Know What To Trust Before It Runs

MCP Trust Registry

Discover MCP servers, tools, and capabilities with structured trust data to evaluate what to use, what to ship, and what to connect into production.

10,000+

Public MCP servers scanned

22+

Security rules evaluated

More Than MCP — A Trust Registry for Agentic Systems

Attach structured context to each step of execution so teams can understand both actions and intent. Each step is enriched with Trust Context — including identifiers, capability metadata, ownership signals, and runtime behavior. Understand which tools were involved, what was invoked, and how execution actually behaved.

More Than MCP — A Trust Registry for Agentic Systems

Attach structured context to each step of execution so teams can understand both actions and intent. Each step is enriched with Trust Context — including identifiers, capability metadata, ownership signals, and runtime behavior. Understand which tools were involved, what was invoked, and how execution actually behaved.

More Than MCP — A Trust Registry for Agentic Systems

Attach structured context to each step of execution so teams can understand both actions and intent. Each step is enriched with Trust Context — including identifiers, capability metadata, ownership signals, and runtime behavior. Understand which tools were involved, what was invoked, and how execution actually behaved.

Built for the Teams Shaping the Agentic Ecosystem

The MCP Trust Registry supports different decisions across the agentic lifecycle, from discovery and development to deployment and governance.

Tab 1 of 4: Developers

Developers

Build with Better Starting Points

Discover MCP servers and tools with the trust data needed to evaluate them before they become part of your execution path.

See ownership and capability definitions

Understand what tools expose before you connect them

Compare components before building against them

Start with better signals than guesswork

Explore

Discover What You Can Build — and How It Will Behave

Evaluate MCP servers, tools, and capabilities before you use them — with the information needed to understand how they are likely to behave when agents invoke them.

See ownership and capabilities clearly

Understand how tools can be invoked

Spot risks and unintended usage paths

Evaluate components before using them

Build

Discover What You Can Build — and How It Will Behave

Connect agents to tools and MCP servers with clear visibility into capabilities, ownership, and expected behavior — so you avoid issues later in production.

Structure identity and capabilities early

Understand how agents will invoke tools

Catch exposure and config issues sooner

Build for production from the start

Understand

See How Agent Behavior Actually Unfolds

Follow execution across agents, tools, and MCP servers so you can understand what happened, what was invoked, and how actions propagated.

Trace execution end to end

See which tools were involved

See which tools were involved

Catch failures and unexpected behavior

Ship

Ship Agents That Are Ready for Real Use

Move from working prototype to production-ready workflow with clearer signals about what your agent is actually doing — so you can validate behavior, catch issues earlier, and ship with more confidence.

Validate behavior before shipping

Catch issues before production

Support CI/CD and automation workflow

Ship with more confidence

Understand how BlueRock evaluates MCP servers for security risks.

What the MCP Trust Registry Enables

Find Safer Components Earlier

Discover MCP servers and tools with the trust data needed to evaluate them before they enter your build or execution path.

Show That Your MCP Server Is Ready to Use

Generate structured trust data that helps teams understand ownership, capabilities, and operational posture.

Bring Trust Signals Into Execution

Feed registry data into BlueRock’s Trust Context Engine so trust signals can travel with tools, MCP servers, and connected components.

Use Trust Data in CI/CD and Automation

Bring structured trust data into platform workflows to guide what gets connected, promoted, and operated in production.

Use Trust Data Where Decisions Get Made

The MCP Trust Registry is designed to be used beyond the browser.

Teams can bring trust data into development workflows, CI/CD pipelines, and operational processes that shape what gets built, promoted, and connected into production.

That makes the registry useful not just for discovery, but for standardizing how MCP servers and tools are evaluated before they become part of shared execution paths.

  • Use trust data in CI/CD checks

  • Standardize MCP adoption workflows

  • Feed platform automation with better signals

  • Support production readiness decisions earlier

Generate Trust Data for Any MCP Server

BlueRock can analyze public or private MCP servers to generate the structured trust data needed for discovery, evaluation, and operational use.

This helps teams understand ownership, capability exposure, likely invocation patterns, and other signals that support safer adoption and better production decisions.

Scan a Public MCP Server

If you don't see a public MCP Server in the MCP Trust Registry, submit any public MCP server GitHub repo for a free, comprehensive security scan.

Get a Security Scan of Your Private MCP Server

Most enterprise MCP adoption is internal. Submit your private repo for the same 22-rule analysis. Get a full security report with code-level findings your team can act on immediately.

A Core Input to the Trust Context Engine

The MCP Trust Registry is one of the core sources of trust data used by BlueRock’s Trust Context Engine.

As agents invoke tools and MCP servers, registry data helps enrich execution with structured trust signals such as ownership, capability definitions, and other attributes needed to interpret and govern behavior more precisely.

That allows trust to travel with execution — improving both observability and guardrails across the Agentic Action Path.

Start Building With Better Trust Signals

Start Building With Better Trust Signals

Start Building With Better Trust Signals

The MCP Trust Registry scanned 10,000+ MCP servers. Here's what we found:

9.2%

of MCP servers have critical vulnerabilities

43%

of MCP servers have command injection flaws

36%

of MCP servers are vulnerable to SSRF

Common questions about
the MCP Trust Registry

Common questions about the MCP Trust Registry

What it scans, what it finds, and how to use it.

What is the MCP Trust Registry?

The MCP Trust Registry is BlueRock's security-focused registry for MCP servers — scanning public and private MCP server builds for vulnerabilities and tool inventory using 22+ security rules. Every scan delivers a risk rating (Low, Medium, High, or Critical), code-level findings with remediation guidance, and a full inventory of every tool the server exposes. Public MCP server scans are free.

How widespread are MCP security vulnerabilities?

BlueRock's analysis of 10,000+ public MCP servers found that 9.2% have critical vulnerabilities, 43% have command injection flaws, and 36% are vulnerable to SSRF. BlueRock's own research showed that an unbounded URI call in a widely-used MCP server (86,000+ stars) could be exploited to take over cloud infrastructure by fetching instance metadata credentials.

What does a Trust Registry scan actually check?

The Trust Registry evaluates MCP servers across 22+ security rules covering four categories: exposure and authentication (unrestricted endpoints, unsafe token handling, missing scopes), tool risk, data and egress (SSRF/unbounded outbound fetch, mass data extraction patterns), and runtime dependencies (unpinned packages, CVEs, injection sinks). Analysis is code-level — not heuristics or signatures.

Can I scan my private or internal MCP servers?

Yes. Private repo scanning is available for enterprise and internal MCP deployments. Submit your private GitHub repo for the same 22-rule analysis used on public servers and get a full security report with code-level findings and developer-ready remediation steps.

How is the MCP Trust Registry different from a standard security scanner?

Standard security scanners evaluate general code patterns. The MCP Trust Registry evaluates MCP-specific risk: tool exposure, destructive operation inventory, agentic execution context, and trust posture — mapped to the OWASP MCP Top 10, MAESTRO, and MITRE CWE. It's built for how MCP servers surface capabilities to AI agents, not just general code vulnerabilities.