Beyond Discovery: Should MCP define a standard for Trust, Proof, and Reputation signals? #2523
ToolOracle
started this conversation in
Ideas - General
Replies: 2 comments 4 replies
-
|
For financial MCP tools, the reputation layer already exists. It's the on-chain execution record. Every trade through flipcoin-mcp is an immutable entry on Base: win rates, P&L, all auditable without trusting any server response. The .well-known/mcp-trust.json approach makes sense for off-chain tools where no external record exists. When tool effects settle on-chain, the blockchain is the trust record. Can't be tampered with after the fact. github.com/flipcoin-fun/flipcoin-mcp |
Beta Was this translation helpful? Give feedback.
4 replies
This comment was marked as spam.
This comment was marked as spam.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
The Problem
MCP has solved tool discovery and execution. But as MCP servers proliferate (200+ official integrations, thousands of community servers), a new problem emerges:
How does an AI agent decide which MCP server to trust?
Today, when an agent finds two MCP servers offering similar tools, it has no machine-readable way to evaluate:
What We Observed
We built a signal scanner that measures how "agent-ready" a domain is across 11 layers. We scanned major platforms:
Every platform has Presence and basic Capability (they serve HTTP, they have APIs). But almost none provide machine-readable Trust, Proof, or Reputation signals.
The Layers We Think Are Missing from MCP
MCP currently covers:
tools/list,resources/listtools/callWhat's missing for autonomous agent-to-agent commerce:
Why This Matters
As MCP moves toward autonomous agent workflows (agents calling agents calling tools), trust becomes critical. An agent executing a financial transaction needs to know:
Without these signals, agents have to trust blindly — which is exactly what we're trying to move away from.
What We Built (open for discussion)
We've been experimenting with what we call "signal layers" for MCP servers:
/.well-known/oraclenet.json— machine-readable trust profileLive example: Our compliance MCP server at
mcp.tooloracle.io/compliance/mcp/signs everycompliance_preflightresponse and anchors evidence on Arbitrum One (example tx).Questions for the Community
Should MCP define a standard extension for signed responses? Something like
signaturefield in tool results with algorithm, key ID, and hash.Should there be a standard
.well-known/mcp-trust.jsonfor MCP servers to declare their trust properties (signing keys, audit trail, uptime, pricing)?Is response signing something that belongs in the MCP spec, or should it be a community convention?
How do others handle the "which MCP server do I trust?" problem in production?
We'd love to hear how others are thinking about this. The tools layer is solved — the trust layer is the next frontier.
Built by ToolOracle — 98+ MCP servers, 1000+ tools. Scanner: tooloracle.io/scan
Beta Was this translation helpful? Give feedback.
All reactions