skip pauses) |
ANTHROPIC_MODEL | No | Claude model (default: claude-sonnet-4-20250514) |
Customization
- Policies: Modify policies in the MITRITY dashboard and re-run the demo to see different behaviors
- Workspace: Mount your own files via
volumesindocker-compose.yml - Scenarios: Edit files in
scenario/phases/to add custom test prompts
Next steps
- Demo: Mitrity MCP Sidecar — run the same scenario with the lightweight sidecar wrapper
- Integration modes — understand when to use Gateway vs Sidecar
- Writing policies — create your own governance rules
- Configuration reference — full gateway YAML reference