Skip to content

Certification

Every bundle published to mpak is automatically scanned against the mpak Trust Framework (MTF), an open security standard for MCP server bundles. The results determine your bundle’s certification level (L1-L4).

LevelNameControlsWhat It Means
L1Basic7No secrets, no malware, valid manifest, SBOM
L2Standard26+ Vuln scanning, pinned deps, author identity
L3Verified38+ Signed bundles, build provenance, SLSA
L4Attested41+ Behavioral sandbox, reproducible builds

Most well-structured servers achieve L1 or L2 automatically.

Controls span nine security domains:

DomainCodeExamples
Artifact IntegrityAIValid manifest, content hashes, signatures
Supply ChainSCSBOM, vulnerability scan, dependency pinning
Code QualityCQNo secrets, no malware, static analysis
Capability DeclarationCDTool descriptions, permission scopes
ProvenancePRSource repo, author identity, build attestation
Registry OperationsRGNamespace governance, name pattern review
Publisher IdentityPKIdentity verification, key rotation
InstallationINPre-install checks, user transparency
Update LifecycleUPVersion policy, deprecation process

Three controls target AI attack surfaces that traditional tools miss:

  • CD-03: Tool description poisoning - prompt injection in tool descriptions
  • CD-04: Credential blast radius - overly broad OAuth scopes
  • CQ-06: Behavioral mismatch - runtime behavior differs from declarations

Slopsquatting (packages named after LLM hallucinations) is handled by RG-02 namespace governance.

Every package page on mpak.dev shows:

  • Certification level badge
  • Risk score
  • Individual control results (pass/fail/skip)
  • Remediation guidance for failures