@vurb/core
v3.19.5
Published
MVA (Model-View-Agent) framework for the Model Context Protocol. Structured perception packages with Presenters, cognitive guardrails, self-healing errors, action consolidation, and tRPC-style type safety — so AI agents perceive and act on your data deter
Maintainers
Readme
The TypeScript framework for MCP Servers.
Presenters shape perception. A typed layer between your data and the AI agent — strips undeclared fields, redacts PII, gates tools by workflow state, and deploys to any edge.
Documentation · Quick Start · API Reference · llms.txt
Why Vurb.ts?
Every raw MCP server does the same thing: JSON.stringify() the database row and ships it to the LLM. The AI receives password_hash, customer_ssn, internal_margin — every column. No governance. No rules. No perception control.
Vurb.ts gives you three ways to fix this — pick the one that fits your team:
Path 1: Declarative YAML — zero code
Define your entire MCP server in a single vurb.yaml. No TypeScript. No build step.
# vurb.yaml — a complete MCP server
version: "1.0"
server:
name: "github-tools"
connections:
github:
type: rest
base_url: "https://api.github.com"
auth:
type: bearer
token: "${SECRETS.GITHUB_TOKEN}"
tools:
- name: search_repos
description: "Search GitHub repositories"
instruction: "Use for finding projects by topic or keyword."
rules:
- "Max 10 results per query"
parameters:
query: { type: string, required: true }
execute:
connection: github
method: GET
path: "/search/repositories"
query: { q: "{{query}}", per_page: "10" }
response:
extract: ["items[].{full_name, description, stargazers_count, html_url}"]vurb yaml dev # MCP server running — zero TypeScriptPath 2: Presenter flow — control what the agent perceives
The Presenter is a typed perception layer. Your handler returns raw data. The Presenter shapes everything the agent sees:
Handler (raw data) Presenter Agent (LLM)
────────────────── ───────── ──────────
{ amount_cents, → Schema (allowlist) → Structured
password_hash, + Rules (contextual) perception
customer_ssn, + PII redaction package
internal_margin } + Suggested next actions
- password_hash ← STRIPPED
- customer_ssn ← REDACTED
- internal_margin ← STRIPPEDimport { createPresenter, f, t } from '@vurb/core';
const InvoicePresenter = createPresenter('Invoice')
.schema({ id: t.string, amount_cents: t.number, status: t.enum('paid', 'pending') })
.redactPII(['*.customer_ssn'])
.rules(['amount_cents is in CENTS — divide by 100 for display.'])
.suggest((inv) => inv.status === 'pending'
? [suggest('billing.pay', 'Invoice pending — process payment')]
: [suggest('billing.archive', 'Invoice settled — archive it')]);
export default f.query('billing.get_invoice')
.describe('Get an invoice by ID')
.withString('id', 'Invoice ID')
.returns(InvoicePresenter)
.handle(async (input, ctx) => ctx.db.invoices.findUnique({ where: { id: input.id } }));Undeclared fields are stripped at RAM level. PII is redacted after UI logic runs (Late Guillotine). Rules travel with data, not in the system prompt. Next actions are computed from data state, not hardcoded.
Path 3: Workflow gates — tools that appear only when valid
The FSM State Gate makes it physically impossible for the AI to call tools out of order. If the state is empty, cart.pay doesn't exist in tools/list:
const gate = f.fsm({
id: 'checkout', initial: 'empty',
states: {
empty: { on: { ADD_ITEM: 'has_items' } },
has_items: { on: { CHECKOUT: 'payment' } },
payment: { on: { PAY: 'confirmed' } },
confirmed: { type: 'final' },
},
});
export default f.mutation('cart.pay')
.bindState('payment', 'PAY') // Invisible until 'payment' state
.handle(async (input, ctx) => ctx.db.payments.process(input.method));| State | Visible tools |
|---|---|
| empty | cart.add_item, cart.view |
| has_items | cart.add_item, cart.checkout, cart.view |
| payment | cart.pay, cart.view |
| confirmed | cart.view |
Get Started
npx @vurb/core create my-server
cd my-server && npm run devDrop a file in src/tools/, restart — it's a live MCP tool:
src/tools/
├── billing/
│ ├── get_invoice.ts → billing.get_invoice
│ └── pay.ts → billing.pay
└── users/
└── list.ts → users.listDeploy
Same code, any platform. Zero changes:
vurb deploy # Vinkius Edge (default)
vercel deploy # Vercel Functions
wrangler deploy # Cloudflare WorkersScaffold Options
vurb create my-server # Vanilla — file-based routing
vurb create my-api --vector prisma # Prisma — CRUD with field-level security
vurb create ops-bridge --vector n8n # n8n — workflow bridge
vurb create petstore --vector openapi # OpenAPI → MCP in one command
vurb create my-server --target vercel --yes # Vercel Functions target
vurb create my-server --target cloudflare --yes # Cloudflare Workers targetZero Learning Curve
Vurb.ts ships a SKILL.md — a machine-readable architectural contract. Your AI agent reads the spec and writes the entire server. First pass, no corrections.
