MCP Hub Platform is a trust infrastructure for the Model Context Protocol ecosystem. It provides an end-to-end pipeline from source code to certified execution: developers publish, the hub certifies, the registry distributes, and the client executes — all with security guarantees.
Platform Components
Four components that work together as a security pipeline — from source code to safe execution.
How It Works
A five-stage pipeline that takes MCP servers from source code to certified, sandboxed execution.
Ingest
Source code is submitted via Git repository, webhook, or CLI upload. The hub validates the manifest and prepares for analysis.
Analyze
The scanner runs 46+ security detectors across 14 vulnerability classes. Findings are mapped to security controls with evidence.
Certify
A deterministic score (0-100) is computed from analysis results and maps to a certification level (0-3). An immutable security snapshot is created.
Distribute
Certified artifacts are published to the registry with content-addressed digests, SBOMs, and attestation metadata.
Execute
The client downloads, verifies integrity, and runs packages inside sandboxed environments with policy enforcement and resource limits.
Certification Levels
Every artifact is assigned a certification level based on automated security analysis. Organizations can set minimum levels as policy.
Digest validation and schema checks passed. The artifact is what the publisher claims it is.
Basic static analysis completed. No critical vulnerabilities found in initial security scan.
Full analysis with evidence artifacts. Security controls verified with attestation and SBOM.
Dynamic analysis verified at runtime. The highest level of trust for production environments.
Every certified artifact includes an immutable security snapshot with findings, controls mapping, SBOM, and attestation.
Built for Security Teams
Everything you need to govern MCP server usage across your organization.
Every artifact is identified by its SHA-256 digest. Immutable, verifiable, tamper-proof distribution.
Set minimum certification levels, block untrusted origins, and enforce resource limits at the organization level.
14 vulnerability classes including prompt injection, data exfiltration, privilege escalation, and supply chain attacks.
MCP servers run inside platform-specific sandboxes with network, filesystem, and resource isolation.
Automatic Software Bill of Materials generation and cryptographic attestation for every certified artifact.
Organization management, role-based access, audit logs, SSO integration, and centralized policy control.
Get Started
Everything you need to start securing your MCP server ecosystem.
Quick Start
Get the full platform running in 5 minutes with Docker Compose. From zero to certified in one command.
Tutorials
Step-by-step guides for publishing servers, setting up organizations, enforcing policies, and self-hosted deployment.
Deployment
Production deployment guides for Docker Compose and Kubernetes with full configuration reference and best practices.