MCP Hub
Back to servers

mcp-server-security-standard

MCP Server Security Standard (MSSS): an open, testable security control standard for certifying MCP servers, with levels, evidence requirements, and reporting schemas.

Stars
30
Forks
6
Updated
Jan 29, 2026
Validated
Jan 31, 2026

MCP Server Security Standard (MSSS)

CC BY-SA 4.0 GitHub release Contributions Welcome

About MSSS

The Model Context Protocol enables AI models to interact with external systems through tools, resources, and prompts. As adoption accelerates, critical vulnerabilities have emerged: command injection, path traversal, SSRF attacks, and supply chain compromises.

MSSS provides:

  • 24 security controls across 8 domains
  • 4 compliance levels (L1-Essential, L2-Development, L3-Production, L4-Maximum Assurance)
  • Risk-based level selection framework inspired by NIST CSF, OWASP ASVS, and CIS Controls
  • 6 deployment profiles (Local Dev, Team Server, Internet-Facing, etc.)
  • Evidence-based verification with clear acceptance criteria
  • Machine-readable reporting through JSON schemas

Current Status - v0.1.0

Released: January 15, 2026 (Community Review Draft)

What's Included

  • Core standard framework (msss.md)
  • 6 deployment profiles defined
  • Comprehensive threat model
  • 23 fully documented security controls
  • JSON reporting schemas
  • i18n framework for translations

Areas for Community Contribution

  • Implementation examples for common frameworks
  • Automated verification tools
  • Reference assessment reports
  • Translations to other languages
  • Real-world testing and feedback

Quick Start

For Implementers

  1. Review deployment profiles to find your scenario
  2. Implement controls from control catalog
  3. Use reporting schemas for assessment
  4. Share your experience via issues or discussions

For Contributors

# Fork and clone
git clone https://github.com/YOUR-USERNAME/mcp-server-security-standard
cd mcp-server-security-standard

# Start a translation
mkdir -p v0.1/i18n/es/standard

For Security Researchers

Compliance Levels

MSSS defines four compliance levels using a risk-based selection model (not maturity progression). Organizations select their target level based on deployment context, data sensitivity, and potential impact.

Level Selection Framework

LevelTarget AudienceControlsValidationTimeline
L1: EssentialPersonal/Hobby6 (25%)Self-assessment1-2 hours
L2: DevelopmentInternal/Team12 (50%)Self + scanning4-8 hours
L3: ProductionEnterprise/Customers18 (75%)Internal audit1-2 weeks
L4: Maximum AssuranceCritical/Regulated24 (100%)Third-party pentest4-8 weeks

Quick Decision Guide

Choose your level based on 4 key questions:

  1. Who uses it? Individual → L1 | Team → L2 | Organization/Customers → L3 | Public/Regulated → L4
  2. What data? Public → L1 | Internal → L2 | Business/PII → L3 | Regulated (PHI/PCI) → L4
  3. Impact if compromised? Inconvenience → L1 | Dev delays → L2 | Disruption → L3 | Severe harm → L4
  4. Threat model? Opportunistic → L1 | Semi-targeted → L2 | Targeted → L3 | APT → L4

Level Highlights

Level 1 (Essential)

  • Essential protection for personal tools and hobby projects
  • Prevents: Command injection, path traversal, SSRF, credential leaks
  • Key controls: No shell execution, path allowlisting, URL validation, schema validation, secret redaction

Level 2 (Development)

  • Security for development teams and internal tools
  • Adds: TLS enforcement, input bounds, timeouts, command allowlisting, trusted sources
  • Required for: Team projects, internal apps, pre-production environments

Level 3 (Production)

  • Comprehensive security for enterprise and customer-facing applications
  • Adds: OAuth authentication, RBAC, audit logging, container hardening
  • Required for: SaaS products, customer data, business-confidential information

Level 4 (Maximum Assurance)

  • Maximum hardening for critical infrastructure and regulated environments
  • Adds: Filesystem sandboxing, egress filtering, seccomp/AppArmor, runtime monitoring
  • Required for: HIPAA (healthcare), PCI DSS (payments), FedRAMP (government)

📖 Full documentation: See Compliance Levels and Control-Level Mapping

Regulatory Mappings

  • HIPAA (Healthcare): Level 4 minimum for PHI access
  • PCI DSS (Payments): Level 4 minimum for cardholder data
  • SOC 2 (SaaS): Level 3 minimum
  • ISO 27001: Level 3 minimum for certification
  • FedRAMP: Low→L3, Moderate/High→L4

Control Catalog

Filesystem (FS)

