Skip to content

MCP Hangar — Product Architecture & Hardening Plan

Classification: Internal — do not publish Author: Marcin Date: 2026-03-24 Purpose: Define product tiers, hardening priorities, cut list, and deployment focus


1. Product Identity

One-liner

MCP Hangar is the runtime security and governance layer for MCP servers in production.

Positioning matrix

PlayerWhat they doWhere Hangar fits
ComposioManaged integrations (500+ connectors, auth)They're plumbing. We govern the plumbing.
SmitheryServer discovery & hosted deploymentThey're a registry. We verify what's in the registry.
GlamaMCP hosting platform & API gatewayThey run servers. We watch what servers do.
OpenLITAI observability, evaluations, prompts, telemetry UXStrong partner/integration on visibility. Not a replacement for runtime governance, lifecycle control, or policy enforcement.
MCP Gateway RegistryEnterprise gateway with OAuth & RBACClosest competitor. Missing behavioral profiling, runtime verification, semantic analysis.
Datadog/GrafanaGeneral observabilityGeneric. No MCP protocol awareness, no capability enforcement, no tool-level governance.
MCP HangarRuntime security, behavioral governance, lifecycle managementThe layer between "deployed" and "trusted."

Tagline candidates (pick one, kill the rest)

  1. "Know what your agents are doing before they do it."
  2. "Your MCP servers don't crash gracefully. Hangar knows before they crash at all."
  3. "MCP servers are black boxes. Hangar opens them."
  4. "Deploy MCP servers. Govern MCP servers. Trust MCP servers."

Integration stance

  • OpenTelemetry-compatible tools such as OpenLIT, Langfuse, Grafana, and other OTLP backends are extensions to the visibility layer around Hangar.
  • Hangar exports telemetry to them; Hangar does not try to become a generic AI observability platform.
  • OpenTelemetry is the interoperability contract: Hangar should emit MCP-aware governance telemetry with stable attributes for provider, tool, group, user, session, policy, and enforcement outcomes.
  • Product investment stays focused on runtime governance, verification, identity-aware audit, and enforcement.

2. Licensing Model

Dual-license: MIT core + BSL 1.1 enterprise

ComponentLicenseScope
Core control planeMITsrc/mcp_hangar/
Enterprise featuresBSL 1.1enterprise/ — behavioral profiling, semantic analysis, identity propagation, compliance export

BSL parameters

  • Licensor: Marcin (MCP Hangar project)
  • Licensed Work: Each release of code under enterprise/
  • Change Date: 3 years from release date of each version
  • Change License: MIT
  • Additional Use Grant: Evaluation, development, testing, and non-production use are permitted without a commercial license. Production use for internal tooling of organizations with fewer than 5 MCP servers is permitted (community use exception).

Why BSL over alternatives

AlternativeRejected because
Full MIT everywhereNo commercial protection. Anyone can host "Hangar Enterprise" and sell your work. One-person operation cannot compete on price with a cloud provider reselling your code.
Dual repo (private enterprise repo)Two repos to maintain solo. Merge conflicts between core and enterprise. Contributors can't read enterprise code. Enterprise buyers can't audit before purchase.
Feature flags without legal protectionTrivially bypassed. No legal recourse. Invites the Hetzner-hosted competitor problem.
AGPLScares away enterprise buyers. Many companies have blanket AGPL prohibition policies.
SSPLEven more restrictive than AGPL. MongoDB backlash. Not accepted by most enterprises.

