3 articles in this track

Frequently Asked Questions

What security risks do MCP servers create?

MCP servers give agents direct tool access, read/write to CRMs, databases, APIs. A malicious or poorly built server can exfiltrate data, execute unauthorized actions, or introduce supply chain vulnerabilities through compromised dependencies. The attack surface scales with every server you install.

What is the MCP Trust Framework?

The MCP Trust Framework (MTF) is an open security standard for evaluating MCP servers. It defines trust levels from untrusted through verified, assessing dependency security, permission scoping, code quality, and behavioral boundaries. MTF is published at mpaktrust.org and enforced by the mpak registry.

How does mpak enforce security?

Every MCP server published to mpak.dev undergoes automated security scanning: dependency audit (known vulnerabilities), permission analysis (what the server can access), code review signals (malicious patterns), and MTF trust level assignment. Enterprises can filter servers by trust level.

Can I use MCP servers from other registries safely?

With caution. Most MCP server registries today have no security scanning. NimbleBrain recommends auditing any third-party server before deployment: check dependencies, review source code, scope permissions, and test in isolation. Or use mpak.dev where this is done for you.

What should enterprises require before deploying an MCP server?

Four things: dependency audit (no known CVEs), permission scoping (server only accesses what it needs), source code review (no data exfiltration or backdoors), and an MTF trust level assessment. Treat MCP servers like you treat npm packages, with healthy skepticism and automated scanning.

Ready to go deeper?

Or email directly: hello@nimblebrain.ai