Trust Infrastructure for
MCP Servers

Publish, certify, and run Model Context Protocol servers with confidence. Automated security analysis, deterministic scoring, and policy enforcement — all built in.

14 vulnerability classes 4 certification levels Open source

MCP Hub Platform is a trust infrastructure for the Model Context Protocol ecosystem. It provides an end-to-end pipeline from source code to certified execution: developers publish, the hub certifies, the registry distributes, and the client executes — all with security guarantees.

How It Works

A five-stage pipeline that takes MCP servers from source code to certified, sandboxed execution.

1

Ingest

Source code is submitted via Git repository, webhook, or CLI upload. The hub validates the manifest and prepares for analysis.

2

Analyze

The scanner runs 46+ security detectors across 14 vulnerability classes. Findings are mapped to security controls with evidence.

3

Certify

A deterministic score (0-100) is computed from analysis results and maps to a certification level (0-3). An immutable security snapshot is created.

4

Distribute

Certified artifacts are published to the registry with content-addressed digests, SBOMs, and attestation metadata.

5

Execute

The client downloads, verifies integrity, and runs packages inside sandboxed environments with policy enforcement and resource limits.

Certification Levels

Every artifact is assigned a certification level based on automated security analysis. Organizations can set minimum levels as policy.

0
Integrity Verified
Any Score

Digest validation and schema checks passed. The artifact is what the publisher claims it is.

1
Static Verified
Score >= 60

Basic static analysis completed. No critical vulnerabilities found in initial security scan.

2
Security Certified
Score >= 80

Full analysis with evidence artifacts. Security controls verified with attestation and SBOM.

3
Runtime Certified
Score >= 90

Dynamic analysis verified at runtime. The highest level of trust for production environments.

Every certified artifact includes an immutable security snapshot with findings, controls mapping, SBOM, and attestation.

Built for Security Teams

Everything you need to govern MCP server usage across your organization.

Content Addressing

Every artifact is identified by its SHA-256 digest. Immutable, verifiable, tamper-proof distribution.

Policy Enforcement

Set minimum certification levels, block untrusted origins, and enforce resource limits at the organization level.

Vulnerability Detection

14 vulnerability classes including prompt injection, data exfiltration, privilege escalation, and supply chain attacks.

Process Sandboxing

MCP servers run inside platform-specific sandboxes with network, filesystem, and resource isolation.

SBOM & Attestation

Automatic Software Bill of Materials generation and cryptographic attestation for every certified artifact.

Enterprise Governance

Organization management, role-based access, audit logs, SSO integration, and centralized policy control.

Get Started

Everything you need to start securing your MCP server ecosystem.

Quick Start

Get the full platform running in 5 minutes with Docker Compose. From zero to certified in one command.

Read more

Tutorials

Step-by-step guides for publishing servers, setting up organizations, enforcing policies, and self-hosted deployment.

Read more

Deployment

Production deployment guides for Docker Compose and Kubernetes with full configuration reference and best practices.

Read more