What goes where

FeatureLicenseDirectoryRationale
Provider lifecycle, state machine, circuit breakerMITsrc/Core value, must be open for adoption
Provider groups, load balancing, failoverMITsrc/Core value
Health checks, Prometheus metrics, OTEL exportMITsrc/Observability foundation, enables partner integrations
K8s operator, CRDs, Helm chartsMIToperator/, helm-charts/ (separate repos)Adoption requires open operator
Capability declaration schemaMITsrc/Foundational for enforcement, must be standard
Network policy generationMITsrc/ + operator/ (separate repo)Core enforcement, open for trust
Violation signals and enforcement eventsMITsrc/Core contract, partner backends consume these
CLI, hot-reload, batch invocationsMITsrc/Core DX
Basic audit logging (stdout/file)MITsrc/Baseline visibility
REST API, WebSocket infrastructureMITsrc/API surface must be open
RBAC, API key auth, JWT/OIDCBSLenterprise/auth/Enterprise value, commercial differentiator
Tool Access PoliciesBSLenterprise/policies/Governance feature, commercial differentiator
Event sourcing persistence (SQLite/Postgres)BSLenterprise/persistence/Enterprise durability, commercial differentiator
Behavioral profiling and deviation detectionBSLenterprise/behavioral/Core thesis of Enterprise tier
Caller identity propagationBSLenterprise/identity/Enterprise value
Identity-aware audit trailBSLenterprise/identity/Enterprise value
Compliance export (CEF/LEEF/JSON-lines)BSLenterprise/compliance/Enterprise value
Cost attribution / FinOpsBSLenterprise/finops/Enterprise value
Call sequence pattern engineBSLenterprise/semantic/Core thesis of Enterprise tier
Detection rule packsBSLenterprise/semantic/rules/Commercial IP
Custom rule DSLBSLenterprise/semantic/Enterprise value
Agent behavior scoringBSLenterprise/semantic/Enterprise value
Langfuse integrationBSLenterprise/integrations/Partner integration, commercial value

Architectural boundary

Enterprise features consume core interfaces. Core never imports from enterprise/. The boundary is a one-way dependency:

enterprise/  ──depends-on──►  src/mcp_hangar/domain/contracts/
enterprise/  ──depends-on──►  src/mcp_hangar/application/ports/
enterprise/  ──never──►       imports from enterprise/ in core

This is enforced by:

  1. Import linting rule in CI: no enterprise.* imports in src/
  2. Core defines interfaces (ports/contracts). Enterprise provides implementations.
  3. Bootstrap wiring in server/bootstrap/ conditionally loads enterprise modules when license key is present.

Migration plan (v0.12.0 → v0.13.0)

Existing Pro/Enterprise features currently live in src/. They must move to enterprise/ before v0.13.0 release.

Current locationTarget locationFeature
src/mcp_hangar/infrastructure/auth/enterprise/auth/API key stores, JWT/OIDC, RBAC, rate limiter
src/mcp_hangar/domain/security/roles.pyenterprise/auth/roles.pyRole definitions (contracts/interfaces stay in core)
src/mcp_hangar/server/api/auth/enterprise/auth/api/Auth REST endpoints
src/mcp_hangar/server/auth_bootstrap.pyenterprise/auth/bootstrap.pyAuth DI wiring
src/mcp_hangar/domain/value_objects/tool_access_policy.pyKeep interface in core, move enforcement to enterprise/policies/Policy enforcement
src/mcp_hangar/infrastructure/persistence/event_store.py (SQLite/Postgres)enterprise/persistence/Durable event stores (in-memory stays in core)
src/mcp_hangar/infrastructure/observability/langfuse_adapter.pyenterprise/integrations/langfuse.pyLangfuse integration

Migration steps:

  1. Extract interfaces/contracts for every feature being moved. Ensure they exist in src/mcp_hangar/domain/contracts/ or src/mcp_hangar/application/ports/.
  2. Move implementation files to enterprise/ directory.
  3. Update bootstrap to conditionally load enterprise modules.
  4. Add CI rule: grep -r "from enterprise" src/ must return empty.
  5. Add enterprise/LICENSE.BSL file.
  6. Update root LICENSE to clarify scope (MIT for everything outside enterprise/).
  7. Tag v0.13.0 with dual-license in place.

CLA requirement

Contributors to enterprise/ must sign a Contributor License Agreement granting the project maintainer (Marcin) the right to relicense their contributions. This is necessary because BSL → MIT conversion requires licensing authority over all contributed code.

Core (MIT) contributions do not require a CLA.


3. Product Tiers

Tier 0: Hangar Core (Open Source, MIT)

Buyer: Individual developer, small team, OSS community Entry: curl -sSL https://mcp-hangar.io/install.sh | bashValue: "See what your MCP servers do in 5 minutes."

