MCP Supply Chain Analytics

Monitor your entire MCP ecosystem with comprehensive supply chain visibility. Track server verification status, attestation health, capability drift, and agent-MCP dependencies from a single dashboard.

MCP Supply Chain Analytics Dashboard

Key Features

Confidence Score Distribution

Visual breakdown of server trust levels (High/Good/Medium/Low) across your organization

Attestation Activity Trends

7-day graph showing attestation patterns and verification activity

Capability Drift Alerts

Automatic detection when MCP server tools change unexpectedly

Agent-MCP Dependencies

Track which agents depend on which MCP servers

Dashboard Metrics

MetricDescription
Total MCP ServersAll servers registered in your organization
Verified ServersServers that have passed attestation verification
Pending VerificationServers awaiting first attestation
Avg Confidence ScoreAverage trust score across all servers
Agent-MCP ConnectionsTotal active connections between agents and MCP servers
Drift AlertsNumber of capability drift alerts requiring attention

Confidence Score Distribution

Servers are categorized by their confidence level based on attestation history, verification status, and usage patterns:

High (90-100%)

Multiple attestations, stable capabilities, fully verified

Good (70-89%)

Verified with regular attestations

Medium (50-69%)

Few attestations, needs more verification

Low (0-49%)

Unverified or suspicious activity detected

CLI Commands for MCP Supply Chain

The OpenA2A CLI provides commands for auditing and securing MCP servers from the terminal. These commands work locally without requiring the AIM platform server.

# Audit all MCP servers in your configuration
opena2a mcp audit

# Output:
# Scanning claude_desktop_config.json...
# Found 4 MCP servers
# [WARN] github-mcp: unsigned, no attestation
# [PASS] filesystem-mcp: signed, 12 attestations, confidence 94%
# [WARN] postgres-mcp: signed, 2 attestations, confidence 68%
# [PASS] slack-mcp: signed, 8 attestations, confidence 88%

# Sign an MCP server with your agent identity
opena2a mcp sign --server filesystem-mcp

# Check trust scores from the registry
opena2a mcp trust --server github-mcp

# Output:
# Server: github-mcp
# Trust Score: 45/100
# Attestations: 0
# Status: UNVERIFIED
# Recommendation: Create an attestation to establish trust

Supply chain risks in MCP include unsigned servers running arbitrary code, capability drift where servers silently add new tools, and dependency confusion where a malicious server impersonates a legitimate one. These commands help detect and mitigate those risks.

Auto-Attestation

Zero-Friction Verification

The SDK automatically creates attestations on first tool use. No manual intervention required.

How Auto-Attestation Works:

  1. 1First Tool Use: Agent uses an MCP tool for the first time
  2. 2Automatic Discovery: SDK discovers server capabilities
  3. 3Create Attestation: Attestation created with discovered tools
  4. 4Update Confidence: Server confidence score increases

Capability Drift Detection

Detect Unexpected Changes

AIM detects MCP server capability drift - when a server's available tools change from the baseline.

What Triggers Alerts:

  • + New tools added to MCP server
  • - Tools removed from MCP server
  • ~ Tool parameters changed
  • ! Permission scope expanded

Alert Actions:

  • Review drift in dashboard
  • Approve changes to update baseline
  • Reject and investigate suspicious changes
  • Auto-approve trusted patterns

Server Dependencies

The Supply Chain Analytics dashboard shows all MCP servers with their verification status and dependencies:

Server Details Include:

  • Verification status (verified/pending)
  • Confidence score percentage
  • Number of attestations
  • Available capabilities (tools)
  • Last attestation timestamp
  • Connected agents count

Accessing the Dashboard

Navigate to the Supply Chain Analytics dashboard:

http://localhost:3000/dashboard/mcp/supply-chain

Or click MCP Servers → Supply Chain in the dashboard sidebar.