First Trusted MCP server running on AWS Nitro Enclave Trusted Execution Environment
{
"mcpServers": {
"trusted-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
First Trusted MCP server running on AWS Nitro Enclave Trusted Execution Environment
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 369 days ago. 15 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
MCP Server for GCP environment for interacting with various Observability APIs.
MCP Server for kubernetes management commands
Model Context Protocol (MCP) server for Kubernetes and OpenShift
The power of Claude Code / GeminiCLI / CodexCLI + [Gemini / OpenAI / OpenRouter / Azure / Grok / Ollama / Custom Model / All Of The Above] working as one.
MCP Security Weekly
Get CVE alerts and security updates for Trusted Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
This is a gmail MCP server running inside a secure AWS Nitro enclave instance. It was originally forked from the Claude Post MCP server. Most MCP servers are run locally via the stdio transport; we followed this guide to implement a remote MCP server using sse transport.
To use this MCP server, you will need an app-specific password.
Then simply add the following block to your client's mcp.json file.
"gmail_mcp": {
"url": "https://gmail.mcp.freysa.ai/sse/?ADDR=<your.email@gmail.com>&ASP=<your app-specific password>"
}
Note that you might have to restart your client.
This implementation is a proof of concept. Passing app-specific passwords in URLs is not a secure pattern because:
Unfortunately, current MCP clients have limitations on how they connect to servers. At the moment of release, MCP specification does not define a standard authentication mechanism for SSE servers. This means we can't use more secure patterns like bearer tokens or other authorization headers that would normally be preferred.
For additional security, consider:
AWS Nitro Enclaves provide isolated compute environments that enhance security through hardware-based attestation. When code runs in a Nitro Enclave, the platform generates cryptographic measurements of the code's identity and state. These measurements serve as a verifiable guarantee that the code has not been modified and is executing exactly as intended, protecting against tampering or unauthorized modifications. For more information, see this blog post.
We use Nitriding to quickly deploy code in an AWS Nitro TEE.
To verify that the intended codebase is the one running in our TEE, you must reproduce running it in an AWS Nitro enclave yourself. Instructions to do so are below. Once you have it running, you can verify it using this repository as follows.
cd verifier
pnpm install && pnpm run build
cd mcp/react-ts-webpack
pnpm i && pnpm run dev
http://localhost:8080/ in your browser. You will be prompted to add two fields(a) the PCR2 hash, which is a hash of the codebase
(b) the Code attestation, which is signed by AWS
You can reproduce running this server in a TEE as follows.
Use the AWS EC2 console to select a sufficiently large instance and be sure to enable Nitro.
Make sure that the ports needed by your application are open by checking the security group, in "security" tab of the instance in the ec2 console.
Clone this repo to your ec2 instance.
Run the setup script to download all necessary dependencies.
sudo /setup.sh
sudo nano /etc/nitro_enclaves/allocator.yaml
sudo systemctl restart nitro-enclaves-allocator.service
make
make run
To actually use the MCP server, you will also need to run the gvproxy, as follows.
screen
./gvpro
... [View full README on GitHub](https://github.com/0xfreysa/trusted-mcp-server#readme)