Dredd MCP
Pre-flight MCP security. Blocks compromised deps + tool drift. HMAC-signed. Dredd judges.
Ask AI about Dredd MCP
Powered by Claude Β· Grounded in docs
I know everything about Dredd MCP. Ask me about installation, configuration, usage, or troubleshooting.
0/500
Reviews
Documentation
Dredd MCP β Pre-Flight Security for the MCP Ecosystem
"Jeevesus saves. Dredd judges."
Dredd MCP is a pre-invocation security check for the Model Context Protocol ecosystem. Before your agent calls a tool on any other MCP server, Dredd renders a verdict: BLOCK, ADVISORY, or ALLOW. Every verdict is HMAC-signed and cites the IOC or behavioral signal that drove the decision.
The MCP ecosystem has had no defender. Three PyPI ML packages were compromised in eight days during late April 2026. Twenty-plus MCP-named GitHub repositories were caught serving SmartLoader malware in the wild. The official MCP Registry was clean of those when we measured β but the typosquat surface is wide open.
Dredd is the layer that catches the next compromise before the malicious tool gets called.
What Dredd Checks
Every preflight call evaluates four signals:
- Compromised dependency. The target server's package manifest is parsed and joined against our continuously updated IOC corpus (Socket, Aikido, GitGuardian, ReversingLabs, Phylum, StepSecurity, Wiz). If the server pins
lightning==2.6.2or any other known-compromised version, the call is blocked. - Tool surface drift. The list of tools the server exposes today versus the snapshot the user originally approved. New tools that appeared since the last review trigger an advisory. Mid-session rugpull is the threat model.
- Remote URL drift. The server's runtime endpoint compared against the URL it published in the registry. A server quietly calling out to a different host than the one you signed up for is a hijack signature.
- Permission escalation. A server requesting write or exec permissions it did not have last week.
The verdict comes back signed in under 200 ms (Cloudflare-edge cached, 5-minute TTL). The hook fails open by default β if our endpoint is ever down, Dredd does not brick your tooling.
Install β Claude Desktop
Add to your claude_desktop_config.json:
{
"mcpServers": {
"dredd": {
"url": "https://analytics.dugganusa.com/api/v1/dredd/mcp"
}
}
}
Restart Claude Desktop. You'll see Dredd available with one tool: check_mcp_server.
Install β Cursor
Add to ~/.cursor/mcp.json:
{
"mcpServers": {
"dredd": {
"url": "https://analytics.dugganusa.com/api/v1/dredd/mcp"
}
}
}
Test from terminal
curl -X POST https://analytics.dugganusa.com/api/v1/dredd/mcp \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/list"}'
You should see one tool: check_mcp_server.
The Tool
check_mcp_server
| Argument | Type | Required | Description |
|---|---|---|---|
server | string | yes | MCP server name (e.g. io.github.foo/bar) or substring |
version | string | no | Optional semver of the server |
tool | string | no | Optional name of the specific tool being invoked |
Returns a JSON verdict:
{
"success": true,
"server": "io.github.foo/bar",
"version": "1.2.3",
"tool": "list_files",
"verdict": "ALLOW",
"severity": "clean",
"findings_count": 0,
"findings": [],
"checked_at": "2026-05-04T20:00:00Z",
"ttl_seconds": 300,
"signature": "sha256=..."
}
Verdict values:
| Verdict | Severity tier | What to do |
|---|---|---|
BLOCK | critical or high | Refuse the invocation. Do not call the target tool. |
ADVISORY | medium or advisory | Surface to the user; let them decide. |
ALLOW | clean | Proceed. |
The signature field is an HMAC-SHA256 of the canonical verdict body using a server-side secret. Hooks should verify this to defeat MITM-forged "all clear" responses (verification key distributed out of band on request).
The Public Watchtower
Real-time aggregate dashboard of every active finding across the registry β free, no auth, no email gate:
https://analytics.dugganusa.com/api/v1/dredd/watchtower.json
Returns counts by severity, recent findings, current verdict (CLEAN / WATCH / HIGH / CRITICAL).
