Skip to content
You are offline. Some features may be unavailable.
Evidence Standards

How CraftedTrust turns evidence into buyer-readable trust.

CraftedTrust uses one evidence model across AI Governance, MCP Trust, Runtime Gateway, and Touchstone. MCP Trust is the public scoring and certification layer inside that broader platform.

Where these standards apply

The platform shares one evidence model, but MCP Trust is the public surface with the most visible scoring logic.

AI Governance

Inventory, review state, and evidence requirements

The platform uses structured evidence so teams can see what exists, what has been reviewed, and what still needs proof.

MCP Trust

12 public categories with scan-depth context

The public MCP score stays simple on purpose: 12 weighted categories, 63 underlying checks, and explicit scan-depth labels.

Runtime Gateway

Runtime evidence where risk justifies it

Runtime controls do not replace the public trust model. They add live evidence when a deployment needs stronger assurances.

Touchstone

Research, advisories, and control mappings

Touchstone explains why a finding matters and how it maps into broader governance and control conversations.

The 12 public MCP Trust score categories

These are the only categories used in the public MCP Trust score.

Authentication & Access

Identity & Auth

10 points. Auth requirements, documented auth flow, and obvious credential-handling risk.

Authentication & Access

Permission Scope

8 points. Whether the server asks for more power than it appears to need.

Server Security

Transport Security

8 points. HTTPS, TLS posture, and basic transport-layer safety signals.

Server Security

Network Behavior

10 points. Observed outbound behavior, undeclared connections, and suspicious network activity.

Server Security

Protocol Compliance

8 points. MCP compatibility, capability negotiation, and basic protocol correctness.

Tool Safety

Declaration Accuracy

8 points. Whether declared tools and resources match what is actually exposed.

Tool Safety

Tool Integrity

10 points. Prompt-injection risk, tool tampering patterns, and risky hidden behavior.

Tool Safety

Input Validation

8 points. Input constraints, schema quality, and common injection resistance signals.

Supply Chain

Supply Chain

8 points. Dependency risk, package provenance, and known vulnerability exposure.

Supply Chain

Code Transparency

6 points. Source availability, repository health, and basic documentation quality.

Supply Chain

Publisher Trust

8 points. Verified publisher signals, review history, and public accountability.

Data Handling

Data Protection

8 points. Exposure of credentials, sensitive data, and avoidable data-handling risk.

How the 63 checks feed the 12 categories

Touchstone organizes its deeper checks into 9 research domains. Those domains do not replace the public MCP score. They feed it.

Research domain Checks Feeds these public categories
Authentication 9 Identity & Auth, Permission Scope
Tool Security 10 Declaration Accuracy, Tool Integrity
Input Validation 9 Input Validation, Data Protection
Data Security 6 Data Protection, Network Behavior
Supply Chain 8 Supply Chain, Code Transparency, Publisher Trust
Infrastructure 8 Transport Security, Network Behavior, Protocol Compliance
Runtime Behavior 5 Tool Integrity, Network Behavior, Protocol Compliance
A2A Agent Cards 5 Declaration Accuracy, Protocol Compliance
Fairness & Bias 3 Data Protection, Publisher Trust

Not every check carries the same weight, and not every scan runs every check. That is why CraftedTrust separates the public score categories from the underlying research domains and then shows scan depth and confidence separately.

Emerging standards direction

AIUC-1 is pushing toward technical, protocol-aware controls, while ISO 42001 remains governance and management-system oriented.

AIUC-1 direction

Technical controls are moving closer to MCP, A2A, identity, and monitoring

The Apr 15, 2026 AIUC-1 update emphasized approved interfaces, stronger authentication and transport, tool-call validation and logging, third-party access monitoring, and verifiable agent identities. That is a more protocol-aware direction than checklist-only governance.

ISO 42001 direction

Governance documentation still matters

ISO 42001 remains valuable because it is built around governance, ownership, policy, and management-system discipline. It helps show organizational due diligence even when it does not prescribe the technical testing detail that agentic systems increasingly need.

CraftedTrust is the evidence layer between the two

CraftedTrust helps teams show both operational governance and technical proof. It is more technical than checklist-only governance, and more useful than a public score alone when buyers need a review-ready packet.

Scan depth and confidence

The same MCP server can have a strong or weak evidence base depending on how much was actually observed.

Depth 1

Metadata only

Basic listing information is present, but package or live behavior has not been fully verified yet. Lowest confidence.

Depth 2

Package verified

Package and source metadata were reviewed. Useful for supply-chain evidence, but still lighter than a live scan.

Depth 3

Live endpoint reached

CraftedTrust successfully contacted the live server and recorded behavior. This is stronger evidence for buyer review.

Depth 4

Manual review performed

A deeper publisher review or certification pass exists. This adds the strongest public confidence signal.

Grades

Letter grades stay fixed

  • A: 90-100
  • B: 75-89
  • C: 60-74
  • D: 40-59
  • F: 0-39
Framework mapping

Support material, not a second score

CoSAI, OWASP MCP and agentic AI guidance, and selected buyer-diligence mappings help translate findings. They do not replace the core 12-category MCP Trust score model.