Skip to content
You are offline. Some features may be unavailable.
Vendor Diligence

Vendor diligence and buyer proof for AI systems.

Use CraftedTrust when security, procurement, engineering, or platform teams need clearer evidence for an external AI system, including MCP vendors and higher-risk integrations.

Security review Procurement Engineering Platform teams Risk owners

CraftedTrust is an input to approval, not a substitute for it.

Start with the evidence you can collect. Use platform inventory, vendor diligence, MCP Trust signals, and public research to decide whether a system looks ready for approval, needs deeper review, or should wait. CraftedTrust helps teams evaluate what is visible and documented. It does not replace internal security review, legal review, or environment-specific controls.
Inventory

Know what is actually in scope

Track the assistant, agent, vendor, owner, approval state, and the data or systems it touches before review gets fragmented.

Vendor review

Organize review-ready evidence

Capture public proof, policy notes, open questions, and decision status in one place instead of scattered threads and spreadsheets.

MCP-specific proof

Use MCP Trust when the integration is public MCP

Registry score, scan depth, certification status, and linked research become concrete inputs when an MCP server is part of the decision.

Runtime follow-through

Add runtime evidence only when needed

Higher-risk systems can move into runtime telemetry and policy checks instead of relying on a pre-approval packet alone.

What you can review

Available evidence before approval

  • Inventory records with owner, vendor, and approval status.
  • Public trust signals and buyer proof for MCP systems when relevant.
  • Touchstone research, advisories, and control mappings.
  • Policy notes, evidence gaps, and review history.
What still belongs to the buyer

Decisions CraftedTrust does not make

  • Confirm permissions, data flows, and internal rollout controls.
  • Decide whether the residual risk fits your own environment.
  • Validate legal, privacy, and contract requirements.
  • Re-check point-in-time evidence when a system materially changes.

Questions enterprise buyers now ask

Buyer-ready evidence for MCP, A2A, and connected agents is getting more specific.

Review prompts
  • Which MCP or A2A endpoints are approved?
  • How are they authenticated?
  • Are tool calls validated and logged?
  • How is third-party access monitored?
  • Can you export evidence quickly?
What CraftedTrust packages

This is where CraftedTrust becomes more useful than a public score alone. Registry evidence, buyer proof, identity context, research, and approval notes can be packaged into a buyer-facing review path instead of scattered across separate teams.

Program paths

What usually comes next

  • Use AI Inventory when the real blocker is visibility.
  • Use MCP Trust when the buyer needs public MCP proof.
  • Use Platform Support when the review crosses multiple systems or private environments.
Data handling

Public trust material stays public by design

  • MCP registry profiles, scans, and certification states are public artifacts.
  • Private rollout notes and guided scope details stay inside the support workflow.
  • Canonical handling details live in the privacy policy and data-handling documentation.

Next step

Use Vendor Diligence when the decision starts with a broader AI system or external vendor. Use MCP Trust when the decision centers on a public MCP integration and the buyer needs public proof fast.
Decision note Trust signals and review packets support judgment. They do not replace it.