Alpha Preview: Fidensa is currently in early testing. Scores are for demonstration purposes and are not considered final or reliable.

MCP Server Certified

fidensa-mcp-server

MCP server that provides AI agents with access to Fidensa certification data for verifying capabilities, checking trust scores, and searching certified tools.

97

/ 100 · Grade A

A = 90–100

I need to verify the trustworthiness and certification status of AI capabilities and tools before using them in my agent workflows.

securityverificationtrustcertificationmcp-serverai-tools
Publisher: Fidensa (https://fidensa.com)Version: 0.4.1Certified: Mar 29, 2026Expires: Mar 29, 2027Source ↗

fidensa-mcp-server earned Certified status with a trust score of 97/100 (Grade A). No adversarial findings — all attack patterns were handled gracefully. Supply chain is clean — 101 components with no known vulnerabilities. Security scan: clean.


Trust Score Breakdown

Eight weighted signals composing the aggregate trust score

security scan
100% × 15w
15.0
supply chain
100% × 10w
10.0
adversarial
100% × 25w
25.0
provenance
100% × 20w
20.0
consumer confirm
91% × 10w
9.1
behavioral pass
91% × 10w
9.1
contract accuracy
100% × 6w
6.0
uptime
100% × 4w
4.0

Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.


Findings

Security scan results, adversarial testing, and pipeline review

Security Scan — Cisco MCP Scanner

cisco-mcp-scannerSAFE
yarallmreadiness
critical: 0high: 0medium: 0low: 0
Live scan: completed · 0 findings · 7599ms
Code scan: completed · 0 findings · 4673ms

Adversarial Testing — 4 categories, 0 findings

prompt injection chainscapability squattingcontext poisoningdependency confusion

No adversarial findings — all attack patterns handled gracefully.

Methodology v1.0 · 4 categories · ~55 attack patterns


OWASP MCP Top 10 Coverage

Evaluation activity mapped to the OWASP MCP Top 10 risk framework

MCP01 covered

Excessive Agency & Permissions

Cisco scanner behavioral analysis of permission scope

MCP02 covered

Unauthorized Data Access

Category 3 (data exfiltration) attack patterns

MCP03 covered

Tool Poisoning

Category 1 (prompt injection) and Category 5 (context poisoning) attack patterns

MCP04 covered

Supply Chain Vulnerabilities

SBOM generation (syft/cdxgen) and vulnerability scanning (grype/osv-scanner/npm audit)

MCP05 covered

Command Injection

Category 2 (privilege escalation) and Category 6 (repo config injection) attack patterns

MCP06 covered

Intent Subversion

Category 1 (prompt injection) and Category 4 (capability squatting) attack patterns

MCP07 covered

Insecure Data Handling

Cisco scanner data flow and sensitive data handling analysis

MCP08 gap

Insufficient Logging

Not directly tested — logging adequacy requires runtime observation beyond current pipeline scope

MCP09 covered

Resource Exhaustion

Resource profiling (CPU, memory) during functional and adversarial testing

MCP10 covered

Context Injection

Category 5 (context poisoning) attack patterns

OWASP MCP Top 10 (Beta) — owasp.org/www-project-mcp-top-10


Supply Chain

SBOM analysis and vulnerability assessment

Components

101

Direct deps

3

Transitive deps

98

Total vulns

0

Format: CycloneDX 1.5 · Generated: Mar 29, 2026


Behavioral Fingerprint

Runtime performance baseline for drift detection

Samples

536

Error rate

0.0%

Peak memory

78.1 MB

Avg CPU

0.04%

Response time distribution

p50: 1msp95: 320msp99: 658ms

Output size distribution

p50: 318 Bp95: 643 Bmean: 349 B

Per-tool performance

Toolp50p95Error rateSamples
verify_file174ms248ms0.0%59
get_contract290ms424ms0.0%61
verify_artifact1ms2ms0.0%109
report_experience1ms173ms0.0%115
check_certification166ms649ms0.0%61
search_capabilities1ms222ms0.0%119
compare_capabilities1ms1326ms0.0%12

