A free, browser-based diagnostic that tests any Model Context Protocol server against the official specification. Paste a URL, get an instant A+ to F compliance grade — across 34 automated checks in 7 categories.
Transport connectivity · JSON-RPC 2.0 protocol validation · OAuth 2.1 authorization · TLS and security hardening · Tool schema quality · Trust and safety scanning · Performance benchmarks — every failed check includes step-by-step remediation. No download, no CLI, no sign-up.
Why test your MCP server?
AI agents rely on the Model Context Protocol to discover and invoke server-side tools. A misconfigured endpoint — a missing capability declaration, an invalid JSON-RPC envelope, or an insecure CORS policy — can silently break tool discovery for every connected client. The MCP Inspector catches these issues before your users do, validating compliance against the MCP specification revision 2025-11-25 in under 15 seconds.
Who is it for?
Developers building MCP servers, platform teams integrating AI agents into production workflows, and security engineers auditing third-party tool providers. Whether you maintain a single-tool server or an enterprise gateway exposing hundreds of capabilities, the Inspector provides the same rigorous, specification-grounded analysis — completely free, with no authentication required.
What does the Inspector check?
Each scan executes 34 automated checks organized into 7 categories: DNS resolution and TLS certificate validation, JSON-RPC 2.0 protocol conformance, OAuth 2.1 authorization flow discovery, server security hardening (HTTPS enforcement, version leak detection, CORS policy), tool schema quality (input schema validation, naming conventions, unique tool names), trust and safety scanning (prompt injection, invisible Unicode, encoded payload detection), and performance benchmarking (initialize and tools/list latency thresholds).
How is the compliance grade calculated?
The overall score is a weighted average across all 7 categories, with each check mapped to a MUST, SHOULD, or MAY clause in the official MCP specification. Critical failures — such as plaintext HTTP or invalid JSON-RPC responses — immediately cap the maximum achievable grade. The final result is an A+ to F letter grade with a numeric score out of 100, accompanied by a per-check breakdown showing pass, fail, skip, or warning status with actionable remediation steps linked directly to the relevant specification section.