check-comms-security
Validate communication security posture before transmitting. Gates on mTLS, firmware signature, replay protection, and certificate pinning. Blocks transmission if security requirements unmet. VHF/ADS-B always pass (unencrypted by aviation regulation).
Taxonomy
Linnaean classification joined from the algovigilance taxonomy index via the parent config's rank.
| Rank | Value |
|---|---|
| domain | Substrata |
| kingdom | Constructa |
| phylum | Configa |
| class | station-config |
| order | comms |
| family | mcp-tool-config |
Characteristics:
- substrate:
config - domain:
pv - lifecycle:
continuous - authority:
read - compounding:
producer - io:
agent-request→tool-response
Input schema
link_typestringrequired — Link type: ble_5, wifi_6e, fiveg_modem, lora_sx1276, iridium_certus, vhf_radio, adsb_outmtls_activeboolean — Whether mTLS handshake is establishedfirmware_signedboolean — Whether modem firmware signature verified at bootreplay_nonce_validboolean — Whether replay protection nonce counter is currentcertificate_pinnedboolean — Whether TLS certificate is pinned to known CA
Example call
POST /api/mcp
Content-Type: application/json
{
"jsonrpc": "2.0",
"id": 1,
"method": "tools/call",
"params": {
"name": "station__comms-systems__check-comms-security",
"arguments": {
"link_type": ""
}
}
}How to invoke from a client
From any MCP-aware client, add https://algovigilance.com/api/mcp as an MCP server, then call this tool by name. From a raw HTTP client, send the JSON-RPC body above to /api/mcp.
Agent-friendly formats
Working inside an AI assistant? Use the Copy for AI button at the top of this page (or view the raw Markdown) to paste a clean, token-budgeted version of this tool's contract into your conversation.
Related
- All tools (3059 live)
- /api/mcp — endpoint
- /AGENTS.md — agent guide
- /tools/comms-systems__check-comms-security/raw.md — this page's Markdown twin