Review steps
- Confirm server identity and hosted endpoint ownership.
- Classify every tool by read, write, execute, destructive, and financial impact.
- Check authentication, token scope, package source, and version pinning.
- Record the approver, conditions, evidence, and review date.