Skip to content
Back to AI Blog
The MCP Ecosystem: Discovery, Quality, and Security
 AI

The MCP Ecosystem: Discovery, Quality, and Security


New
MCP Claude Code Security AI Tooling

Table of Contents

  1. A 15,000-Server Ecosystem With No App Store
  2. Where to Find MCP Servers
  3. How to Evaluate an MCP Server Before Installing
  4. The Security Landscape: What Audits Reveal
  5. Security Best Practices
  6. Evaluation Tools
  7. The Maturity Spectrum
  8. Series Conclusion

A 15,000-Server Ecosystem With No App Store

The MCP ecosystem grew from a handful of reference implementations in late 2024 to over 15,000 publicly available servers by early 2026. There is no single, authoritative app store. Instead, servers are scattered across GitHub repositories, npm packages, community lists, and commercial platforms.

This is both the ecosystem’s strength --- anyone can build and publish a server --- and its greatest risk. Unlike browser extensions or mobile apps, MCP servers are not reviewed, sandboxed, or signed by default. When you install one, you are giving an AI agent access to tools that can read your files, query your databases, and make API calls on your behalf.

This post covers how to navigate that landscape effectively.


Where to Find MCP Servers

Official Sources

SourceURLWhat You Get
MCP Official Servers Repogithub.com/modelcontextprotocol/serversReference implementations maintained by the MCP project. The closest thing to “official” servers.
Anthropic MCP RegistryAccessible via /mcp in Claude Code or the registry APICurated list of servers verified to work with Claude Code. Includes install commands.
Vendor-Published ServersVarious (GitHub, Supabase, Sentry, etc.)Servers maintained by the service provider. Usually the most reliable option for that service.

Community-Curated Lists

SourceURLServers ListedDistinguishing Feature
Awesome MCP Servers (punkpeye)github.com/punkpeye/awesome-mcp-serversLargest GitHub listCommunity-maintained, regularly updated
MCP Awesomemcp-awesome.com1,200+ quality-verifiedVerification process filters low-quality entries
mcp.somcp.soLarge directoryFast, minimalist interface with verified badges
MCPServers.orgmcpservers.orgComprehensiveCategorization and search
MCPList.aimcplist.aiGrowingLearning resource alongside discovery
PulseMCPpulsemcp.comCuratedReal-time monitoring and community insights

Specialized Lists

Discovery Within Claude Code

Claude Code itself helps with discovery:

# List servers available in the Anthropic registry
# (accessible through the /mcp command inside Claude Code)
/mcp

The Anthropic registry dynamically loads servers that work with Claude Code and provides one-click install commands.


How to Evaluate an MCP Server Before Installing

Not all MCP servers are created equal. Before adding a server to your workflow, evaluate it across five dimensions:

1. Publisher and Maintenance

SignalGoodConcerning
PublisherOfficial vendor (GitHub, Sentry, etc.) or MCP projectUnknown individual, no org affiliation
Last commitWithin last 3 monthsOver 6 months ago
Open issuesActively triagedHundreds of stale issues
LicenseMIT, Apache 2.0, or similarNo license, or restrictive license
Stars / usage100+ stars or listed in curated directoriesUnder 10 stars, no community adoption

2. Security Posture

Questions to ask:

  • Does the server use array-based command execution (safe) or shell string interpolation (dangerous)?
  • Does it validate file paths against traversal attacks?
  • Does it scope access to specific directories or resources?
  • Does it require more permissions than its stated purpose needs?

