Free community initiative by BlueRock

MCP Trust Registry
Security Ratings for MCP Servers

The MCP Trust Registry scans MCP server builds for security vulnerabilities and tool inventory with code-level evidence and remediation guidance.

Free community initiative by BlueRock

MCP Trust Registry
Security Ratings for MCP Servers

The MCP Trust Registry scans MCP server builds for security vulnerabilities and tool inventory with code-level evidence and remediation guidance.

Service Image
Service Image

9,000+

9,000+

9,000+

Public servers scanned

Tool classification by risk

Tool classification by risk

9.2%

9.2%

9.2%

Have critical vulnerabilities

MCP makes building easy. That doesn’t make it safe.

MCP servers have become the standard for how agents execute tools. Organizations are replacing exposed API services with outcome-oriented MCP tools to accelerate agentic development.


But MCP servers are simple to build — and that simplicity masks real security gaps. Last month, BlueRock published research showing how an unbounded URI call in Microsoft’s Markitdown MCP server (86,000+ stars) could take over cloud infrastructure by fetching instance metadata credentials.


Our analysis of 9,000+ public MCP servers found 36.7% have the same vulnerability.

The gap isn’t intent — it’s visibility. Teams want to build the right way. They need the tools to verify it.

The MCP Trust Registry scanned 9,000+ MCP servers.

Here's what we found:

9.2%

9.2%

9.2%

of MCP servers have critical vulnerabilities

Nearly 1 in 10 servers your agents touch are compromised.

43%

43%

43%

of MCP servers have command injection flaws

Happens below the gateway layer.

36.7%

36.7%

36.7%

MCP servers are vulnerable to SSRF

One request to reach your internal network.

What You Get in Every MCP Trust Scan Result

Risk rating: Low, Medium, High, or Critical with severity rationale.

Deep findings: Impacted rules and vulnerability explanations.

Tool inventory: Every tool exposed by the server, including destructive operations.

Rescan on release changes, full trend view.

Developer + admin steps.

Scan any MCP server. Public or yours.

Browse the Public Registry

Search 9,000+ public MCP server builds. See risk ratings, vulnerability details, and remediation guidance before you connect a server to your agent.

Submit Your Own Build

Most enterprise MCP adoption is internal. Submit your private repo for the same 22-rule analysis. Get a full security report with code-level findings your team can act on immediately.

Same analysis. Same rules. Same remediation guidance — whether the repo is public or yours.

Request Private MCP Server Repository Scan

Choose safe MCP servers and tools before you connect.

Scroll to see the full scan results.

Scroll to see the full scan results.

Scroll to see the full scan results.

Full MCP Registry scan showing scorecard, findings, and tools

What the Trust Registry Evaluates

22 security rules. Code-level evidence.

Exposure & Authentication

  • Unrestricted endpoints

  • Unsafe token/secret handling

  • Missing scopes, overbroad permissions

Tool Risk

  • Dangerous verbs (delete/drop/export)

  • Tool namespace collisions

  • User input sanitization failures

Data & Egress

  • Unbounded outbound fetch (SSRF)

  • Lack of egress controls

  • Mass data extraction patterns

Runtime & Dependencies

  • Unpinned packages + CVEs

  • Sandbox/exec risks

  • Deserialization / injection sinks

BlueRock MCP Trust Registry FAQ

What is the MCP Trust Registry?

The MCP Trust Registry is a catalog of MCP servers and tools with security-focused scorecards. Each entry captures exposed tools, read/write capabilities, likely risks (e.g., RCE, data exfil, full-schema poisoning), and practical remediation notes so you can decide what’s safe to wire into your agents.

How do you assess risk for MCP servers and tools?

We combine static and runtime-informed checks: tool discovery, permission analysis (read vs write, destructive verbs), configuration drift, and exposure to known vulnerability patterns from OWASP agentic/LLM work and real-world MCP incidents. The output is a risk band plus concrete guidance, not just a vague score.

Can I use the registry without deploying BlueRock?

A: Yes. You can use the MCP Trust Registry as a standalone reference to vet servers and tools before you connect them. When you do deploy BlueRock, registry entries can seed allow-lists and guardrails so the tools you approve are automatically governed at runtime.

How often are registry entries updated?

A: Entries are periodically updated as new vulnerabilities, configuration changes, or tool behaviors emerge. Our goal is to keep the registry aligned with current MCP exploits and agentic attack research, not just a one-time scan.

How does this help with “shadow” or unknown MCP usage?

The registry helps you evaluate known MCP servers up front, and BlueRock’s runtime visibility helps you discover servers, tools, and agents that slipped in outside formal review. Together, they close the gap between what you think is connected and what’s actually in use in production.