The Trust Layer for AI Agents

CraftedTrust provides independent security verification, audit logging, and compliance infrastructure for the AI agent ecosystem. From scanning MCP servers to cryptographic audit trails — we help you trust the tools your agents use.

No account required · Results are public · Max 5 scans/hour

Common User Workflows

Different teams enter CraftedTrust from different angles, but the workflow is meant to stay simple: find what you need, take action in the right product, and leave with trust signals you can actually verify.

If You Are Evaluating Tools

Start with visibility

For buyers, security reviewers, and operators comparing tools before rollout.

  • Search the Registry for packages, live servers, trust scores, and badges.
  • Open Touchstone research for advisories, checks, and red-team context.
  • Use Resources to review standards, API docs, and verification references.
If You Operate an MCP Server

Move from scan to certification

For MCP server owners, maintainers, and product teams that want to improve posture and make trust visible to users.

  • Run a free scan, then use Assisted Scan or the Publisher Center for guided improvements.
  • Choose a certification path, publish badges, and manage reports from the dashboard flow.
  • Use Identity and Enterprise controls as your team and compliance needs grow.
If You Are Running Agents

Operationalize and govern usage

For organizations that need monitoring, accountability, and policy control in production.

  • Issue org-level access through Identity and API keys.
  • Log tool activity with Audit, inspect executions with Trace, and coordinate posture in Governance.
  • Export verifiable receipts and operational evidence for security and compliance reviews.

Verifiable trust is built into the workflow

CraftedTrust does not stop at a dashboard score. Trust signals, compliance receipts, and audit integrity data are designed so teams can independently verify what was checked and what was recorded.

ERC-8004 Compatible Base L2 Merkle Proof Anchoring Cloudflare Workers
Learn more about on-chain verification

Platform Products

Trust Registry

Independent trust verification for MCP servers and AI agent tools. 4,200+ packages indexed, 110+ live-verified servers. 12-factor CoSAI-aligned trust scoring, embeddable badges, free API, paid certification.

4,200+ indexed • 110+ live verified • 76 avg trust score
Search the Registry →

Identity & Access

Shared account and org layer for login, MFA, roles, linked emails, API keys, notifications, and federated access across CraftedTrust surfaces.

Accounts • orgs • API keys • MFA
Explore Identity →

Runtime Gateway

In-path MCP traffic protection for teams that need runtime policy decisions, receipts, approvals, kill switches, and operational enforcement instead of passive logging alone.

Inspect • redact • block • verify
Explore Runtime Gateway →

Touchstone Security Research

Independent vulnerability research for the MCP ecosystem. 63 automated security checks across 9 domains, OWASP AIVSS scoring, and coordinated disclosure support.

63 checks • 9 domains • 10 compliance frameworks
View Advisories →

Governance

Cross-service oversight for agent operations, organization health, policy posture, compliance visibility, and control-plane quick actions.

Live

Trace

Trace ingestion, OTLP support, execution search, and alert rules for teams that need deeper workflow observability than logs alone.

Traces • spans • alert rules
Explore Trace →

Enterprise Controls

Policy, device inventory, event ingestion, compliance reporting, and administrative workflows for larger deployments and managed environments.

Devices • policies • compliance
View Enterprise →

Publisher Center

For MCP server owners and operator teams: scans, assisted scan, certification, badges, reports, rollout guidance, and trust-distribution workflows in one place.

Server owners • scans • certification
Open Publisher Center for Server Owners →

Resources & Tooling

Docs, standards, help, compliance readiness, status, changelog, SBOM, Touchstone references, and developer tooling such as the CLI scanner.

Docs • help • CLI • status
Browse Resources →

How the Platform Works Together

CraftedTrust is meant to work as one trust workflow, not a loose collection of tools. Teams usually begin by checking trust, then layer in identity, monitoring, governance, and verifiable proof as usage becomes more operational.

1

Discover and Verify

Use the Registry and Touchstone to understand what a server is, who maintains it, how it behaves, and where it carries risk before your agents connect to it.

2

Set Up Access

Bring users and teams into Identity for accounts, orgs, API keys, MFA, and role-based access so scans, dashboards, and controls all share the same account layer.

3

Monitor Operations

Route production activity through Runtime Gateway, Trace, and Governance so tool usage, execution traces, alerts, and policy posture are visible in one operational loop.

4

Prove and Publish

Publish trust signals through certification, badges, receipts, and verifiable proofs so internal teams and outside buyers can see what you have validated.

Compliance & Readiness

CraftedTrust is designed to turn technical trust data into governance-ready evidence. The strongest near-term path is not another checklist, but using scans, runtime receipts, and dashboard visibility together.

EU AI Act Readiness

Assess high-risk AI workflows against Articles 9-15 using trust scans, Runtime Gateway receipts, and governance evidence instead of questionnaire-only prep.

Gap analysis • runtime evidence • remediation plan
Explore readiness work →

AI Agent Governance Baseline

Stand up a practical baseline across trust checks, identity, runtime controls, oversight, and policy review for operational agent programs.

Identity • gateway • governance
See the baseline offer →

Continuous Evidence Packs

Use recurring scans, Runtime Gateway logs, and compliance mappings to keep an always-fresh evidence package for buyers, auditors, and internal review teams.

Recurring scans • receipts • reporting
Open compliance readiness →