Rule catalog

What goes into a trust score.

Every scan runs every rule that applies to what we could observe. Perimeter rules run on every scan; post-handshake rules require a successful MCP initialize / tools/list; auth-discovery rules apply only when the server requires authentication. Read the methodology for how scores are aggregated and verdicts decided.

Rules
61
Always evaluated
11
Perimeter
Post-handshake
41
Need MCP probe
Critical hard-fails
5
Force a block
Severity mix5critical16high20medium13low7info· Auth-required (only on auth-walled servers)9
01 · Category

Transport security

How the server is reached on the wire. Covers TLS and protocol-level confidentiality of probe traffic.

10 rules · 40 weight
03 · Category

Tool surface risk

What an agent could do if it trusted every advertised tool. Covers destructive actions, credential disclosure, code execution, filesystem mutation, PII handling, prompt-injection-shaped input fields, and injection-bearing tool descriptions — i.e. the agent-specific threat surface, not just generic verb risk.

Post-handshake. Requires a successful MCP `initialize` / `tools/list`. Skipped on perimeter-only scans where the server refused or failed the MCP handshake.

20 rules · 141 weight
04 · Category

Schema quality

Whether the tool surface is reviewable without invoking it. Tools without input schemas force agents to guess argument shapes; tool names that aren't plain ASCII identifiers confuse logging and allow-listing.

Post-handshake. Requires a successful MCP `initialize` / `tools/list`. Skipped on perimeter-only scans where the server refused or failed the MCP handshake.

5 rules · 16 weight
06 · Category

Metadata transparency

Whether the server identifies itself and documents its tools — and whether the advertised identity matches the wire identity (cert CN/SAN, hostname). Operators need a stable name, a version, and an internally consistent identity claim to perform any kind of audit.

Post-handshake. Requires a successful MCP `initialize` / `tools/list`. Skipped on perimeter-only scans where the server refused or failed the MCP handshake.

10 rules · 33 weight
07 · Category

Exposure minimization

Whether the server keeps its surface small. Large, sprawling tool sets expand the agent's blast radius and are harder to review.

Post-handshake. Requires a successful MCP `initialize` / `tools/list`. Skipped on perimeter-only scans where the server refused or failed the MCP handshake.

1 rule · 2 weight
08 · Category

Auth discovery posture

When authorization is required, whether the server cooperates with the standards-based discovery chain — RFC 9728 protected resource metadata, RFC 8414 authorization server metadata, validated issuers, and safe grant types.

Auth-required. Only applies when the server signals that authentication is required (HTTP 401/403). Excluded from the score on public servers.

9 rules · 40 weight