MCP Server for Agent Reputation & Trust Scoring
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"agent-trust": {
"url": "https://agent-trust.radi.pro/mcp"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Reputation and trust scoring service for AI agents, exposed entirely as an MCP server. Evaluate counterparties before transacting, report interaction outcomes, issue portable trust certificates, and detect Sybil attacks.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security / ai-ml
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
An open-source AI agent that brings the power of Gemini directly into your terminal.
Workspace template + MCP server for Claude Code, Codex CLI, Cursor & Windsurf. Multi-agent knowledge engine (ag-refresh / ag-ask) that turns any codebase into a queryable AI assistant.
MCP Security Weekly
Get CVE alerts and security updates for io.github.raditotev/agent-trust and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Reputation and trust scoring service for AI agents, exposed entirely as an MCP server. Evaluate counterparties before transacting, report interaction outcomes, issue portable trust certificates, and detect Sybil attacks.
Add AgentTrust to your MCP client configuration:
{
"mcpServers": {
"agent-trust": {
"url": "https://agent-trust.radi.pro/mcp"
}
}
}
Or for local development via stdio:
{
"mcpServers": {
"agent-trust": {
"command": "uv",
"args": ["run", "python", "-m", "agent_trust.server"]
}
}
}
register_agent(display_name="my-agent", capabilities=["search", "summarize"])
Response:
{
"agent_id": "550e8400-e29b-41d4-a716-446655440000",
"source": "standalone",
"scopes": ["trust.read", "trust.report"],
"created": true,
"public_key_hex": "a1b2c3...",
"private_key_hex": "d4e5f6...",
"warning": "Key pair auto-generated. Store private_key_hex securely."
}
Store the private_key_hex immediately -- it is shown only once.
generate_agent_token(
agent_id="550e8400-...",
private_key_hex="d4e5f6..."
)
Response:
{
"access_token": "eyJ...",
"expires_at": "2026-03-20T13:00:00+00:00",
"ttl_minutes": 60,
"agent_id": "550e8400-..."
}
check_trust(agent_id="counterparty-uuid")
report_interaction(
counterparty_id="counterparty-uuid",
interaction_type="transaction",
outcome="success",
access_token="eyJ..."
)
Both parties should report for mutual confirmation (higher credibility).
AgentTrust supports two MCP transports:
| Transport | Use case | Endpoint |
|---|---|---|
| Streamable HTTP | Remote agents, production | https://agent-trust.radi.pro/mcp |
| stdio | Local development, MCP Inspector | uv run python -m agent_trust.server |
AgentTrust supports two authentication methods. Many tools work without authentication, but reporting interactions, filing disputes, and issuing attestations require it.
Obtain a bearer token from AgentAuth and pass it as access_token. This provides the full set of scopes:
| Scope | Grants |
|---|---|
trust.read | Score breakdowns, pending confirmations |
trust.report | Report and confirm interactions |
trust.dispute.file | File disputes |
trust.dispute.resolve | Resolve disputes (arbitrators) |
trust.attest.issue | Issue signed attestations |
trust.admin | Alert subscriptions |
Register with `