ThornGuard is not Claude-only. It works today with most developer-managed MCP clients that support either a remote MCP URL plus custom headers or a local bridge command.Documentation Index
Fetch the complete documentation index at: https://qwady.wiki/llms.txt
Use this file to discover all available pages before exploring further.
Current Support Model
ThornGuard works best today with one of these patterns:- Direct remote HTTP setup with a URL and custom headers
- Local stdio bridge such as
mcp-remotethat connects to ThornGuard on the client’s behalf
x-thornguard-licensefor ThornGuard authx-thornguard-activation-idfor the active client instancex-thornguard-activation-prooffor that activation’s local proof-of-possessionx-thornguard-session-idfor managed session binding- a managed protected URL such as
/mcp/:connection-id
/mcpplusx-mcp-target-urlfor upstream routing
Compatibility Snapshot
| Platform / Mode | Works Today | Notes |
|---|---|---|
| VS Code / Copilot | Yes | Verified CLI launcher path today. Direct remote HTTP also works when the MCP surface accepts a URL plus custom headers |
| Cursor | Yes | Verified CLI launcher path today, with direct remote HTTP available in header-capable MCP setups |
| Zed | Yes | Verified CLI launcher path today. Manual remote HTTP depends on a header-capable MCP configuration surface |
| Claude Desktop | Yes | Verified local launcher / bridge path today |
| Windsurf | Yes | Verified CLI launcher path today |
| Cline | Yes | Verified CLI launcher path today. Config written to Cline’s globalStorage settings |
| Continue | Yes | Verified CLI launcher path today. Config written to ~/.continue/config.json |
| Direct remote MCP clients | Yes | Best on managed protected URLs; legacy header-routed remote HTTP still works during migration |
| Native OAuth-only remote connector flows | Partial | Still not fully first-class until actor-scoped OAuth onboarding and connector UX are productized end to end |
| Protecting an MCP server you operate | Yes, with setup | Supported today by routing clients through ThornGuard first |
Recommended Setup Patterns
Direct HTTP Setup
Use this when your client lets you configure:- a remote MCP URL
- custom headers
- optional environment-backed secrets
Local Bridge Setup
Use this when your client expects to launch a local command instead of talking directly to a remote HTTP MCP server. This is the common pattern for Claude Desktop today and the most reliable universal path when you want ThornGuard to generate the exact client-specific launcher shape for Claude Desktop, VS Code, Cursor, Zed, Windsurf, Cline, or Continue.Security Notes
- Prefer secret inputs, environment files, or keychain-backed storage over hardcoded tokens in config files.
- Local bridge tools may log CLI-passed headers before traffic reaches ThornGuard.
- ThornGuard sanitizes secrets in its own audit trail and webhook deliveries, but it cannot sanitize logs emitted locally by the MCP client or bridge tool.
- The ThornGuard CLI (
@thornguard/cli) uses platform-native secure storage: macOS Keychain, Linux Secret Service (secret-tool), and Windows DPAPI. A plaintext file fallback is available as an explicit opt-in for environments without keyring support.