Includes:

  • Provider lifecycle management (state machine, health checks, circuit breaker)
  • Provider groups (load balancing, failover)
  • Docker and Kubernetes provider modes
  • Hot-reload configuration
  • Batch invocations with single-flight
  • Prometheus metrics (full set)
  • OpenTelemetry tracing export to partner backends (OpenLIT, Langfuse, Grafana stack, OTEL Collector)
  • MCP-aware OTEL attribute taxonomy for governance telemetry (provider/tool/user/session/policy context)
  • Capability declaration schema and network policy generation
  • Violation signals and enforcement events
  • Basic audit logging (stdout/file)
  • Basic status CLI views
  • CLI (hangar init, hangar serve, hangar status)
  • MCP tools (hangar_tools, hangar_health, hangar_invoke, etc.)
  • Helm chart for K8s deployment
  • REST API and WebSocket infrastructure

Tier 1: Hangar Pro (BSL 1.1, commercial license)

Buyer: Platform engineering team, 10-100 MCP servers Entry: Self-hosted, license key activation Price target: $49-99/mo per cluster (or $499-999/yr) Value: "Govern and secure your MCP servers with full visibility."

Adds on top of Core:

  • RBAC (5 built-in roles) + API key authentication with rotation
  • JWT/OIDC integration (Keycloak, Entra ID, Okta)
  • Tool Access Policies (glob-pattern allow/deny, 3-level merge)
  • Event sourcing persistence (SQLite, Postgres)
  • Langfuse LLM observability integration
  • Tool schema drift detection
  • Behavioral reports (per-provider)
  • Config export/backup

Tier 2: Hangar Enterprise (BSL 1.1, custom commercial terms)

Buyer: Organization with 100+ MCP servers, compliance requirements Entry: Sales-led, consulting engagement Price target: €2,000-5,000/mo or annual contract Value: "Runtime security and compliance for MCP at scale."

Adds on top of Pro:

  • Network behavioral profiling and deviation detection
  • Caller identity propagation and identity-aware audit trail
  • Call sequence pattern engine (semantic analysis)
  • Pre-built detection rule packs
  • Compliance export (CEF, LEEF, JSON-lines for SIEM)
  • Cost attribution (FinOps per user/agent/provider)
  • Multi-cluster federation (H2 2026)
  • SSO / SCIM user provisioning
  • Priority support + SLA

Tier 3: Hangar Advisory (Consulting)

Buyer: Any organization deploying MCP servers Entry: Direct outreach, inbound from content/newsletter Price: €800-1,200/day

Offerings:

EngagementDurationPriceDeliverable
MCP Operations Assessment2-3 days€2,400-3,600Audit report, Maturity Scorecard, recommendations
MCP Security Assessment3-5 days€3,600-6,000Behavioral profile, risk matrix, network policy templates
Hangar Implementation2-4 weeks€8,000-16,000Full deployment, dashboards, runbooks, team training
Advisory RetainerMonthly€2,000-4,000/moOngoing review, tuning, incident support

4. Deployment Focus: Kubernetes First, Docker Compatible

Why Kubernetes-first is non-negotiable

The runtime security thesis requires:

CapabilityContainer (Docker/K8s)Stdio (subprocess)
Network policy enforcement✅ NetworkPolicy, iptables❌ Shares host network
Outbound traffic profiling✅ Container network namespace❌ Mixed with host traffic
Filesystem isolation✅ Read-only root, explicit mounts⚠️ Process-level only
Resource limits✅ cgroups⚠️ ulimits (weaker)
Capability dropping✅ seccomp, AppArmor❌ Not applicable
Image provenance✅ cosign/notation verification❌ No equivalent
Behavioral baseline✅ Isolated network namespace❌ Cannot distinguish server traffic

Decision: Stdio providers remain supported for development and simple setups only. New security and governance work targets Kubernetes first, then Docker where practical. Documentation and product direction lead with operator-driven Kubernetes deployment; Docker remains the compatibility and local-development path.

K8s Operator hardening priorities

ItemCurrent stateTarget statePriority
CRD validationBasicCEL validation rules, webhook admissionP0
NetworkPolicy generationNot implementedAuto-generated from capability declarationP0
Violation signalingNot implementedFirst-class violation and enforcement events surfaced from operator decisionsP0
Policy ecosystem integrationMinimalIntegrate with admission/policy tooling and operator-managed governance flowsP0
Pod Security StandardsPartial (security context)Enforce restricted PSS by defaultP0
RBAC scopingCluster-wideNamespace-scoped with aggregated ClusterRolesP1
Operator HALeader election existsAnti-affinity, PDB, multi-replicaP1
Helm chart hardeningBasicCIS benchmark aligned, OPA/Kyverno policies shippedP1
Upgrade strategyNot definedCRD versioning, conversion webhooks, migration guideP2

Docker provider hardening priorities

Docker remains important, but primarily as the compatibility path below Kubernetes. Hardening work here should follow patterns proven in the Kubernetes path rather than drive the roadmap.

