MCP server running inside a trusted execution environment (TEE) via Gramine, showcasing remote attestation using RA-TLS.
Loading more......
An MCP server running inside a trusted execution environment, enabling remote attestation and secure server verification for MCP clients.
Bridges to the Binalyze AIR digital forensics platform, providing endpoint security management through an MCP server.
MCP server designed for analyzing ROADrecon gather results from Azure tenant enumeration, illustrating specialized security analysis via MCP servers.
A Model Context Protocol (MCP) server to enforce CISA BOD 25-01 security controls for Microsoft 365 via Microsoft Graph API, enabling automated policy management and compliance monitoring.
Enables security professionals to analyze Active Directory and Azure AD environments through natural language queries by connecting to BloodHound's Neo4j database. Provides a concrete MCP server example for security/IT. (Merged with 'Bloodhound MCP AI')
Bridges to the DefectDojo vulnerability management system, enabling interaction with security findings, products, and engagements via the Model Context Protocol. Relevant as an MCP server integration for security workflows.
Category: security-attestation-mcp-servers
Tags: attestation, trusted-execution, security, verification
Attestable Server is an MCP server that runs inside a trusted execution environment (TEE) using Gramine. It showcases remote attestation capabilities via RA-TLS, allowing secure and verifiable operation of the server.
No pricing information provided. The repository and server are open source under the MIT License.