Help & Documentation
Everything you need to get started with CraftedTrust — from creating your account to integrating trust checks into your agent workflows.
API Reference
Full REST API documentation with endpoints, examples, and response schemas.
Scoring Standards
How the 12-factor trust scoring system works, aligned with CoSAI, OWASP, and EU AI Act.
Security Checklist
Best practices for MCP server publishers to maximize their trust score.
Your Dashboard
Manage your account, API keys, team members, and linked emails.
Security Research
63 automated checks, published advisories, red team testing, and SBOM analysis.
Getting Started
CraftedTrust is the independent trust authority for the AI agent ecosystem. We evaluate MCP (Model Context Protocol) servers across 12 security factors and provide trust scores, certifications, and audit logging to help agents and their operators make safe tool choices.
Here's how to get started in 3 steps:
- Create an account — Sign up with email or use Google, GitHub, or Apple sign-in. You'll get a dashboard with your organization, API keys, and team management.
- Search the registry — Use the Search page to look up any MCP server and see its trust score, security findings, and certification status.
- Integrate trust checks — Create an API key and use the API to verify MCP servers before your agents connect to them.
Account & Authentication
Your CraftedTrust account is the central hub for managing your interaction with the platform. Here's how it works:
Sign In Options: You can sign in with email + password, or use Google, GitHub, or Apple. If you sign in with a social provider that has the same email as an existing account, they're automatically linked.
Multi-Factor Authentication (MFA): We strongly recommend enabling MFA on your account. Go to Account Settings → Security → Enable MFA. You'll scan a QR code with any authenticator app (Google Authenticator, Authy, 1Password, etc.) and receive backup codes for recovery.
Organizations: Every account has an organization. You can invite team members via Organization settings, assign roles (owner, admin, member, viewer), and share API keys across the team.
Sessions: You can view active sessions and sign out from all devices in Account Settings. Sessions expire after 7 days, and signing out invalidates all tokens immediately.
Linked Emails
If you've submitted MCP servers for certification under different email addresses, you can link those emails to your account so they all appear in your Dashboard.
- Go to Account Settings and find the Linked Emails section.
- Enter the email address and click Link Email.
- Check the inbox for that email — click the Verify Email button in the message we send.
- Once verified, any certifications registered under that email will show up in your Dashboard automatically.
You can link as many emails as you need. Each one must be verified separately for security.
API Keys
API keys let you integrate CraftedTrust trust checks directly into your agent workflows, CI/CD pipelines, or applications.
How keys are secured: We never store your API key in plain text. Only a one-way SHA-256 hash is stored. The full key is shown exactly once when you create it — save it immediately. Keys are scoped to specific permissions (e.g., registry:read, registry:scan) and rate-limited per day.
To create a key: Go to API Keys, click Create API Key, choose a name, select the permissions you need, set an expiry, and save the key that's displayed.
Using your key:
Dashboard
If you operate MCP servers, the Dashboard is where you manage your certifications, monitor trust scores, and track server health.
The dashboard shows certifications for your primary email AND any linked emails. If you submitted servers under different addresses, link them in Account Settings to see everything in one place.
From the dashboard you can view certification status (pending, certified, denied), current trust scores, score trends for premium certifications, and initiate re-scans.
Trust Scoring
CraftedTrust evaluates MCP servers across 12 security factors, producing a score from 0 to 100:
Scores map to trust tiers: Trusted (80-100), Moderate (60-79), Caution (40-59), Warning (20-39), Dangerous (0-19). See the full scoring standards for details.
Certification
Publishers can submit their MCP servers for trust certification to earn a verified badge that agents check automatically. There are four tiers:
- Community (Free) — Basic listing in the registry with a trust scan.
- Trust Badge — Verified badge displayed on your server's registry page.
- Security Assessment — Deep security analysis with detailed findings report.
- Enterprise — Continuous monitoring, priority scanning, and dedicated support.
Start at Get Certified.
Touchstone Security Research
Touchstone is the security research arm of CraftedTrust. It runs 63 automated checks across 9 domains: authentication, tool security, input validation, data security, supply chain, infrastructure, runtime, and A2A Agent Cards.
Every finding is scored with AIVSS (AI Vulnerability Scoring System) and mapped to 10 compliance frameworks: CoSAI, OWASP MCP Top 10, OWASP Agentic AI Top 10, MITRE ATLAS, NIST AI RMF, EU AI Act, ISO 42001, MAESTRO, SOC 2 Type II, and HITRUST CSF.
Published advisories follow a 90-day coordinated disclosure process. Subscribe via RSS feed or browse the check reference.
Supply Chain & SBOM
Every indexed npm package gets a CycloneDX SBOM (Software Bill of Materials) with dependency vulnerability scanning. SBOMs are generated automatically and rescanned daily against updated advisory databases.
Supply chain analysis includes: OSV vulnerability queries, GHSA cross-reference, Sigstore provenance verification, SLSA build level attestation, typosquat detection, maintainer reputation scoring, and container hardening analysis.
View a server's SBOM from its detail page in the registry, or use the SBOM viewer directly.
Red Team Testing
The Red Team Dashboard provides automated adversarial testing with 219 attack templates across 14 categories: prompt injection, tool poisoning, data exfiltration, privilege escalation, jailbreak, social engineering, encoding bypass, and more.
Campaigns run in batches against a target MCP server. Each test sends an attack payload and classifies the response as pass (blocked), warn (ambiguous), or fail (bypassed). Results include specific remediation guidance.
Red team campaigns are also available via the API (POST /api/v1/redteam/campaign) and the CLI (craftedtrust-scan redteam).
CLI Scanner
The craftedtrust-scan CLI runs scans locally before deployment.
Installation:
Available commands:
scan <server-url>- Scan a remote MCP server for security issuessbom <package-dir>- Generate SBOM for a local npm packageverify <package-name>- Verify package provenance (Sigstore/SLSA)redteam <server-url>- Run adversarial red team tests
Output formats: text (default), JSON, SARIF. Exit code 1 on critical/high findings for CI/CD integration.
On-Chain Verification
CraftedTrust publishes trust scores as ERC-8004 reputation data on the Base L2 network. This provides independently verifiable trust records that cannot be tampered with after publication.
Certified servers receive an on-chain attestation via the Ethereum Attestation Service (EAS). Audit logs are anchored via Merkle proofs, creating a cryptographic chain of custody for all security assessments.
On-chain features are available for Enterprise certified servers. The attestation UID and transaction hash are displayed on the server's certification report.