Server data from the Official MCP Registry
Pre-flight MCP security. Blocks compromised deps + tool drift. HMAC-signed. Dredd judges.
Pre-flight MCP security. Blocks compromised deps + tool drift. HMAC-signed. Dredd judges.
Remote endpoints: streamable-http: https://analytics.dugganusa.com/api/v1/dredd/mcp
Valid MCP server (1 strong, 1 medium validity signals). No known CVEs in dependencies. Imported from the Official MCP Registry.
1 tool verified · Open access · No issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Remote Plugin
No local installation needed. Your AI client connects to the remote endpoint directly.
Add this to your MCP configuration to connect:
{
"mcpServers": {
"io-github-pduggusa-dredd-mcp": {
"url": "https://analytics.dugganusa.com/api/v1/dredd/mcp"
}
}
}From the project's GitHub README.
"Jeevesus saves. Dredd judges."
Dredd MCP is a pre-invocation security check for the Model Context Protocol ecosystem. Before your agent calls a tool on any other MCP server, Dredd renders a verdict: BLOCK, ADVISORY, or ALLOW. Every verdict is HMAC-signed and cites the IOC or behavioral signal that drove the decision.
The MCP ecosystem has had no defender. Three PyPI ML packages were compromised in eight days during late April 2026. Twenty-plus MCP-named GitHub repositories were caught serving SmartLoader malware in the wild. The official MCP Registry was clean of those when we measured — but the typosquat surface is wide open.
Dredd is the layer that catches the next compromise before the malicious tool gets called.
Every preflight call evaluates four signals:
lightning==2.6.2 or any other known-compromised version, the call is blocked.The verdict comes back signed in under 200 ms (Cloudflare-edge cached, 5-minute TTL). The hook fails open by default — if our endpoint is ever down, Dredd does not brick your tooling.
Add to your claude_desktop_config.json:
{
"mcpServers": {
"dredd": {
"url": "https://analytics.dugganusa.com/api/v1/dredd/mcp"
}
}
}
Restart Claude Desktop. You'll see Dredd available with one tool: check_mcp_server.
Add to ~/.cursor/mcp.json:
{
"mcpServers": {
"dredd": {
"url": "https://analytics.dugganusa.com/api/v1/dredd/mcp"
}
}
}
curl -X POST https://analytics.dugganusa.com/api/v1/dredd/mcp \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/list"}'
You should see one tool: check_mcp_server.
check_mcp_server| Argument | Type | Required | Description |
|---|---|---|---|
server | string | yes | MCP server name (e.g. io.github.foo/bar) or substring |
version | string | no | Optional semver of the server |
tool | string | no | Optional name of the specific tool being invoked |
Returns a JSON verdict:
{
"success": true,
"server": "io.github.foo/bar",
"version": "1.2.3",
"tool": "list_files",
"verdict": "ALLOW",
"severity": "clean",
"findings_count": 0,
"findings": [],
"checked_at": "2026-05-04T20:00:00Z",
"ttl_seconds": 300,
"signature": "sha256=..."
}
Verdict values:
| Verdict | Severity tier | What to do |
|---|---|---|
BLOCK | critical or high | Refuse the invocation. Do not call the target tool. |
ADVISORY | medium or advisory | Surface to the user; let them decide. |
ALLOW | clean | Proceed. |
The signature field is an HMAC-SHA256 of the canonical verdict body using a server-side secret. Hooks should verify this to defeat MITM-forged "all clear" responses (verification key distributed out of band on request).
Real-time aggregate dashboard of every active finding across the registry — free, no auth, no email gate:
https://analytics.dugganusa.com/api/v1/dredd/watchtower.json
Returns counts by severity, recent findings, current verdict (CLEAN / WATCH / HIGH / CRITICAL).
Updated continuously as the daily fetcher + correlator pipeline runs against the registered MCP corpus.
┌─────────────────────────────────────────────────┐
│ Your Agent (Claude Desktop / Cursor / custom) │
│ calls check_mcp_server(server, version, tool)│
└─────────────────┬───────────────────────────────┘
│ JSON-RPC over HTTPS
▼
┌────────────────────────────────────────────────┐
│ Dredd MCP — analytics.dugganusa.com/api/v1/dredd/mcp │
│ - look up findings for (server, version, tool)│
│ - aggregate severity, render verdict │
│ - HMAC-sign canonical verdict │
└────────────────┬───────────────────────────────┘
│
▼
┌────────────────────────────────────────────────┐
│ mcp_findings index — populated by │
│ daily fetcher + correlator joining │
│ mcp_dependencies × IOC corpus │
│ (Socket, Aikido, GitGuardian, ReversingLabs) │
└────────────────────────────────────────────────┘
The correlation cadence today is 12 hours (08:30 UTC and 20:30 UTC). When a real compromise lands in the registered-MCP corpus, cadence tightens.
signature field on every verdict.DREDD_BYPASS=<reason>) for critical workflows.(server, version, tool) only — never the contents of tool arguments. Those stay on your machine.Dredd is the 13th member of the DugganUSA defender family — and the first MCP-native member:
dugganusa-scanner-core — Core IOC scanning enginedugganusa-vscode — VS Code extensiondugganusa-splunk — Splunk Technology Add-ondugganusa-slack — Slack botdugganusa-raycast — Raycast extensiondugganusa-sentinel — Microsoft Sentinel TAXII connectordugganusa-obsidian — Obsidian plugindugganusa-nvim — Neovim plugindugganusa-elastic — Elastic / OpenSearch integrationdugganusa-edge-shield — Cloudflare Workerdugganusa-cli — CLI scannerdugganusa-chrome — Chrome extensiondugganusa-action — GitHub ActionCompanion MCP server: Jeevesus — natural-language threat intelligence search across 17.9M documents. Jeevesus saves. Dredd judges.
MIT — see LICENSE.
Built in Minneapolis. Defender-grade. Read-only. Receipts do the work.
Same threat corpus, surfaced wherever you live. Open source, MIT licensed, receipts on every repo.
| Plugin | Surface |
|---|---|
| dugganusa-scanner-core | Core IOC scanning engine |
| dugganusa-vscode | VS Code extension |
| dugganusa-splunk | Splunk Technology Add-on |
| dugganusa-slack | Slack bot |
| dugganusa-raycast | Raycast extension |
| dugganusa-sentinel | Microsoft Sentinel TAXII connector |
| dugganusa-obsidian | Obsidian plugin |
| dugganusa-nvim | Neovim plugin |
| dugganusa-elastic | Elastic / OpenSearch integration |
| dugganusa-edge-shield | Cloudflare Worker |
| dugganusa-cli | CLI scanner |
| dugganusa-chrome | Chrome extension |
| dugganusa-action | GitHub Action |
| dredd-mcp (this repo) | Pre-flight MCP security (this repo) |
Backed by the live DugganUSA threat intel platform: analytics.dugganusa.com.
Jeevesus saves. Dredd judges.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.