The short version
Pipelock is a network proxy that scans HTTP, MCP, and WebSocket traffic for credential leaks, prompt injection, SSRF, and tool poisoning. Single binary, no dependencies.
Docker MCP Gateway runs MCP servers in isolated Docker containers with resource limits, network restrictions, and security controls. Part of Docker’s MCP ecosystem (Catalog + Profiles + Gateway).
Docker gives you container isolation and server management. Pipelock gives you content-level scanning. Container isolation protects the host from a compromised MCP server. Content scanning looks for credential leaks and injection in the traffic flowing through allowed connections.
Feature comparison
| Feature | Pipelock | Docker MCP Gateway |
|---|---|---|
| Architecture | Network proxy (single binary) | Container-isolated MCP gateway |
| Dependencies | None (static binary) | Docker runtime |
| DLP (credential scanning) | 48 built-in patterns, encoding-aware, env leak, entropy | --block-secrets (pattern matching) |
| Prompt injection detection | 25 patterns, 6-pass normalization | Not documented |
| Tool poisoning detection | Fingerprint + rug-pull drift detection | Not documented |
| SSRF protection | DNS rebinding, private IP, metadata blocking | --block-network, localhost auth tokens |
| HTTP forward proxy | Yes (fetch + forward + CONNECT + WebSocket) | No (MCP transport) |
| WebSocket scanning | Yes (bidirectional frame scanning) | Not documented |
| Container isolation | No (process-level sandbox) | Yes (per-server, capped resources) |
| MCP catalog | No | Yes (Docker Desktop integrated) |
| MCP profiles | No | Yes (shareable OCI artifacts) |
| OAuth handling | No | Yes (automatic) |
| Image verification | Binary integrity (Ed25519) | --verify-signatures, Docker Content Trust |
| Kill switch | Yes (4 independent sources) | Not documented |
| Rate limiting | Yes (per-domain sliding window) | Not documented |
| Data budgets | Yes (per-domain byte limits) | Not documented |
| Tamper-evident logging | Yes (hash-chained flight recorder) | Call tracing and logging |
| Process sandbox | Yes (Landlock + seccomp + netns) | N/A (containers) |
| Pricing | Free (Apache 2.0) | Included with Docker |
Where Docker MCP Gateway is better
Container isolation. Each MCP server runs in its own Docker container with capped resources and restricted host access. If a malicious MCP server tries to escape, it’s contained by Docker’s isolation. Pipelock’s sandbox uses Landlock, seccomp, and network namespaces at the process level, which is lighter but not container-grade isolation.
MCP Catalog. Docker Desktop includes a built-in catalog of containerized MCP servers. Browse, click, run. This makes discovering and deploying MCP servers straightforward for developers who already have Docker.
MCP Profiles. Named collections of MCP servers (e.g., “web-dev” = GitHub + Playwright + DB servers) that can be shared as OCI artifacts through container registries. Team-wide MCP configurations.
Automatic OAuth. Docker MCP Gateway handles OAuth flows for MCP servers that need authentication. No manual token configuration.
Image verification. --verify-signatures validates MCP server images before running them. Combined with Docker Content Trust, this provides supply chain verification for the server images themselves.
Distribution. Docker MCP Gateway ships with Docker and is integrated into Docker Desktop. That’s a significant distribution advantage. Pipelock requires separate installation.
Where Pipelock is better
Content scanning depth. Docker documents --block-secrets for secret detection. Pipelock’s DLP adds automatic base64, hex, and URL decoding on top of pattern matching, plus environment variable leak detection and entropy analysis.
Injection detection. Pipelock scans responses and MCP tool outputs for prompt injection through 6 normalization passes (NFKC, leetspeak decoding, vowel folding, optional-whitespace, base64/hex decode). In Docker’s public documentation reviewed in April 2026, I found container-level security controls but did not find content-level injection scanning documentation.
Tool poisoning and rug-pulls. Pipelock fingerprints MCP tool descriptions at session start and detects mid-session changes (rug-pulls). If a server changes its tool description to inject exfiltration instructions after the agent connects, Pipelock catches the drift.
HTTP and WebSocket coverage. Pipelock scans agent network traffic beyond MCP: HTTP forward proxy, HTTPS via CONNECT, WebSocket frames. If the agent fetches a URL or connects to a WebSocket endpoint, Pipelock scans that traffic too.
No Docker dependency. Pipelock is a single static binary that runs anywhere. No container runtime, no daemon. This matters for CI environments, production servers, and setups where Docker isn’t available.
The container-vs-content distinction
Container isolation answers: can this MCP server escape its sandbox?
Content scanning answers: is this MCP server leaking credentials or injecting instructions in the traffic it sends?
Both are valid security concerns. They cover different failure modes:
- A malicious server tries to read host files? Container isolation blocks it.
- A server’s response contains encoded credentials being exfiltrated? Content scanning can catch this. Container isolation alone may not address these content-layer scenarios.
- A server changes its tool description to inject instructions? Content scanning detects the rug-pull. Container isolation alone may not flag this because it’s valid MCP traffic at the transport layer.
Neither alone covers everything. Together, they’re defense in depth.
When to use each
Start here if you need both containment and content scanning. It combines local containment with content scanning across MCP, HTTP, and WebSocket, without needing Docker.
Use Docker MCP Gateway if: You already run MCP servers in Docker and specifically want per-server container isolation, Catalog, Profiles, OAuth handling, or image-signature verification. It’s primarily a container and runtime boundary. For content-level traffic inspection, see Pipelock’s scanning pipeline.
Use both if: Docker is your MCP runtime and you want Pipelock to add content scanning, tool-description drift detection, and broader HTTP/WebSocket coverage.
Third-party feature descriptions are based on public materials reviewed in April 2026. Features and capabilities may change. Check each project’s current documentation for the latest.
Further reading
- What is an agent firewall? : full definition and evaluation checklist
- MCP Security : MCP-specific threats and how scanning addresses them
- Pipelock vs NemoClaw : another container sandbox comparison
- Docker MCP Gateway Documentation
- Pipelock on GitHub