Find out in under 4 minutes whether MCP servers are running on governable credentials and least-privilege scopes — or on broad, brittle, and poorly owned access.
This is a governance screen for credential issuance, scope discipline, storage, rotation, revocation, and ownership across MCP-connected access paths. It is not a secrets scanner, not a gateway, and not a live token monitor.
This screen classifies credential and scope governance fast. It does not inspect live tokens, collect configuration files, or export personalized remediation documents.
Use this to classify whether MCP credentials and scopes are tightly governed, partly governed, materially exposed, or fundamentally uncontrolled.
The purpose of this screen is to classify credential and scope governance quickly, surface the biggest access-control weaknesses, and route the organization to the paid implementation layer without giving away the artifacts ACT is meant to sell.
It evaluates whether MCP-connected access is issued, scoped, stored, rotated, revoked, logged, reviewed, and owned in a way that can survive real scrutiny.
A green result does not mean MCP is risk-free. It means the current credential model appears more governable than the other states and still needs discipline as scopes, tools, and users expand.
This problem is not solved by another score. It is solved by policy, procedure, evidence, incident controls, and implementation ownership, which sit in ACT Tier 2 Professional.
Use the credential governance screen when approval is not enough and the real question is whether tokens, scopes, and revocation paths are defensible under pressure.
Get the MCP governance checklist, policy assets, incident workflow, evidence structure, and implementation plan needed to formalize credential control.
Use the approval gate when the main question is whether a proposed server belongs in sandbox, production review, or the reject pile.
Use the adjacent identity screen when the problem extends beyond MCP into broader agent and OAuth-grant visibility.