The short version

Pipelock is a network proxy that scans HTTP, MCP, and WebSocket traffic for credential leaks, prompt injection, SSRF, and tool poisoning. Single binary, no dependencies.

Docker MCP Gateway runs MCP servers in isolated Docker containers with resource limits, network restrictions, and security controls. Part of Docker’s MCP ecosystem (Catalog + Profiles + Gateway).

Docker gives you container isolation and server management. Pipelock gives you content-level scanning. Container isolation protects the host from a compromised MCP server. Content scanning looks for credential leaks and injection in the traffic flowing through allowed connections.

Feature comparison

FeaturePipelockDocker MCP Gateway
ArchitectureNetwork proxy (single binary)Container-isolated MCP gateway
DependenciesNone (static binary)Docker runtime
DLP (credential scanning)48 built-in patterns, encoding-aware, env leak, entropy--block-secrets (pattern matching)
Prompt injection detection25 patterns, 6-pass normalizationNot documented
Tool poisoning detectionFingerprint + rug-pull drift detectionNot documented
SSRF protectionDNS rebinding, private IP, metadata blocking--block-network, localhost auth tokens
HTTP forward proxyYes (fetch + forward + CONNECT + WebSocket)No (MCP transport)
WebSocket scanningYes (bidirectional frame scanning)Not documented
Container isolationNo (process-level sandbox)Yes (per-server, capped resources)
MCP catalogNoYes (Docker Desktop integrated)
MCP profilesNoYes (shareable OCI artifacts)
OAuth handlingNoYes (automatic)
Image verificationBinary integrity (Ed25519)--verify-signatures, Docker Content Trust
Kill switchYes (4 independent sources)Not documented
Rate limitingYes (per-domain sliding window)Not documented
Data budgetsYes (per-domain byte limits)Not documented
Tamper-evident loggingYes (hash-chained flight recorder)Call tracing and logging
Process sandboxYes (Landlock + seccomp + netns)N/A (containers)
PricingFree (Apache 2.0)Included with Docker

Where Docker MCP Gateway is better

Container isolation. Each MCP server runs in its own Docker container with capped resources and restricted host access. If a malicious MCP server tries to escape, it’s contained by Docker’s isolation. Pipelock’s sandbox uses Landlock, seccomp, and network namespaces at the process level, which is lighter but not container-grade isolation.

MCP Catalog. Docker Desktop includes a built-in catalog of containerized MCP servers. Browse, click, run. This makes discovering and deploying MCP servers straightforward for developers who already have Docker.

MCP Profiles. Named collections of MCP servers (e.g., “web-dev” = GitHub + Playwright + DB servers) that can be shared as OCI artifacts through container registries. Team-wide MCP configurations.

Automatic OAuth. Docker MCP Gateway handles OAuth flows for MCP servers that need authentication. No manual token configuration.

Image verification. --verify-signatures validates MCP server images before running them. Combined with Docker Content Trust, this provides supply chain verification for the server images themselves.

Distribution. Docker MCP Gateway ships with Docker and is integrated into Docker Desktop. That’s a significant distribution advantage. Pipelock requires separate installation.

Where Pipelock is better

Content scanning depth. Docker documents --block-secrets for secret detection. Pipelock’s DLP adds automatic base64, hex, and URL decoding on top of pattern matching, plus environment variable leak detection and entropy analysis.

Injection detection. Pipelock scans responses and MCP tool outputs for prompt injection through 6 normalization passes (NFKC, leetspeak decoding, vowel folding, optional-whitespace, base64/hex decode). In Docker’s public documentation reviewed in April 2026, I found container-level security controls but did not find content-level injection scanning documentation.

Tool poisoning and rug-pulls. Pipelock fingerprints MCP tool descriptions at session start and detects mid-session changes (rug-pulls). If a server changes its tool description to inject exfiltration instructions after the agent connects, Pipelock catches the drift.

HTTP and WebSocket coverage. Pipelock scans agent network traffic beyond MCP: HTTP forward proxy, HTTPS via CONNECT, WebSocket frames. If the agent fetches a URL or connects to a WebSocket endpoint, Pipelock scans that traffic too.

No Docker dependency. Pipelock is a single static binary that runs anywhere. No container runtime, no daemon. This matters for CI environments, production servers, and setups where Docker isn’t available.

The container-vs-content distinction

Container isolation answers: can this MCP server escape its sandbox?

Content scanning answers: is this MCP server leaking credentials or injecting instructions in the traffic it sends?

Both are valid security concerns. They cover different failure modes:

Neither alone covers everything. Together, they’re defense in depth.

When to use each

Start here if you need both containment and content scanning. It combines local containment with content scanning across MCP, HTTP, and WebSocket, without needing Docker.

Use Docker MCP Gateway if: You already run MCP servers in Docker and specifically want per-server container isolation, Catalog, Profiles, OAuth handling, or image-signature verification. It’s primarily a container and runtime boundary. For content-level traffic inspection, see Pipelock’s scanning pipeline.

Use both if: Docker is your MCP runtime and you want Pipelock to add content scanning, tool-description drift detection, and broader HTTP/WebSocket coverage.

Third-party feature descriptions are based on public materials reviewed in April 2026. Features and capabilities may change. Check each project’s current documentation for the latest.

Further reading

Ready to get started?