Updated continuously as the daily fetcher + correlator pipeline runs against the registered MCP corpus.
How Dredd Works
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β Your Agent (Claude Desktop / Cursor / custom) β
β calls check_mcp_server(server, version, tool)β
βββββββββββββββββββ¬ββββββββββββββββββββββββββββββββ
β JSON-RPC over HTTPS
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββ
β Dredd MCP β analytics.dugganusa.com/api/v1/dredd/mcp β
β - look up findings for (server, version, tool)β
β - aggregate severity, render verdict β
β - HMAC-sign canonical verdict β
ββββββββββββββββββ¬ββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββ
β mcp_findings index β populated by β
β daily fetcher + correlator joining β
β mcp_dependencies Γ IOC corpus β
β (Socket, Aikido, GitGuardian, ReversingLabs) β
ββββββββββββββββββββββββββββββββββββββββββββββββββ
The correlation cadence today is 12 hours (08:30 UTC and 20:30 UTC). When a real compromise lands in the registered-MCP corpus, cadence tightens.
Trust Posture
- HMAC-signed responses. Hook implementations should verify the
signaturefield on every verdict. - Fail-open by default. If our endpoint is down, Dredd does not brick your tooling β it returns "advisory: backend unavailable" and lets the user decide. Document override (
DREDD_BYPASS=<reason>) for critical workflows. - Read-only. Dredd never modifies your environment. Verdict only.
- No tool argument leakage. Hooks should send
(server, version, tool)only β never the contents of tool arguments. Those stay on your machine. - 95% epistemic ceiling. We cap our claims at 95% per DugganUSA's epistemic humility rule. Coverage gap: about 60-70% of MCP servers in the registry today don't expose a public source repository, which means Dredd cannot inspect their dependency tree. The advisory tier exists for those.
The Family
Dredd is the 13th member of the DugganUSA defender family β and the first MCP-native member:
dugganusa-scanner-coreβ Core IOC scanning enginedugganusa-vscodeβ VS Code extensiondugganusa-splunkβ Splunk Technology Add-ondugganusa-slackβ Slack botdugganusa-raycastβ Raycast extensiondugganusa-sentinelβ Microsoft Sentinel TAXII connectordugganusa-obsidianβ Obsidian plugindugganusa-nvimβ Neovim plugindugganusa-elasticβ Elastic / OpenSearch integrationdugganusa-edge-shieldβ Cloudflare Workerdugganusa-cliβ CLI scannerdugganusa-chromeβ Chrome extensiondugganusa-actionβ GitHub Action
Companion MCP server: Jeevesus β natural-language threat intelligence search across 17.9M documents. Jeevesus saves. Dredd judges.
License
MIT β see LICENSE.
Support
- Watchtower dashboard: analytics.dugganusa.com/api/v1/dredd/watchtower.json
- Issues: github.com/pduggusa/dredd-mcp/issues
- DugganUSA blog: www.dugganusa.com
Built in Minneapolis. Defender-grade. Read-only. Receipts do the work.
DugganUSA Defender Family
Same threat corpus, surfaced wherever you live. Open source, MIT licensed, receipts on every repo.
| Plugin | Surface |
|---|---|
| dugganusa-scanner-core | Core IOC scanning engine |
| dugganusa-vscode | VS Code extension |
| dugganusa-splunk | Splunk Technology Add-on |
| dugganusa-slack | Slack bot |
| dugganusa-raycast | Raycast extension |
| dugganusa-sentinel | Microsoft Sentinel TAXII connector |
| dugganusa-obsidian | Obsidian plugin |
| dugganusa-nvim | Neovim plugin |
| dugganusa-elastic | Elastic / OpenSearch integration |
| dugganusa-edge-shield | Cloudflare Worker |
| dugganusa-cli | CLI scanner |
| dugganusa-chrome | Chrome extension |
| dugganusa-action | GitHub Action |
| dredd-mcp (this repo) | Pre-flight MCP security (this repo) |
Backed by the live DugganUSA threat intel platform: analytics.dugganusa.com.
Jeevesus saves. Dredd judges.
