Deterministic CI scanner and surface-risk scoring for MCP (Model Context Protocol) servers.
{
"mcpServers": {
"mcp-trust-kit": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Deterministic CI scanner and surface-risk scoring for MCP (Model Context Protocol) servers.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
Apache-2.0. View license →
Is it maintained?
Last commit 8 days ago. 52 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Dynamic problem-solving through sequential thought chains
A Model Context Protocol server for searching and analyzing arXiv papers
An open-source AI agent that brings the power of Gemini directly into your terminal.
The official Python SDK for Model Context Protocol servers and clients
MCP Security Weekly
Get CVE alerts and security updates for MCP Trust Kit and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Deterministic surface-risk scoring for MCP servers.
MCP Trust Kit scans a local MCP server over stdio, discovers its tools, runs deterministic
checks for protocol and tool hygiene plus risky exposed capabilities, calculates a score from
0..100, and emits terminal, JSON, and SARIF output that fits cleanly into CI. JSON and SARIF
include an explicit scan_timestamp field for downstream consumers.
MCP Trust Kit scores surface risk, not business intent.
A low score means the exposed tool surface deserves review. It does not mean a server is malicious. A high score means fewer deterministic findings. It does not mean a server is safe.
MCP servers expose tools to agents. That makes two questions worth automating before adoption:
MCP Trust Kit is intentionally narrow. It is not a security platform, a gateway, a hosted
service, or a certification authority. It is a deterministic scanner with stable output.
Today the scanner penalizes two broad classes of issues:
It does not score:
Scan the included insecure demo server:
python -m venv .venv
source .venv/bin/activate
pip install -e .[dev]
mcp-trust scan --cmd python examples/insecure-server/server.py
Generate JSON and SARIF and enforce a score gate:
mcp-trust scan \
--min-score 80 \
--json-out mcp-trust-report.json \
--sarif mcp-trust-report.sarif \
--cmd python examples/insecure-server/server.py
The scanner launches --cmd directly without a shell. In practice that means python, npx,
uvx, or a compiled binary can all work, as long as you pass the real executable name and args.
python -m venv .venv
.\.venv\Scripts\Activate.ps1
pip install -e .[dev]
.\.venv\Scripts\mcp-trust scan --cmd .\.venv\Scripts\python examples\insecure-server\server.py
Validated examples are documented in docs/validated-servers.md.
Safe-ish public case:
mcp-trust scan --cmd npx -y @modelcontextprotocol/server-memory@2026.1.26
Risky but legitimate public case:
mkdir -p .tmp-mcp-fs
mcp-trust scan --cmd npx -y @modelcontextprotocol/server-filesystem@2026.1.14 .tmp-mcp-fs
On Windows, use npx.cmd instead of npx when needed.
Drop this workflow into your repository:
name: MCP Trust Scan
on:
pull_request:
workflow_dispatch:
permissions:
contents: read
security-events: write
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Run MCP Trust Kit
uses: aak204/MCP-Trust-Kit@v0.5.0
with:
cmd: python path/to/your/s
... [View full README on GitHub](https://github.com/aak204/MCP-Trust-Kit#readme)