Open your project in Cursor, Claude Code, GitHub Copilot, or Windsurf and prompt:
"Build an MCP server for patient records with Prisma. Redact SSN and diagnosis from LLM output. Add an FSM that gates discharge tools until attending physician signs off."
The agent reads the spec, produces correct Presenters, middleware, FSM gating, and file-based routing. You review the PR.
📄 Machine-readable spec: vurb.vinkius.com/llms.txt — optimized for LLM consumption.
Key Features
Egress Firewall (Presenter schema allowlist) · PII Redaction with Late Guillotine · FSM State Gate (tools disappear by state) · A2A Protocol Bridge (@vurb/a2a — expose MCP servers as A2A-compliant agents with Agent Cards and task delegation) · Multi-Agent Swarm (@vurb/swarm — HMAC-SHA256 delegation, namespace isolation, W3C tracing) · Middleware (pre-compiled, zero-allocation) · tRPC-style typed client · Self-healing errors · State Sync (RFC 7234 cache signals) · Zero-trust Sandbox (V8 isolate) · Prompt Engine · Agent Skills · Capability Governance (SHA-256 lockfile) · Inspector (real-time TUI dashboard) · Declarative YAML engine (@vurb/yaml)
Code Generators
Turn existing infrastructure into MCP servers:
# OpenAPI / Swagger → typed MCP tools
npx openapi-gen generate -i ./petstore.yaml -o ./generated
# Prisma → CRUD tools with field-level security
npx prisma generate # uses vurb-prisma-gen
# n8n → auto-discover webhook workflows
const n8n = await createN8nConnector({ url, apiKey, includeTags: ['ai-enabled'] });Ecosystem
Core
| Package | Purpose |
|---|---|
| @vurb/core | Framework core — Presenters, Fluent API, middleware, routing |
| @vurb/yaml | Declarative YAML engine — define MCP servers without code |
| @vurb/swarm | Multi-agent orchestration — Federated Handoff Protocol |
| @vurb/a2a | A2A Protocol Bridge — Agent Cards, task delegation, structured message exchange |
| @vurb/testing | In-memory pipeline testing with MVA layer assertions |
| @vurb/inspector | Real-time terminal dashboard via Shadow Socket |
Adapters
| Package | Target |
|---|---|
| @vurb/vercel | Vercel Functions (Edge / Node.js) |
| @vurb/cloudflare | Cloudflare Workers |
Generators & Connectors
| Package | Purpose |
|---|---|
| @vurb/openapi-gen | OpenAPI 3.x / Swagger 2.0 → MCP tools |
| @vurb/prisma-gen | Prisma schema → CRUD tools with field-level security |
| @vurb/n8n | n8n workflows → MCP tools |
| @vurb/aws | AWS Lambda & Step Functions → MCP tools |
| @vurb/skills | Progressive instruction distribution for agents |
Security & Auth
| Package | Purpose |
|---|---|
| @vurb/oauth | RFC 8628 Device Flow |
| @vurb/jwt | JWT verification — HS256 / RS256 / ES256 + JWKS |
| @vurb/api-key | API key validation with timing-safe comparison |
Documentation
Full guides, API reference, and cookbook recipes:
vurb.vinkius.com · llms.txt (AI-optimized spec)
Contributing
See CONTRIBUTING.md for development setup and guidelines.
Security
See SECURITY.md for reporting vulnerabilities.
