← Back to Learn
mcp-safetybest-practicesdeployment

Third-Party MCP Server Vetting Checklist

Authensor

Connecting a third-party MCP server to your agent infrastructure is a trust decision. The server will receive your agent's requests, process them, and return results that influence your agent's behavior. A malicious or compromised server can exfiltrate data, return manipulated results, or inject instructions into your agent's context.

Source Verification

  • [ ] The server's source code is publicly available
  • [ ] The publisher has a verifiable identity (GitHub organization, company website)
  • [ ] The repository has meaningful commit history (not a single bulk commit)
  • [ ] The project has multiple contributors or a reputable maintainer
  • [ ] The license is compatible with your use case

Code Review

  • [ ] Tool descriptions do not contain prompt injection attempts
  • [ ] The server does not make undisclosed network calls
  • [ ] The server does not log or transmit tool parameters to third parties
  • [ ] Dependencies are minimal and from reputable sources
  • [ ] No obfuscated code is present
  • [ ] Input validation is performed on all parameters

Security Posture

  • [ ] The project has a security policy or disclosure process
  • [ ] Known vulnerabilities in dependencies are addressed promptly
  • [ ] The server supports authentication for tool invocations
  • [ ] The transport layer supports encryption
  • [ ] The server does not run with elevated privileges

Operational Reliability

  • [ ] The server handles malformed inputs gracefully (no crashes)
  • [ ] Error messages do not leak internal details
  • [ ] The server has health check capabilities
  • [ ] Resource consumption is bounded (no unbounded memory or CPU usage)
  • [ ] The server has been tested under load

Integration Testing

  • [ ] All exposed tools produce expected outputs for known inputs
  • [ ] Tool schemas are strict and well-defined
  • [ ] The server responds within acceptable latency bounds
  • [ ] Timeout behavior is correct (requests do not hang indefinitely)
  • [ ] Error responses conform to the MCP specification

Ongoing Monitoring

  • [ ] Version updates are reviewed before deployment
  • [ ] A process exists to check for new vulnerabilities in dependencies
  • [ ] Behavioral monitoring detects changes in server response patterns
  • [ ] A plan exists for rapid disconnection if the server is compromised

Document your vetting findings. If the server fails any critical check, do not connect it. Place an MCP gateway between the server and your agents to enforce policies on all tool invocations regardless of server trustworthiness.

Keep learning

Explore more guides on AI agent safety, prompt injection, and building secure systems.

View All Guides