Review steps
- Confirm endpoint and auth fields are explicit.
- Check paid access metadata and token-claim instructions.
- Compare listed tools and schemas against the live server response.
- Record missing or inconsistent fields as intake findings.
MCP server-card security
Server-card metadata helps agents discover how to connect, but security reviewers still need to check whether that metadata is complete and trustworthy.
Open scanner preview