3. Tool Count and Description Quality

  • Fewer, well-described tools are better than many vague ones
  • Each tool costs ~710 tokens of context
  • A server with 91 tools (like GitHub MCP) consumes ~46,000 tokens --- make sure you need that breadth

4. Transport Type

  • HTTP/SSE: Remote servers. Check the URL and verify the operator
  • stdio: Local servers. The npm package or binary runs on your machine --- review what it installs

5. Authentication Model

MethodSecurity LevelNotes
OAuth 2.0/2.1HighShort-lived tokens, scoped permissions
API key via environment variableModerateLong-lived but scoped; keep out of version control
Hardcoded credentialsDangerous3% of published servers contain hardcoded credentials
No authenticationVariesAcceptable for read-only public data; dangerous for anything else

The Security Landscape: What Audits Reveal

Trust Scores From Independent Audits

AgentAudit scanned the top 20 MCP servers using multiple LLM models (Gemini 2.5 Flash, Claude Opus 4, GPT-4o, Claude Haiku 4.5). Each server received a trust score out of 100:

High Trust (99-100):

  • Playwright MCP, Slack MCP, SQLite MCP, Fetch MCP (Anthropic)
  • Stripe Agent Toolkit, Supabase MCP, Linear, Sentry, Cloudflare, Firebase

Moderate Trust (65-94):

  • MongoDB (94), Qdrant (85), Git-MCP (80), Grafana (80), GitHub (78), Notion (65)

Low Trust (15-50):

  • Terraform MCP (50): Shell injection in build arguments, downloads unverified binaries
  • Chrome DevTools MCP (33): Unsanitized file writes enabling path traversal, command injection through Chrome launch arguments
  • Kubernetes MCP (15): Arbitrary command execution via KUBECONFIG_COMMAND, unauthenticated HTTP transport. Recommendation: do not use in production.

Ecosystem-Wide Vulnerability Patterns

Broader research across thousands of MCP servers reveals systemic issues:

VulnerabilityPrevalenceImpact
Path traversal susceptibility82% of implementationsArbitrary file read/write
Code injection via sensitive APIs67% of implementationsRemote code execution
Command injection34% of implementationsSystem compromise
Hardcoded credentials in source3% of published serversCredential exposure
No authentication at all38% of scanned serversUnauthorized access
Insecure long-lived static secrets53% of credential-using serversToken theft
Modern OAuth adoptionOnly 8.5%Most rely on less secure methods

Real-World Incidents

  • Supabase/Cursor breach (mid-2025): A Cursor agent running with privileged service-role access processed support tickets containing user-supplied input. Attackers embedded SQL instructions that exfiltrated sensitive integration tokens.
  • Anthropic Git MCP vulnerabilities (2025-2026): Three CVEs found in Anthropic’s own official Git MCP server --- path validation bypass, unauthorized repo creation, and file overwrite through a read-only tool.
  • Claude Code project file exploitation (CVE-2025-59536, CVE-2026-21852): Researchers demonstrated remote code execution and API token exfiltration through malicious project configuration files exploiting hooks and MCP server definitions.

These incidents underscore that even official, well-maintained servers can have vulnerabilities. The ecosystem is still maturing.


Security Best Practices

Before Installing

  1. Check the trust score if available (AgentAudit or similar tools)
  2. Review the source code --- at minimum, check how commands are executed and whether paths are validated
  3. Prefer official vendor servers over community alternatives for critical services
  4. Check for recent security advisories on the server’s GitHub repository

When Configuring

  1. Start read-only: If a server supports read-only mode, use it until you are confident in the integration
  2. Scope access narrowly: Use the most restrictive permissions possible
  3. Use environment variables for credentials: Never hardcode API keys in .mcp.json or configuration files checked into version control
{
  "mcpServers": {
    "api-server": {
      "type": "http",
      "url": "${API_URL}/mcp",
      "headers": {
        "Authorization": "Bearer ${API_KEY}"
      }
    }
  }
}
  1. Separate risky servers: If you must use a lower-trust server (like Kubernetes MCP), isolate it in a local scope and disable it when not actively needed

For Organizations

Claude Code supports managed MCP configurations for enterprise control:

  • managed-mcp.json: Deploy a fixed set of approved servers. Users cannot add, modify, or use any other servers.
  • Allowlists/denylists: Allow users to add their own servers within policy constraints.
{
  "allowedMcpServers": [
    { "serverName": "github" },
    { "serverUrl": "https://mcp.company.com/*" },
    { "serverCommand": ["npx", "-y", "approved-package"] }
  ],
  "deniedMcpServers": [
    { "serverName": "dangerous-server" },
    { "serverUrl": "https://*.untrusted.com/*" }
  ]
}