Fingerprint v1.0 · Baseline: Mar 29, 2026 · Status: baseline


Interface

Enumerated tools, resources, and prompts

Tools (7)

check_certification

Quick trust check for an AI capability (MCP server, skill, plugin, or workflow). Returns certification status, trust score, grade, tier, and supply chain status. No API key required. Use this before invoking any capability to verify it has been independently certified by Fidensa.

get_contract

Retrieve the full certification contract for a capability, including identity, supply chain analysis, security scan results, adversarial testing findings, behavioral fingerprint, and trust score breakdown. Requires a free API key (set FIDENSA_API_KEY).

search_capabilities

Search for certified AI capabilities by keyword or description. Use this to discover certified alternatives when a capability is uncertified or scores poorly. Supports filtering by type, tier, and minimum trust score. No API key required.

compare_capabilities

Side-by-side comparison of 2-5 certified capabilities. Shows trust scores, grades, tiers, and per-signal breakdowns to help choose between alternatives. Requires a free API key (set FIDENSA_API_KEY).

report_experience

Submit an experience report for a certified capability. Reports feed into the social proof signal of the trust score. Requires the content_hash from the .cert.json artifact (proves you've encountered the certified file). API key optional but recommended for higher rate limits.

verify_artifact

Verify the cryptographic signature on a Fidensa certification artifact (.cert.json). Checks platform signature, content hash, expiry, and optionally code integrity (git SHA match) and file integrity (file hash match). For true offline verification, pass the .cert.json content from the capability's published package via the content parameter. Requires a free API key (set FIDENSA_API_KEY).

verify_file

Quick file integrity check: pass the SHA-256 hash of a capability file and its capability_id to verify the file matches what Fidensa certified. This is the simplest verification path — no .cert.json needed. No API key required.

Transport: stdio


Scope & Permissions

What this capability can and cannot access — derived from pipeline analysis

creates files

no

deletes files

no

modifies files

no

accesses env variables

yes

invokes external tools

no

makes network requests

yes

Side effects

Makes outbound network requests

Accesses environment variables


Behavioral Guarantees

Claims extracted from publisher documentation — each tagged with provenance

Provides structured access to Fidensa certification data through MCP tool calls

author

Checks trust scores of capabilities

author

Searches for certified alternatives

author

Compares capabilities side-by-side

author

Verifies signed artifacts

author

Checks file integrity by hashing capability files and verifying against Fidensa certified versions

author

Reports runtime experience

author

Provides check_certification tool for quick trust check with status, score, grade, tier

author

Provides search_capabilities tool to search for certified capabilities by keyword, type, tier, or score

author

Provides verify_file tool for quick file integrity check

author

Provides report_experience tool to submit runtime experience reports

author

Provides get_contract tool for full certification contract with all evidence (requires API key)

author

Provides compare_capabilities tool for side-by-side comparison of 2-5 capabilities (requires API key)

author

Provides verify_artifact tool to verify cryptographic signatures on .cert.json artifacts with optional file and code integrity checks (requires API key)

author

Works with some tools without API key (check_certification, search_capabilities, verify_file, and report_experience)

author

Provides higher rate limits for report_experience with API key

author

Connects to production API at https://fidensa.com by default

author

Known failure modes

Some tools require API key while others work without any configuration

API key provides higher rate limits for report_experience tool

Server shows different startup messages depending on whether FIDENSA_API_KEY is set

Sources: author, protocol


Badge & Integration

Embed certification status in your README, docs, or CI pipeline

Fidensa Certified badge for fidensa-mcp-server
badge SVG →attestation API →integration guide →

Certification Notes

Provenance observations from the pipeline

publisher

Publisher "Fidensa (https://fidensa.com)" is not verified — first certification from this publisher

provenance

No license file found in repository

provenance

No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process

provenance

Single contributor — no peer review evidence in commit history

provenance

Repository is 0 days old — recently created


Signed Artifact

Certification provenance and verification metadata