Checkpoint.AspNet
0.3.1
See the version list below for details.
dotnet add package Checkpoint.AspNet --version 0.3.1
NuGet\Install-Package Checkpoint.AspNet -Version 0.3.1
<PackageReference Include="Checkpoint.AspNet" Version="0.3.1" />
<PackageVersion Include="Checkpoint.AspNet" Version="0.3.1" />
<PackageReference Include="Checkpoint.AspNet" />
paket add Checkpoint.AspNet --version 0.3.1
#r "nuget: Checkpoint.AspNet, 0.3.1"
#:package Checkpoint.AspNet@0.3.1
#addin nuget:?package=Checkpoint.AspNet&version=0.3.1
#tool nuget:?package=Checkpoint.AspNet&version=0.3.1
ASP.NET (System.Web) HTTP module for AI agent detection and policy enforcement. Drop-in IHttpModule that detects AI agents using the same Rust-compiled WASM engine as AgentShield's Next.js, Express, and .NET Core packages — classic ASP.NET / MVC 5 / Web API 2 / Web Forms consumers get identical detection behavior to modern .NET consumers. Register via Web.config; zero code changes required.
| Product | Versions Compatible and additional computed target framework versions. |
|---|---|
| .NET Framework | net462 is compatible. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
-
.NETFramework 4.6.2
- Checkpoint.Core (>= 0.3.1)
NuGet packages (1)
Showing the top 1 NuGet packages that depend on Checkpoint.AspNet:
| Package | Downloads |
|---|---|
|
KyaOs.Checkpoint
AI agent detection and policy enforcement for any .NET HTTP server. Install this metapackage and NuGet automatically pulls in the right adapter for your runtime: Checkpoint.AspNetCore on modern .NET (ASP.NET Core 6+), or Checkpoint.AspNet on classic .NET Framework 4.6.2+ (System.Web / IIS). Same WASM-backed Rust detection engine on both stacks — same patterns, same scoring, same updates. |
GitHub repositories
This package is not used by any popular GitHub repositories.
| Version | Downloads | Last Updated |
|---|---|---|
| 0.4.0 | 38 | 4/22/2026 |
| 0.3.3 | 43 | 4/21/2026 |
| 0.3.2 | 85 | 4/21/2026 |
| 0.3.1 | 89 | 4/18/2026 |
| 0.3.0 | 92 | 4/18/2026 |
| 0.2.9 | 87 | 4/18/2026 |
| 0.2.8 | 84 | 4/17/2026 |
| 0.2.7 | 92 | 4/17/2026 |
| 0.2.6 | 84 | 4/17/2026 |
| 0.2.5 | 81 | 4/17/2026 |
| 0.2.4 | 93 | 4/17/2026 |
| 0.2.3 | 92 | 4/17/2026 |
| 0.2.2 | 99 | 4/15/2026 |
| 0.2.1 | 91 | 4/15/2026 |
| 0.2.0 | 98 | 4/15/2026 |
0.3.1 — Block/Instruct response no longer leaks bad McpServerUrl
Follow-up to 0.3.0. The redirect branches in 0.3.0 correctly refused to
302 to a relative or non-http(s) McpServerUrl, but the block-response
body (PlainText "MCP Server: /connect/x" line, JSON "mcp_server" field)
and Instruct response still propagated the bad URL to the agent. An LLM
fetcher would relay the broken instructions to the user verbatim.
Changes:
* WritePlainTextResponseAsync (AspNetCore): McpServerUrl is gated through
UrlHelpers.IsAbsoluteHttpUrl — relative / non-http values are dropped
from the body and the agent gets the "contact site owner" fallback.
* WriteJsonResponseAsync (AspNetCore) + WriteBlockedJsonResponse (AspNet):
the "mcp_server" / "mcpServer" field is omitted (along with the
"instructions" sentence) when McpServerUrl is not an absolute http(s)
URL.
* WriteJsonResponseAsync + WriteInstructResponseAsync (AspNetCore):
switched from WriteAsJsonAsync to JsonSerializer.Serialize +
response.WriteAsync. The streaming serializer requires the response
body PipeWriter to implement UnflushedBytes, which TestServer's pipe
writer doesn't — every JSON-mode test in the AspNetCore suite was
silently throwing into FailOpen and falling through to the route
handler. Buffering matches what the AspNet adapter already does, and
resolves the four pre-existing test failures inherited from earlier
releases.
7 new tests in CheckpointMiddlewareTests covering Json/PlainText
McpServerUrl omission across path-relative, schemeless, protocol-relative,
javascript:, and ftp:// inputs. AspNetCore suite now 20/20 green
(was 9/13).