co-browser/attestable-mcp-server
An MCP server running inside a trusted execution environment, enabling remote attestation and secure server verification for MCP clients.
About this tool
co-browser/attestable-mcp-server
Overview
co-browser/attestable-mcp-server is an MCP (Multi-Party Computation) server designed to run inside a trusted execution environment (TEE). It enables remote attestation and secure server verification for MCP clients, allowing verification that the server is running intended and untampered code.
Features
- Remote Attestation: Supports remote attestation for MCP clients using RA-TLS, an extension to TLS that includes machine and code-specific measurements.
- Trusted Execution Environment (TEE): Runs within a TEE, generating a certificate that represents the currently running code.
- SGX Integration: Embeds an SGX quote in the X.509 certificate via a standardized extension, including the SGX report and complete Intel SGX certificate chain.
- Evidence Claims: The certificate contains evidence claims, notably a "pubkey-hash" claim with the hash of the ephemeral public key generated by the TEE.
- Verification: Clients can independently validate the attestation by building and running the code locally on emulated or secure hardware.
- Signed Artifacts: GitHub Actions build a Docker image inside a TEE and generate a signed attestation of the code. The resulting Docker image is signed by GitHub, and users can reproduce and verify the attestation independently.
- Docker Support: Provides Dockerfile and scripts for containerized deployment.
- Local and Secure Hardware Support: Can be started both on secure hardware and local development machines.
Pricing
No pricing information is provided. The project appears to be open-source.
Tags
mcp, security, attestation, trusted-execution, verification
Category
security-attestation-mcp-servers
Loading more......
Information
Categories
Similar Products
6 result(s)MCP server running inside a trusted execution environment (TEE) via Gramine, showcasing remote attestation using RA-TLS.
An MCP Server for DataTrails (formerly RKVST), exposing APIs to add provenance and verify authenticity of digital content within MCP-automated workflows.
MCP server designed for analyzing ROADrecon gather results from Azure tenant enumeration, illustrating specialized security analysis via MCP servers.
A Model Context Protocol (MCP) server to enforce CISA BOD 25-01 security controls for Microsoft 365 via Microsoft Graph API, enabling automated policy management and compliance monitoring.
Integrates with Dafny for code correctness verification via formal specification analysis—a specialized MCP server for formal methods and verification.
A secure MCP server for executing shell commands with robust security controls, enabling protected command-line operations. Directly relevant as a widely-used MCP server for secure CLI automation.