← Back to Learn
mcp-safetybest-practicesdeployment

MCP Server Security Audit Checklist

Authensor

Every MCP server you connect to your agent becomes part of its attack surface. A compromised or poorly configured MCP server can expose sensitive data, execute unauthorized operations, or manipulate agent behavior through malicious tool descriptions. Use this checklist before connecting any MCP server.

Server Identity and Provenance

  • [ ] Server source code is available and has been reviewed
  • [ ] Server publisher is identified and trusted
  • [ ] Server version is pinned (not pulling latest automatically)
  • [ ] Dependencies have been audited for known vulnerabilities
  • [ ] Server binary or package integrity has been verified (checksums, signatures)

Tool Definitions

  • [ ] All exposed tools are documented with clear descriptions
  • [ ] Tool input schemas are strict (no permissive additionalProperties: true)
  • [ ] Tool descriptions do not contain instructions that could manipulate agent behavior
  • [ ] No hidden or undocumented tools are exposed
  • [ ] Tool capabilities match the stated purpose of the server

Authentication and Transport

  • [ ] Transport layer uses encryption (TLS for HTTP, authenticated stdio)
  • [ ] Authentication is required for all tool invocations
  • [ ] API keys or tokens are scoped to minimum required permissions
  • [ ] Token rotation is configured and tested

Data Handling

  • [ ] Server does not log or store sensitive tool parameters
  • [ ] Data in transit is encrypted
  • [ ] Server does not forward requests to undisclosed third parties
  • [ ] PII handling complies with applicable regulations

Operational Controls

  • [ ] Rate limiting is configured on the server
  • [ ] Error responses do not leak internal details
  • [ ] Server has health check endpoints for monitoring
  • [ ] Graceful shutdown behavior is tested

Network Isolation

  • [ ] Server runs in an isolated network segment where possible
  • [ ] Outbound network access from the server is restricted
  • [ ] The server cannot reach sensitive internal services it does not need

Run this audit annually for all connected MCP servers, and immediately when a server is updated to a new version. Document findings and track remediation of any identified issues.

Keep learning

Explore more guides on AI agent safety, prompt injection, and building secure systems.

View All Guides