Over the past few months weβve been running the MCP Trust Registry, an open scanning project looking at security posture across publicly available MCP server builds.
Weβve analyzed 8,000+ servers so far using 22 rules mapped to the OWASP MCP Top 10.
Some findings:
We just added private repo scanning for teams running internal MCP servers. Same analysis, same evidence depth. Most enterprise MCP adoption is internal, so this was the #1 request.
Interested to know what security review processes others have for MCP servers, if any. The gap we keep seeing isnβt intent, itβs that MCP is new enough that standard security gates havenβt caught up.
Happy to share methodology details or specific vuln patterns if useful.