🛡️ MCP Server Attestation

Prevent MCP server spoofing and man-in-the-middle attacks with Ed25519 cryptographic attestation.

MCP Server Attestations - Cryptographic verification of MCP servers with public key management
MCP Attestations — Cryptographic verification of Model Context Protocol servers

What is MCP Attestation?

MCP Server Attestation is AIM's core security mechanism that ensures only verified, authentic MCP servers can connect to your AI agents. Without attestation, any malicious server can claim to be a legitimate MCP server and intercept or manipulate agent communications.

The Problem: Without Attestation

  • ❌ Attacker creates fake "github-mcp" server
  • ❌ Agent connects thinking it's legitimate
  • ❌ Attacker steals GitHub credentials
  • ❌ Attacker injects malicious responses
  • ❌ No way to verify server authenticity
  • ❌ Zero audit trail of what happened

The Solution: With AIM Attestation

  • ✅ MCP server cryptographically verified with Ed25519
  • ✅ Only authentic server has matching private key
  • ✅ Signature proves server identity
  • ✅ Tampering detected automatically
  • ✅ Complete audit trail of all attestations
  • ✅ Real-time monitoring of server behavior

Security Properties

Identity Proof

Only the entity with the private key can create valid signatures

Non-Repudiation

Signatures cannot be forged or denied

Integrity

Any tampering with signed data is detected

Authenticity

Signature proves the message came from the claimed sender

✅ Attestation Checklist

All MCP servers registered in AIM
Public keys retrieved from .well-known/mcp/capabilities
Attestation records created (automatic or manual)
Attestation status shows "verified" in dashboard
Expiration dates monitored (90-day renewal cycle)
Alerts configured for attestation failures
Audit trail reviewed monthly
Decommissioned servers' attestations revoked

Related Documentation