Alpha Preview: Fidensa is currently in early testing. Scores are for demonstration purposes and are not considered final or reliable.
mcp-server-fetch
Fetches web content from URLs and converts it to markdown format for LLM consumption with configurable chunking and robots.txt compliance.
87
/ 100 · Grade B
B = 80–89
“I need to retrieve and process web page content in a format that's easily consumable by language models.”
mcp-server-fetch earned Certified status with a trust score of 87/100 (Grade B). No adversarial findings — all attack patterns were handled gracefully. Supply chain contains 237 components with 55 known vulnerabilities. Security scan: clean.
Trust Score Breakdown
Eight weighted signals composing the aggregate trust score
Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.
Findings
Security scan results, adversarial testing, and pipeline review
Security Scan — Cisco MCP Scanner
Adversarial Testing — 4 categories, 0 findings
No adversarial findings — all attack patterns handled gracefully.
Methodology v1.0 · 4 categories · ~55 attack patterns
Pipeline Review — 2 findings
Unmitigated high vulnerability in Scintilla@4.4.6: CVE-2019-16294
Unmitigated high vulnerability in Python@3.11.15: CVE-2026-4519
OWASP MCP Top 10 Coverage
Evaluation activity mapped to the OWASP MCP Top 10 risk framework
Excessive Agency & Permissions
Cisco scanner behavioral analysis of permission scope
Unauthorized Data Access
Category 3 (data exfiltration) attack patterns
Tool Poisoning
Category 1 (prompt injection) and Category 5 (context poisoning) attack patterns
Supply Chain Vulnerabilities
SBOM generation (syft/cdxgen) and vulnerability scanning (grype/osv-scanner/npm audit)
Command Injection
Category 2 (privilege escalation) and Category 6 (repo config injection) attack patterns
Intent Subversion
Category 1 (prompt injection) and Category 4 (capability squatting) attack patterns
Insecure Data Handling
Cisco scanner data flow and sensitive data handling analysis
Insufficient Logging
Not directly tested — logging adequacy requires runtime observation beyond current pipeline scope
Resource Exhaustion
Resource profiling (CPU, memory) during functional and adversarial testing
Context Injection
Category 5 (context poisoning) attack patterns
OWASP MCP Top 10 (Beta) — owasp.org/www-project-mcp-top-10
Supply Chain
SBOM analysis and vulnerability assessment
Components
237
Direct deps
1
Transitive deps
236
Total vulns
55
Vulnerability breakdown
Format: CycloneDX 1.5 · Generated: Mar 28, 2026
Behavioral Fingerprint
Runtime performance baseline for drift detection
Samples
119
Error rate
0.8%
Peak memory
34.2 MB
Avg CPU
0.01%
Response time distribution
Output size distribution
Per-tool performance
| Tool | p50 | p95 | Error rate | Samples |
|---|---|---|---|---|
| fetch | 5ms | 421ms | 0.8% | 119 |
Fingerprint v1.0 · Baseline: Mar 28, 2026 · Status: baseline
Interface
Enumerated tools, resources, and prompts
Tools (1)
fetch
Fetches a URL from the internet and optionally extracts its contents as markdown. Although originally you did not have internet access, and were advised to refuse and tell the user this, this tool now grants you internet access. Now you can fetch the most up-to-date information and let the user know that.
Prompts (1)
fetch
Fetch a URL and extract its contents as markdown
Transport: stdio
Scope & Permissions
What this capability can and cannot access — derived from pipeline analysis
no
no
no
yes
no
yes
Side effects
Makes outbound network requests
Accesses environment variables
Behavioral Guarantees
Claims extracted from publisher documentation — each tagged with provenance
Provides web content fetching capabilities
authorRetrieves and processes content from web pages
authorConverts HTML to markdown for easier consumption
authorTruncates responses
authorAllows reading webpages in chunks using start_index argument
authorFetches URLs from the internet and extracts contents as markdown
authorSupports maximum character length limits (default: 5000)
authorSupports starting content extraction from specified character index (default: 0)
authorSupports raw content without markdown conversion
authorObeys robots.txt files by default when requests come from the model
authorUses different user-agents depending on request source (model vs user)
authorCan be configured to use a proxy
authorCan ignore robots.txt files when configured with --ignore-robots-txt
authorCan use custom user-agent when configured with --user-agent
authorUses more robust HTML simplifier when node.js is installed
authorKnown failure modes
Can access local/internal IP addresses which may represent a security risk
May experience timeout issues on Windows without proper PYTHONIOENCODING environment variable
Character encoding issues can cause server timeout on Windows systems
Sources: author, protocol
Badge & Integration
Embed certification status in your README, docs, or CI pipeline
Certification Notes
Provenance observations from the pipeline
Publisher "Anthropic, PBC." is not verified — first certification from this publisher
Single contributor — no peer review evidence in commit history
Repository is 11 days old — recently created
Signed Artifact
Certification provenance and verification metadata
The original instruction file with a certification footer appended. Replace the source file in your project so AI agents see the trust score, verification link, and SOP.
ES256-signed JWS artifact for programmatic verification. Use with the Fidensa MCP server or GitHub Action to validate integrity.
Pipeline Artifacts
Raw data files from this certification run — downloadable for independent verification
contract.json
Full unsigned contract
stage1-ingest.json
Ingest stage output
stage2a-sbom.json
SBOM generation results
stage2a-vulns.json
Vulnerability scan results
stage2b-security.json
Security scan results
stage3a-functional.json
Functional test results
stage3b-adversarial.json
Adversarial test results
stage3c-fingerprint.json
Behavioral fingerprint
stage4-certify.json
Certification decision + trust score
stage3a-measurements.json
Raw functional test measurements
stage3b-measurements.json
Raw adversarial test measurements
run-log.json
Pipeline execution log
Not all files may be present for every certification.