ItemCurrent stateTarget statePriority
Network isolationnone/bridge/host optionDefault: dedicated bridge per provider, explicit egress rulesP0
Default security optsDropped caps, no-new-privileges+ seccomp profile, read-only root, tmpfs for /tmpP0
Egress allowlistNot implementedConfig-driven outbound destination allowlist, deny all elseP0
DNS monitoringNot implementedCapture DNS queries per container for behavioral baselineP1
Volume mount auditBlocked sensitive pathsAudit log of all file reads/writes in mounted volumesP2

5. Cut List — What to Deprioritize

These features exist in the codebase but are not on the critical path. They should not receive development time until Phases 1-2 are complete.

FeatureCurrent stateActionReason
Catalog APIExperimental (v0.12.0)Freeze. No new work.Discovery/catalog is Smithery/Registry territory. Not our game.
D3 topology visualizationShipped in dashboardFreeze. Maintain, don't enhance.Cool demo, zero business value until there are paying users.
Config export UI with diff viewerShippedFreeze.Nice-to-have. Not on the buyer's decision matrix.
Generic observability platform features (prompt hub, playground, broad eval suite, secrets UX)Adjacent market onlyDo not build. Integrate instead.OpenLIT and similar platforms already serve this layer. Our lane is runtime security and governance.
Response truncation / continuation cacheShipped (v0.6.3)Maintain. Bug fixes only.Solid feature, complete, no further investment needed.
Saga compensationShipped with persistenceMaintain.Infrastructure piece, done.
Binary installerShipped in v0.6.0Deprioritize. Docker/K8s path is primary.Binary installs don't benefit from container security.
Stdio provider enhancementsWorkingFreeze. No security features for stdio.Cannot enforce network/filesystem policies on bare subprocess.
Stdio governance/security investmentSupported path onlyStop expanding. Maintenance only.Kubernetes operator, policies, and cluster-native controls are the only serious growth path.
mcp-hangar init interactive flowPolished (v0.6.6)Maintain.Good DX, complete for now.
Redis cache backendShippedMaintain.Works, no further investment.
Fuzz testsAdded in v0.12.0Maintain. Keep in CI, don't expand.Useful but not a differentiator.

6. Hardening Priorities — What Must Improve

Critical (before any public positioning as "security layer")

AreaGapActionTarget versionStatus
Container network isolationDocker providers can talk to anythingDefault-deny egress, explicit allowlistv0.13.0
Capability declaration schemaNo formal way to declare what a server needsNew capabilities config blockv0.13.0
K8s NetworkPolicy generationOperator doesn't create NetworkPoliciesAuto-generate from CRD capabilities fieldv0.13.0
Licensing boundaryAll code in MIT, no commercial protectionMigrate Pro/Enterprise features to enterprise/ under BSL 1.1v0.13.0In progress (v7.0 Phase 36)
Behavioral baseline storageNo behavioral profiling existsNetwork connection logging per containerv0.14.0
Test coverage on authAuth stack is comprehensive but test density unclearAudit test coverage, target 90%+ on auth pathsv0.13.0
Security scanning in CINot visible in changelogTrivy/Grype on container images, Semgrep on sourcev0.13.0
Dependency auditNot visiblepip-audit, npm audit in CI, SBOM generationv0.13.0
OTEL semantic conventionsGovernance telemetry is useful but not yet formalized as a stable contractDefine MCP-aware OTEL conventions for provider/tool/user/session/policy/enforcement attributesv0.13.0DONE (v6.0 Phase 31)
Trace context propagationCross-system traces depend on ad hoc correlationStandardize agent -> Hangar -> provider trace propagation for audit and enforcement pathsv0.13.0DONE (v6.0 Phase 32)
Operator enforcement loopOperator reconciles state, but not full governance postureMake operator the primary engine for capability enforcement, NetworkPolicy rollout, and violation signalingv0.13.0
Admission/policy hooksK8s integration is not yet policy-driven enoughValidate and reject unsafe specs before runtime using admission and policy integrationsv0.13.0
Import boundary enforcementNo CI rule prevents core from importing enterpriseAdd CI check: src/ must never import from enterprise/v0.13.0

