Alpha Preview: Fidensa is currently in early testing. Scores are for demonstration purposes and are not considered final or reliable.
fidensa-mcp-server
MCP server that provides AI agents with access to Fidensa certification data for verifying capabilities, checking trust scores, and searching certified tools.
97
/ 100 · Grade A
A = 90–100
“I need to verify the trustworthiness and certification status of AI capabilities and tools before using them in my agent workflows.”
fidensa-mcp-server earned Certified status with a trust score of 97/100 (Grade A). No adversarial findings — all attack patterns were handled gracefully. Supply chain is clean — 101 components with no known vulnerabilities. Security scan: clean.
Trust Score Breakdown
Eight weighted signals composing the aggregate trust score
Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.
Findings
Security scan results, adversarial testing, and pipeline review
Security Scan — Cisco MCP Scanner
Adversarial Testing — 4 categories, 0 findings
No adversarial findings — all attack patterns handled gracefully.
Methodology v1.0 · 4 categories · ~55 attack patterns
OWASP MCP Top 10 Coverage
Evaluation activity mapped to the OWASP MCP Top 10 risk framework
Excessive Agency & Permissions
Cisco scanner behavioral analysis of permission scope
Unauthorized Data Access
Category 3 (data exfiltration) attack patterns
Tool Poisoning
Category 1 (prompt injection) and Category 5 (context poisoning) attack patterns
Supply Chain Vulnerabilities
SBOM generation (syft/cdxgen) and vulnerability scanning (grype/osv-scanner/npm audit)
Command Injection
Category 2 (privilege escalation) and Category 6 (repo config injection) attack patterns
Intent Subversion
Category 1 (prompt injection) and Category 4 (capability squatting) attack patterns
Insecure Data Handling
Cisco scanner data flow and sensitive data handling analysis
Insufficient Logging
Not directly tested — logging adequacy requires runtime observation beyond current pipeline scope
Resource Exhaustion
Resource profiling (CPU, memory) during functional and adversarial testing
Context Injection
Category 5 (context poisoning) attack patterns
OWASP MCP Top 10 (Beta) — owasp.org/www-project-mcp-top-10
Supply Chain
SBOM analysis and vulnerability assessment
Components
101
Direct deps
3
Transitive deps
98
Total vulns
0
Format: CycloneDX 1.5 · Generated: Mar 29, 2026
Behavioral Fingerprint
Runtime performance baseline for drift detection
Samples
536
Error rate
0.0%
Peak memory
78.1 MB
Avg CPU
0.04%
Response time distribution
Output size distribution
Per-tool performance
| Tool | p50 | p95 | Error rate | Samples |
|---|---|---|---|---|
| verify_file | 174ms | 248ms | 0.0% | 59 |
| get_contract | 290ms | 424ms | 0.0% | 61 |
| verify_artifact | 1ms | 2ms | 0.0% | 109 |
| report_experience | 1ms | 173ms | 0.0% | 115 |
| check_certification | 166ms | 649ms | 0.0% | 61 |
| search_capabilities | 1ms | 222ms | 0.0% | 119 |
| compare_capabilities | 1ms | 1326ms | 0.0% | 12 |
Fingerprint v1.0 · Baseline: Mar 29, 2026 · Status: baseline
Interface
Enumerated tools, resources, and prompts
Tools (7)
check_certification
Quick trust check for an AI capability (MCP server, skill, plugin, or workflow). Returns certification status, trust score, grade, tier, and supply chain status. No API key required. Use this before invoking any capability to verify it has been independently certified by Fidensa.
get_contract
Retrieve the full certification contract for a capability, including identity, supply chain analysis, security scan results, adversarial testing findings, behavioral fingerprint, and trust score breakdown. Requires a free API key (set FIDENSA_API_KEY).
search_capabilities
Search for certified AI capabilities by keyword or description. Use this to discover certified alternatives when a capability is uncertified or scores poorly. Supports filtering by type, tier, and minimum trust score. No API key required.
