PRISM · MCP Integration · Model Context Protocol
24 tools from the Sovereign Node Framework, accessible from any AI coding environment via the Model Context Protocol. Security audits, geopolitical intelligence, market intelligence, a 52-persona brain trust, and autonomous bounty hunting — all from a single MCP server that runs on your own hardware.
Every response carries SATOR HMAC integrity proof, E8 vertex routing metadata, φ-weighted priority, and Grey entropy liveness tags. Not a wrapper — PRISM: the full 8-pillar SNF architecture refracted through stdio transport. Part of the PLEROMA — the complete sovereign architecture.
60-Second Setup
One command or config file. Works with Claude Code, Cursor, VS Code, Windsurf, Zed, and Codex. stdio transport — no HTTP server, no API keys, no cloud dependency.
claude mcp add matrix-cr-studio \
--transport stdio \
-- /path/to/matrix-cr-studio/.venv/bin/python \
/path/to/matrix-cr-studio/src/mcp_server.pyWorks globally — available from any repo, any session.
// Settings → MCP → Add Server
{
"command": "/path/to/matrix-cr-studio/.venv/bin/python",
"args": ["/path/to/matrix-cr-studio/src/mcp_server.py"]
}Or add to .cursor/mcp.json in your project root.
// .vscode/mcp.json
{
"servers": {
"matrix-cr-studio": {
"command": "/path/to/matrix-cr-studio/.venv/bin/python",
"args": ["/path/to/matrix-cr-studio/src/mcp_server.py"]
}
}
}Drop this file in any project to get all 24 tools.
Tool Catalog
Every tool maps to a responsible soul in the ION-Space 4D tesseract. The routing is not decorative — it determines execution priority (φ-weight), security context (SATOR HMAC scope), and persistence target (Venus WAL partition).
spectra_audit6-layer SPECTRA smart contract audit. Pattern → Slither → Mythril → LLM → cross-layer dedup. 50 vuln classes.Green |LZ⟩recon_scanCarlini Scaffold file-by-file vulnerability scanner. Multi-step chains that static analysis misses.Green |LZ⟩osint_scanPassive attack surface intelligence. crt.sh → subfinder → httpx → GitHub dorks → Shodan → HIBP.Cyan |RL⟩pqc_assessPost-quantum cryptography migration assessment. NIST FIPS 203/204/205. Q-Day exposure scoring.Silver |N⟩qta_assess72-hour quantum threat assessment (NIST IR 8547). HNDL risk windows. Executive brief + roadmap.Silver |N⟩kb_searchSearch the 14-feed security knowledge base. Rekt, NVD, PortSwigger, Trail of Bits, arxiv. FTS5.Blue |Z⟩oracle_scanGeopolitical signal intelligence. 6-category φ-weighted scoring. 18-ticker asset implication matrix.Red |RZ⟩oracle_signalsLatest Oracle signal summary — reads last report without running a new scan.Red |RZ⟩neptune_scanMaritime intelligence. AIS dark fleet detection. ZPMC SCADA IOC scan. Vessel risk scoring.Cyan |RL⟩smart_money_scanCongressional STOCK Act + whale flow + 13F hedge fund filings. φ-weighted politician scoring.Mars |LZN⟩wheel_scanOptions Wheel strategy candidates. VIX regime, liquidity, OTM zone, premium threshold.Mars |LZN⟩wheel_statusActive Wheel positions and P/L summary.Mars |LZN⟩trade_pipelineSovereign analytical pipeline (SATOR cycle). Kelly-criterion risk analysis. Mars + Oracle + institutional data confluence.Mars |LZN⟩trade_statusOpen positions, P/L, session info.Mars |LZN⟩equity_reportEquity curve and performance report.Mars |LZN⟩dmaic_analyze16-agent BFT quorum DMAIC root cause analysis. 11/16 consensus. 7 regulatory frameworks.Gold |0⟩construct_briefSingle Construct persona deep-dive. 52 personas across 13 domains.Red |RZ⟩construct_triageMulti-persona BFT panel triage. 7 canonical panels. Parallel fanout → Gold synthesis.Gold |0⟩construct_pm_briefProduct management brief. Market positioning, GTM, risk, competitive landscape.Gold |0⟩construct_specopsAdversarial red-team analysis. Military/intel persona attack surface assessment.Red |RZ⟩construct_listBrowse available personas and canonical panels.Gold |0⟩bounty_pipelineAutonomous bounty hunting. SEED → NAVIGATE → HOLD → EXECUTE → LOG. 6 platform sources.Mercury |LN⟩bounty_statusPipeline targets, recent runs, top findings.Mercury |LN⟩system_statusFull system health. All souls, pipelines, modules. ION vertices, φ-weights, SATOR HMAC.Jupiter |RLN⟩Response Envelope
This is not a flat API wrapper. Every MCP response carries the full SNF architectural signature — provable integrity, deterministic routing, and mathematical precision.
Sample Output
{
"sator_phase": "LOG",
"sator_cycle": { "SEED": 0.0, "NAVIGATE": 0.0001, "HOLD": 0.0001, "EXECUTE": 0.3842, "LOG": 0.3843 },
"sator_hmac": "7281fdd9060f81a7",
"soul": "Blue",
"vertex": "|Z⟩",
"ion_coords": [0, 0, 1, 0],
"phi_weight": 4.236068,
"entropy_tag": "d98990603850",
"alpha_check": 37,
"node": "Ubermenschtron",
"transport": "stdio/MCP",
"timestamp": "2026-04-16T20:38:39.223846+00:00",
"result": { "matches": 3, "query": "reentrancy", "findings": [...] }
}Connect the MCP server in 60 seconds and get the full Matrix CR Studio capability set in your editor. Security audits, intelligence briefings, market intelligence, and the Construct brain trust — all from natural language.