Important (before first paying customer)

AreaGapActionTarget versionStatus
Helm chart securityBasicPod Security Standards, network policies, RBAC scopingv0.14.0
Upgrade pathNo migration guide between versionsDocumented upgrade procedure, DB migration toolingv0.14.0
Performance benchmarksBatch benchmark exists, nothing elseLatency overhead of proxy path, max providers per instancev0.14.0
Error handling auditException hygiene improved in v0.11.0Full audit of error surfaces exposed to usersv0.14.0
OTLP completenessTraces exist, but partner story needs explicit completeness across telemetry typesEnsure security-relevant traces, metrics, and logs/audit signals are exportable through OTLPv0.14.0DONE (v6.0 Phase 33)
Integration recipesOTEL partner story is implied, not operationalizedPublish reference deployments for OpenLIT, OTEL Collector, Langfuse, and Grafanav0.14.0DONE (v6.0 Phase 34)
License key infrastructureNo mechanism to activate Pro/EnterpriseImplement license key validation in bootstrap; enterprise modules load conditionallyv0.14.0

Nice-to-have (H2 2026)

AreaGapAction
Cosign/notation image verificationNot implementedAdd to container provider startup path
Seccomp profilesNot shippedCreate and ship default MCP server seccomp profile
Multi-cluster federationNot implementedDesign doc first, implement when demand validated
SCIM provisioningNot implementedEnterprise tier only

7. Version Plan

VersionTarget DateThemeKey Deliverables
v0.13.02026-04-15Kubernetes Enforcement Foundation + LicensingCapability declaration schema, operator enforcement loop, K8s NetworkPolicy generation, admission/policy hooks, CI security scanning, auth test hardening, OTEL semantic conventions, trace propagation, BSL licensing in place, enterprise/ directory created, Pro/Enterprise features migrated
v0.14.02026-05-15Behavioral Profiling AlphaNetwork connection logging per container, behavioral baseline storage, deviation alerting, dashboard auth enforcement, OTLP completeness, partner integration recipes, violation/enforcement signal modeling, license key infrastructure
v0.15.02026-06-15Identity & AuditCaller identity propagation, identity-aware audit trail, compliance export (CEF/JSON-lines), cost attribution MVP
v0.16.02026-07-15Semantic Analysis AlphaCall sequence pattern engine, pre-built detection rules (exfiltration, escalation, recon), dashboard integration
v1.0.02026-09-01Production ReleaseStability, documentation, upgrade tooling, performance benchmarks, public launch

v1.0.0 criteria

  • [ ] All P0 items from Phases 1-3 complete and tested
  • [ ] K8s operator passes CIS benchmark (scoped)
  • [ ] Docker provider default-deny egress enforced
  • [ ] Auth stack test coverage ≥ 90%
  • [ ] CI: Trivy, Semgrep, pip-audit, npm-audit green
  • [ ] Upgrade path documented from v0.12 → v1.0
  • [ ] Performance: <5ms p99 overhead on proxy path
  • [ ] At least 3 production deployments validated
  • [ ] Landing page, documentation site, blog post ready
  • [ ] BSL licensing fully operational with license key validation
  • [ ] Import boundary CI check green (no enterprise imports in core)

8. Repository Structure (Current → Target)

Target layout after v0.13.0 migration

mcp-hangar/
├── LICENSE                    # MIT — applies to everything outside enterprise/
├── ROADMAP.md                 # Public roadmap
├── CLA.md                     # Contributor License Agreement for enterprise/ contributions

├── src/mcp_hangar/            # MIT — core control plane
│   ├── domain/                # DDD aggregates, value objects, events, contracts
│   │   ├── contracts/         # Interfaces consumed by enterprise/ (one-way dependency)
│   │   └── ...
│   ├── application/           # CQRS commands, queries, handlers, ports
│   │   ├── ports/             # Port interfaces consumed by enterprise/ (one-way dependency)
│   │   └── ...
│   ├── infrastructure/        # Core adapters (in-memory stores, Docker, K8s, OTEL)
│   └── server/                # MCP server, REST API, WebSocket, CLI, bootstrap
│       └── bootstrap/         # Conditionally loads enterprise/ modules when license present