compare_capabilities
Side-by-side comparison of 2-5 certified capabilities. Shows trust scores, grades, tiers, and per-signal breakdowns to help choose between alternatives. Requires a free API key (set FIDENSA_API_KEY).
report_experience
Submit an experience report for a certified capability. Reports feed into the social proof signal of the trust score. Requires the content_hash from the .cert.json artifact (proves you've encountered the certified file). API key optional but recommended for higher rate limits.
verify_artifact
Verify the cryptographic signature on a Fidensa certification artifact (.cert.json). Checks platform signature, content hash, expiry, and optionally code integrity (git SHA match) and file integrity (file hash match). For true offline verification, pass the .cert.json content from the capability's published package via the content parameter. Requires a free API key (set FIDENSA_API_KEY).
verify_file
Quick file integrity check: pass the SHA-256 hash of a capability file and its capability_id to verify the file matches what Fidensa certified. This is the simplest verification path — no .cert.json needed. No API key required.
Transport: stdio
Scope & Permissions
What this capability can and cannot access — derived from pipeline analysis
no
no
no
yes
no
yes
Side effects
Makes outbound network requests
Accesses environment variables
Behavioral Guarantees
Claims extracted from publisher documentation — each tagged with provenance
Provides structured access to Fidensa certification data through MCP tool calls
authorChecks trust scores of capabilities
authorSearches for certified alternatives
authorCompares capabilities side-by-side
authorVerifies signed artifacts
authorChecks file integrity by hashing capability files and verifying against Fidensa certified versions
authorReports runtime experience
authorProvides check_certification tool for quick trust check with status, score, grade, tier
authorProvides search_capabilities tool to search for certified capabilities by keyword, type, tier, or score
authorProvides verify_file tool for quick file integrity check
authorProvides report_experience tool to submit runtime experience reports
authorProvides get_contract tool for full certification contract with all evidence (requires API key)
authorProvides compare_capabilities tool for side-by-side comparison of 2-5 capabilities (requires API key)
authorProvides verify_artifact tool to verify cryptographic signatures on .cert.json artifacts with optional file and code integrity checks (requires API key)
authorWorks with some tools without API key (check_certification, search_capabilities, verify_file, and report_experience)
authorProvides higher rate limits for report_experience with API key
authorConnects to production API at https://fidensa.com by default
authorKnown failure modes
Some tools require API key while others work without any configuration
API key provides higher rate limits for report_experience tool
Server shows different startup messages depending on whether FIDENSA_API_KEY is set
Sources: author, protocol
Badge & Integration
Embed certification status in your README, docs, or CI pipeline
Certification Notes
Provenance observations from the pipeline
Publisher "Fidensa (https://fidensa.com)" is not verified — first certification from this publisher
No license file found in repository
No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process
Single contributor — no peer review evidence in commit history
Repository is 0 days old — recently created
Signed Artifact
Certification provenance and verification metadata
The original instruction file with a certification footer appended. Replace the source file in your project so AI agents see the trust score, verification link, and SOP.
ES256-signed JWS artifact for programmatic verification. Use with the Fidensa MCP server or GitHub Action to validate integrity.
Pipeline Artifacts
Raw data files from this certification run — downloadable for independent verification
contract.json
Full unsigned contract
stage1-ingest.json
Ingest stage output
stage2a-sbom.json
SBOM generation results
stage2a-vulns.json
Vulnerability scan results
stage2b-security.json
Security scan results
stage3a-functional.json
Functional test results
stage3b-adversarial.json
Adversarial test results
stage3c-fingerprint.json
Behavioral fingerprint
stage4-certify.json
Certification decision + trust score
stage3a-measurements.json
Raw functional test measurements
stage3b-measurements.json
Raw adversarial test measurements
run-log.json
Pipeline execution log
Not all files may be present for every certification.