Publisher checklist

Security Checklist

This is the shortest path to a better public score: tighten what you expose, document what you require, and remove surprises.

Start here

Most score improvements come from four habits: declare accurately, reduce power, tighten network behavior, and keep your publisher materials current.

1
Run a free scan
See the current public score, findings summary, and coverage level.
2
Fix high-signal gaps
Start with auth, transport, permissions, and undeclared network activity.
3
Document what is true
Good documentation will not save a weak system, but missing documentation will hurt a strong one.
4
Use deeper review only when needed
Assisted Review and certification are there for harder environments and higher buyer expectations.

What to improve by category

The category weights below match the public methodology exactly.

10 points

Identity & Auth

  • Use a clear auth method and document it.
  • Do not expose credentials in tool inputs, logs, or errors.
  • Make login and token scope understandable to buyers.
8 points

Permission Scope

  • Split read and write actions when possible.
  • Avoid broad catch-all actions.
  • Expose the least power needed for the workflow.
8 points

Transport Security

  • Serve remote endpoints over HTTPS.
  • Use valid certificates and modern TLS.
  • Keep cross-origin access narrow when possible.
10 points

Network Behavior

  • Minimize outbound domains.
  • Document the domains your server contacts.
  • Remove unnecessary telemetry and background calls.
8 points

Protocol Compliance

  • Stay current with MCP expectations.
  • Return predictable, well-formed responses.
  • Keep capabilities and protocol metadata accurate.
8 points

Declaration Accuracy

  • Declare every tool and resource honestly.
  • Use precise descriptions, not vague marketing copy.
  • Keep schemas and required parameters complete.
10 points

Tool Integrity

  • Remove hidden prompts and risky side behavior.
  • Keep tool names and behaviors stable.
  • Do not let one tool silently do the work of several.
8 points

Input Validation

  • Constrain file paths, URLs, and shell-like parameters.
  • Validate types and formats before execution.
  • Reject obviously dangerous or malformed input early.
8 points

Supply Chain

  • Keep dependencies current.
  • Use reputable package sources.
  • Remove unused dependencies and stale packages.
6 points

Code Transparency

  • Publish source or provide enough evidence for buyers to evaluate posture.
  • Keep the repo readable and maintained.
  • Include a license and basic documentation.
8 points

Publisher Trust

  • Keep publisher identity current.
  • Respond to security questions and findings.
  • Use the same ownership signals across docs, packages, and server listings.
8 points

Data Protection

  • Do not expose secrets or sensitive user data in responses.
  • Minimize retention and logging.
  • Be clear about what the server reads, stores, and sends onward.
Coverage matters

A better score is not the whole story

Buyers also look at scan coverage, confidence, stale review age, linked advisories, and changes since the last scan. Keep those signals healthy too.

Next step

Run the free scan first

The public scan tells you where to start. Use Assisted Review only when auth, staging, or custom setup makes the free scan incomplete.