├── enterprise/                # BSL 1.1 — advanced governance, enforcement, compliance
│   ├── LICENSE.BSL            # Business Source License 1.1
│   ├── auth/                  # RBAC, API key stores, JWT/OIDC, rate limiter, auth API
│   ├── policies/              # Tool Access Policy enforcement
│   ├── persistence/           # SQLite/Postgres event stores, durable saga state
│   ├── behavioral/            # Network profiling, baseline, deviation detection
│   ├── identity/              # Caller identity propagation, identity-aware audit
│   ├── compliance/            # SIEM export (CEF, LEEF, JSON-lines)
│   ├── finops/                # Cost attribution, token tracking
│   ├── semantic/              # Pattern engine, detection rules, rule DSL, scoring
│   │   └── rules/             # Pre-built detection rule packs
│   └── integrations/          # Langfuse adapter, future partner integrations

├── packages/
│   ├── operator/              # MIT — K8s operator (Go)
│   ├── helm-charts/           # MIT — Helm charts
│   └── ui/                    # Basic status views (MIT), full dashboard (enterprise/)

├── security/                  # Seccomp profiles, AppArmor, NetworkPolicy templates, detection rules
├── benchmarks/                # Performance benchmark suite
├── docker/                    # Provider container images
├── docs/                      # MkDocs documentation
│   └── internal/
│       └── PRODUCT_ARCHITECTURE.md  # This document
├── examples/                  # Quick starts, configs
├── monitoring/                # Grafana dashboards, Prometheus alerts
└── scripts/                   # Install, build, CI, migration

Import boundary rule

# CI check (must pass on every PR)
# Core must never depend on enterprise features
if grep -rn "from enterprise" src/; then
  echo "FAIL: core imports enterprise module"
  exit 1
fi

9. Competitive Intelligence — Key Gaps They Have

CompetitorWhat they lack (our opportunity)
ComposioNo runtime behavior verification. Auth is their auth, not yours. No audit trail export. No K8s operator.
Smithery"Config data is ephemeral" — zero runtime security. No governance. Community-submitted servers are unvetted.
Glama"Logging/traceability" is a bullet point, not a product. No behavioral profiling. No capability enforcement.
OpenLITExcellent AI observability and MCP telemetry partner. Missing: provider lifecycle control, runtime enforcement, failover/group management, capability verification, and MCP-native governance semantics. We should integrate through OTEL, not imitate the product surface.
MCP Gateway RegistryClosest to us. Has audit logs, RBAC, OTLP telemetry. Missing: behavioral profiling, capability verification, semantic analysis, identity propagation. Their OTLP is generic; ours is MCP-aware.
CData Connect AIEnterprise wrapper. Governance = their dashboard. No open source. No protocol-level understanding.

10. Decision Log

DateDecisionRationale
2026-03-24BSL 1.1 for enterprise features, MIT for core.One repo, full source transparency, legal protection against commercial free-riding. BSL→MIT conversion after 3 years per release keeps the project honest. Alternatives (dual repo, AGPL, feature flags) rejected — see licensing section.
2026-03-24Enterprise/ directory migration before v0.13.0.Licensing boundary must be established before enterprise features are developed further. Retrofitting is harder than doing it right from the start.
2026-03-24CLA required for enterprise/ contributions.BSL→MIT conversion requires licensing authority over all contributed code in the enterprise directory.
2026-03-23Docker/K8s first. Stdio is second-class for security features.Runtime security requires container isolation. Period.
2026-03-23Freeze Catalog API development.Not our market. Discovery is Smithery/Registry.
2026-03-23Integrate with OpenTelemetry-native observability tools (for example OpenLIT) instead of trying to replace them.Win on governance and enforcement, not on copying generic AI observability platforms.
2026-03-23Treat OTEL as a first-class product contract for partner integrations.Strong OTEL semantics let Hangar project governance telemetry into OpenLIT, Langfuse, Grafana, and other backends without product drift.
2026-03-23Kubernetes is the primary growth path; Docker follows, stdio is maintenance only.Operator-driven governance, NetworkPolicy, admission, and violation handling are where defensible product value lives.
2026-03-23Three-tier product model (Core/Pro/Enterprise).Need open source adoption funnel AND revenue path.
2026-03-23v1.0.0 target: September 2026.6-month window before major vendors enter MCP observability.
2026-03-23Position as "runtime security," not "control plane.""Control plane" is generic. "Runtime security and governance" is specific and defensible.

MCP Hangar · Released under MIT License.