PRISM · MCP Integration · Model Context Protocol

Your IDE. Your Swarm.
Our Protocol.

24 tools from the Sovereign Node Framework, accessible from any AI coding environment via the Model Context Protocol. Security audits, geopolitical intelligence, market intelligence, a 52-persona brain trust, and autonomous bounty hunting — all from a single MCP server that runs on your own hardware.

Every response carries SATOR HMAC integrity proof, E8 vertex routing metadata, φ-weighted priority, and Grey entropy liveness tags. Not a wrapper — PRISM: the full 8-pillar SNF architecture refracted through stdio transport. Part of the PLEROMA — the complete sovereign architecture.

24
MCP Tools
6
Domains
16
Soul Routing
8
SNF Pillars

60-Second Setup

Connect Your IDE

One command or config file. Works with Claude Code, Cursor, VS Code, Windsurf, Zed, and Codex. stdio transport — no HTTP server, no API keys, no cloud dependency.

01

Claude Code

claude mcp add matrix-cr-studio \
  --transport stdio \
  -- /path/to/matrix-cr-studio/.venv/bin/python \
     /path/to/matrix-cr-studio/src/mcp_server.py

Works globally — available from any repo, any session.

02

Cursor

// Settings → MCP → Add Server
{
  "command": "/path/to/matrix-cr-studio/.venv/bin/python",
  "args": ["/path/to/matrix-cr-studio/src/mcp_server.py"]
}

Or add to .cursor/mcp.json in your project root.

03

VS Code / Windsurf / Zed

// .vscode/mcp.json
{
  "servers": {
    "matrix-cr-studio": {
      "command": "/path/to/matrix-cr-studio/.venv/bin/python",
      "args": ["/path/to/matrix-cr-studio/src/mcp_server.py"]
    }
  }
}

Drop this file in any project to get all 24 tools.

Tool Catalog

24 Tools. Six Domains. E8 Routed.

Every tool maps to a responsible soul in the ION-Space 4D tesseract. The routing is not decorative — it determines execution priority (φ-weight), security context (SATOR HMAC scope), and persistence target (Venus WAL partition).

Security

Green |LZ⟩ · Silver |N⟩ · Blue |Z⟩ · Cyan |RL⟩6 tools
spectra_audit6-layer SPECTRA smart contract audit. Pattern → Slither → Mythril → LLM → cross-layer dedup. 50 vuln classes.Green |LZ⟩
recon_scanCarlini Scaffold file-by-file vulnerability scanner. Multi-step chains that static analysis misses.Green |LZ⟩
osint_scanPassive attack surface intelligence. crt.sh → subfinder → httpx → GitHub dorks → Shodan → HIBP.Cyan |RL⟩
pqc_assessPost-quantum cryptography migration assessment. NIST FIPS 203/204/205. Q-Day exposure scoring.Silver |N⟩
qta_assess72-hour quantum threat assessment (NIST IR 8547). HNDL risk windows. Executive brief + roadmap.Silver |N⟩
kb_searchSearch the 14-feed security knowledge base. Rekt, NVD, PortSwigger, Trail of Bits, arxiv. FTS5.Blue |Z⟩

Intelligence

Red |RZ⟩ · Cyan |RL⟩ · Mars |LZN⟩4 tools
oracle_scanGeopolitical signal intelligence. 6-category φ-weighted scoring. 18-ticker asset implication matrix.Red |RZ⟩
oracle_signalsLatest Oracle signal summary — reads last report without running a new scan.Red |RZ⟩
neptune_scanMaritime intelligence. AIS dark fleet detection. ZPMC SCADA IOC scan. Vessel risk scoring.Cyan |RL⟩
smart_money_scanCongressional STOCK Act + whale flow + 13F hedge fund filings. φ-weighted politician scoring.Mars |LZN⟩

Trading

Mars |LZN⟩5 tools
wheel_scanOptions Wheel strategy candidates. VIX regime, liquidity, OTM zone, premium threshold.Mars |LZN⟩
wheel_statusActive Wheel positions and P/L summary.Mars |LZN⟩
trade_pipelineSovereign analytical pipeline (SATOR cycle). Kelly-criterion risk analysis. Mars + Oracle + institutional data confluence.Mars |LZN⟩
trade_statusOpen positions, P/L, session info.Mars |LZN⟩
equity_reportEquity curve and performance report.Mars |LZN⟩

Analysis

Gold |0⟩ · Red |RZ⟩6 tools
dmaic_analyze16-agent BFT quorum DMAIC root cause analysis. 11/16 consensus. 7 regulatory frameworks.Gold |0⟩
construct_briefSingle Construct persona deep-dive. 52 personas across 13 domains.Red |RZ⟩
construct_triageMulti-persona BFT panel triage. 7 canonical panels. Parallel fanout → Gold synthesis.Gold |0⟩
construct_pm_briefProduct management brief. Market positioning, GTM, risk, competitive landscape.Gold |0⟩
construct_specopsAdversarial red-team analysis. Military/intel persona attack surface assessment.Red |RZ⟩
construct_listBrowse available personas and canonical panels.Gold |0⟩

Pipeline

Mercury |LN⟩2 tools
bounty_pipelineAutonomous bounty hunting. SEED → NAVIGATE → HOLD → EXECUTE → LOG. 6 platform sources.Mercury |LN⟩
bounty_statusPipeline targets, recent runs, top findings.Mercury |LN⟩

System

Jupiter |RLN⟩1 tools
system_statusFull system health. All souls, pipelines, modules. ION vertices, φ-weights, SATOR HMAC.Jupiter |RLN⟩

Response Envelope

8 Pillars in Every Response

This is not a flat API wrapper. Every MCP response carries the full SNF architectural signature — provable integrity, deterministic routing, and mathematical precision.

SATOREvery invocation runs SEED → NAVIGATE → HOLD → EXECUTE → LOG. HMAC-SHA256 integrity proof.
α=1/137Fine-structure precision constant in every response envelope.
IcosahedronMinimum surface area, maximum capability. 24 tools, clean interface.
E8Every tool routes through its responsible soul via ION-Space 4D vertex.
φφ-weighted priority per soul energy level. Gold = φ⁴. Grey = φ⁰.
EntropyGrey node nanosecond SHA-256 liveness tag on every response.
FractalThe MCP server IS the swarm at a different scale. Same math, same routing.
SovereignRuns on your metal. stdio transport. No cloud dependency.

Sample Output

What a Response Looks Like

{
  "sator_phase": "LOG",
  "sator_cycle": { "SEED": 0.0, "NAVIGATE": 0.0001, "HOLD": 0.0001, "EXECUTE": 0.3842, "LOG": 0.3843 },
  "sator_hmac": "7281fdd9060f81a7",
  "soul": "Blue",
  "vertex": "|Z⟩",
  "ion_coords": [0, 0, 1, 0],
  "phi_weight": 4.236068,
  "entropy_tag": "d98990603850",
  "alpha_check": 37,
  "node": "Ubermenschtron",
  "transport": "stdio/MCP",
  "timestamp": "2026-04-16T20:38:39.223846+00:00",
  "result": { "matches": 3, "query": "reentrancy", "findings": [...] }
}

Start Building.

Connect the MCP server in 60 seconds and get the full Matrix CR Studio capability set in your editor. Security audits, intelligence briefings, market intelligence, and the Construct brain trust — all from natural language.