Public catalog
Search, version, categories, author telemetry. Discovery that actually scales past the first 50 servers.
Browse, sign, and ship MCP servers your security team actually approves. Private registry, signed releases, policy gates, full audit trail.
Every server is signed, scanned, and pinned — no more raw stdio commands pulled from a GitHub README.
Governance is a first-class citizen: allowlists, CVE feeds, and policy files check into git next to your code.
Authors get distribution and telemetry. Ops get audit trails. Devs get one command. Nobody gets surprised.
Open CLI, open catalog, paid registry — the trust layer is the product, not the packaging.
Every Claude Code, Cursor and Windsurf user is wiring MCP servers by pasting raw commands from random READMEs. No signing, no version pinning, no auto-update, no security scanning, no telemetry. Fine for a demo; fatal the moment a regulated buyer asks who signed off on that server reaching their database.
Search, version, categories, author telemetry. Discovery that actually scales past the first 50 servers.
mcp install / update / audit across Claude Code, Cursor, Cline, Windsurf. One shape of command to rule them all.
Every published version gets a verifiable signature. Verification happens on install, not on trust.
Dedicated MCP feed with same-day CVE propagation and a blocklist of known-compromised servers.
Opt-in usage insights so authors know which tool calls matter and where their server is stalling.
org.mcp-policy.yml: allowlist, tool-level denies, max-privilege rules. Checked in git. Enforced at install.
One CLI command pulls a signed, scanned MCP server into your IDE. Verification is local and deterministic.
Every call is tied back to a signed version and a policy decision. CVE updates flow into your audit log.
Ship org-wide policy files. Approve or deny servers in bulk. Export SOC-2-friendly evidence in one click.
We partner. They'll ship discovery; enterprises still need SOC 2, SSO, allowlists, on-prem deployment, CVE feed SLAs. That's the tier we own from day one.
MCP from v1 — OpenAI GPT Actions and A2A support from v1.1. The protocol landscape will consolidate; the trust layer above it is what actually scales.
Yes. Enterprise tier ships a self-hostable registry with SSO, audit-log export, and an air-gapped update channel. Your catalog never leaves your network.
Free to publish. Paid tier for authors unlocks telemetry, audience analytics, and a featured slot in the discovery surface. No take rate on MCP itself — we're not a marketplace, we're a trust layer.
Two clicks. No spam. One email when there's something to show.