ControlLevelDescription
MCP-FS-01L1Path allowlisting to prevent unauthorized file access
MCP-FS-02L1Symlink resolution to prevent path traversal via symbolic links
MCP-FS-03L4Filesystem sandboxing for complete isolation

Execution (EXEC)

ControlLevelDescription
MCP-EXEC-01L1Avoid shell execution to prevent command injection
MCP-EXEC-02L2Command allowlisting for permitted executables
MCP-EXEC-03L2Argument separation to prevent injection attacks

Network (NET)

ControlLevelDescription
MCP-NET-01L1URL validation to prevent SSRF attacks
MCP-NET-02L4Egress traffic filtering with destination allowlists
MCP-NET-03L2TLS 1.2+ enforcement for all remote connections

Authorization (AUTHZ)

ControlLevelDescription
MCP-AUTHZ-01L3OAuth 2.1 delegation for secure authentication
MCP-AUTHZ-02L3Per-tool scope definition with granular permissions
MCP-AUTHZ-03L3Least privilege tool design principles
MCP-AUTHZ-04L3Resource-based access control (RBAC)

Input Validation (INPUT)

ControlLevelDescription
MCP-INPUT-01L1JSON Schema validation for all tool arguments
MCP-INPUT-02L2Input bounds checking to prevent DoS attacks
MCP-INPUT-03L2Timeout enforcement for resource exhaustion prevention

Logging (LOG)

ControlLevelDescription
MCP-LOG-01L3Comprehensive audit logging for all tool invocations
MCP-LOG-02L1Automatic secret redaction in logs

Supply Chain (SUPPLY)

ControlLevelDescription
MCP-SUPPLY-01L4Package integrity verification with checksums
MCP-SUPPLY-02L2Trusted package sources and registry verification

Deployment (DEPLOY)

ControlLevelDescription
MCP-DEPLOY-01L3Container hardening with security best practices
MCP-DEPLOY-02L4System call filtering via seccomp/AppArmor
MCP-DEPLOY-03L4Resource limits and rate limiting for DoS prevention

Total: 24 controls across 8 security domains

  • Level 1: 6 controls (25%) - Essential baseline
  • Level 2: 12 controls (50%) - Development protection
  • Level 3: 18 controls (75%) - Production security
  • Level 4: 24 controls (100%) - Maximum assurance

How to Contribute

We follow a simple process:

  1. Pick an area - Check issues labeled help-wanted or good-first-issue
  2. Discuss - Open an issue or join discussions before major work
  3. Submit - Create a PR with clear description
  4. Iterate - Address feedback from reviewers

Priority Contributions

HIGH PRIORITY

  • Add real-world implementation examples
  • Create reference implementations for common frameworks
  • Test controls against production deployments

MEDIUM PRIORITY

  • Add profile-specific guidance
  • Start Spanish, Portuguese, or other translations
  • Develop automated verification tools

ALWAYS WELCOME

  • Fix typos and improve clarity
  • Add references to new CVEs or research
  • Share implementation experiences

Community

Get Involved

Project Lead

  • Daniel García (cr0hn) - @cr0hn
  • Dr. Alfonso Múñoz (Mindcrypt) Mindcrypt

Looking for Co-Maintainers! If you're passionate about MCP security and want to help shape this standard, please reach out.

Recognition

All contributors will be recognized in:

  • CHANGELOG.md for significant contributions
  • Control documents you author or substantially improve

Roadmap

v0.1 (Current - Community Review)

  • Gather feedback on 23 controls
  • Validate against real-world deployments
  • Collect implementation experiences

v0.2 (Q2 2026)

  • Incorporate community feedback
  • Add controls for emerging threats
  • Publish reference implementations
  • Launch translation program

v1.0 (Q4 2026)

  • Stable specification
  • Automated verification tools
  • Certification program framework
  • Training materials

Related Standards

MSSS complements:

License

MSSS uses a multi-license approach:

ComponentLicensePurpose
Standard TextCC BY-SA 4.0Free sharing with attribution
JSON SchemasApache 2.0Commercial tool integration
Code ExamplesMITMaximum flexibility

See the full license text in the LICENSE file.

Support the Project

  • Star this repository - Help others discover MSSS
  • Share with your network - Spread awareness
  • Contribute - Your expertise makes MSSS better

Acknowledgments

MSSS builds upon:

  • Security researchers who disclosed MCP vulnerabilities
  • OWASP MCP Top 10 community
  • Early adopters providing feedback
  • Academic researchers (MCPLIB, Hou et al.)

The MCP Server Security Standard is an open community project. We provide this standard as-is without warranties. Use at your own discretion.

Reviews

No reviews yet

Sign in to write a review