Managed configuration files go in system-wide directories:

  • macOS: /Library/Application Support/ClaudeCode/managed-mcp.json
  • Linux/WSL: /etc/claude-code/managed-mcp.json
  • Windows: C:\Program Files\ClaudeCode\managed-mcp.json

Evaluation Tools

ToolURLPurpose
AgentAuditVariousScans MCP servers with multiple LLM models for 12 vulnerability patterns
mcpserver-finderGitHubCloud Security Alliance project for quality, security, and safety evaluation
MCP Security ChecklistGitHub (SlowMist)Comprehensive checklist for evaluating MCP-based AI tools

The Maturity Spectrum

The MCP ecosystem sits at an interesting inflection point. On one end, you have production-grade servers from major vendors --- GitHub, Sentry, Stripe, Cloudflare --- with professional security practices, OAuth support, and active maintenance. On the other end, you have thousands of community servers of wildly varying quality, some with hardcoded credentials in their source code.

The practical approach:

  1. For critical workflows (database access, cloud infrastructure, payment systems): Use only official vendor servers or servers with trust scores above 90.
  2. For convenience tools (documentation lookup, web search): Community servers with moderate trust scores are acceptable, especially if they are read-only.
  3. For experimentation: Try anything, but in a sandboxed environment or with minimal permissions.

The ecosystem will mature. Security tooling will improve. But right now, the responsibility for evaluation falls on you. The tools and frameworks in this post give you a systematic way to make that evaluation.


Series Conclusion

Across these five posts, we have covered the full lifecycle of MCP servers in Claude Code:

  1. Configuration: CLI commands, transport types, scopes, and how it differs from Cursor
  2. Context management: How tools consume tokens, Tool Search, and optimization strategies
  3. Server selection: Role-specific recommendations to start with what matters
  4. Comparisons: Head-to-head analysis when multiple servers solve the same problem
  5. Ecosystem: Discovery, evaluation, and security

The MCP ecosystem is moving fast. New servers appear weekly, security practices are improving, and Claude Code’s Tool Search makes it practical to work with large numbers of servers without sacrificing context. The key is to be deliberate about what you install, understand the tradeoffs, and evaluate security before granting access to your tools and data.

Sources & References

  1. Official MCP Servers Repository (accessed 2026-03-08)
  2. Anthropic MCP Registry API (accessed 2026-03-08)
  3. Claude Code MCP Documentation (accessed 2026-03-08)
  4. Awesome MCP Servers (punkpeye) (accessed 2026-03-08)
  5. MCP Awesome - Quality-Verified Directory (accessed 2026-03-08)
  6. mcp.so - MCP Server Directory (accessed 2026-03-08)
  7. MCPServers.org (accessed 2026-03-08)
  8. MCPList.ai (accessed 2026-03-08)
  9. PulseMCP - Real-Time MCP Monitoring (accessed 2026-03-08)
  10. Awesome DevOps MCP Servers (accessed 2026-03-08)
  11. AgentAudit: Top 20 MCP Server Security Scan (accessed 2026-03-08)
  12. SlowMist MCP Security Checklist (accessed 2026-03-08)
  13. MCP Server Finder (Cloud Security Alliance) (accessed 2026-03-08)
  14. Clutch Security: MCP Servers Investigation (accessed 2026-03-08)
  15. Astrix: State of MCP Server Security 2025 (accessed 2026-03-08)
  16. Check Point: Claude Code CVE Research (CVE-2025-59536) (accessed 2026-03-08)
  17. Endor Labs: Classic Vulnerabilities in MCP (accessed 2026-03-08)
  18. Infosecurity: Prompt Injection in Anthropic Git MCP (accessed 2026-03-08)
  19. 10 Microsoft MCP Servers (accessed 2026-03-08)

Sources compiled from the MCP ecosystem research project. Official documentation, community directories, and independent security audits were used to verify server trust scores, vulnerability statistics, and real-world incident details. All URLs were sourced from the article content and the companion research resources file.