Find out in under 4 minutes whether MCP servers are running on governable credentials and least-privilege scopes - or on broad, brittle, and poorly owned access.
This is a governance assessment for credential issuance, scope discipline, storage, rotation, revocation, and ownership across MCP-connected access paths. It is not a secrets scanner, not a gateway, and not a live token monitor.
This screen classifies credential and scope governance fast. It does not inspect live tokens, collect configuration files, or export personalized remediation documents.
Use this to classify whether MCP credentials and scopes are tightly governed, partly governed, materially exposed, or fundamentally uncontrolled.
This section classify credential and scope governance posture quickly, surface the most significant access-control weaknesses, and recommend an appropriate implementation path.
This assessment evaluates whether MCP-connected access is issued, scoped, stored, rotated, revoked, logged, reviewed, and owned in a way that can survive real scrutiny.
A green result does not mean MCP is risk-free. It means the current credential model appears more governable than the other states and still needs discipline as scopes, tools, and users expand.
This problem is not solved by another score. It is solved by policy, procedure, evidence, incident controls, and implementation ownership, which sit in AI Controls Professional.
Use the credential governance screen when approval is not enough and the real question is whether tokens, scopes, and revocation paths are defensible under pressure.
Get the MCP governance checklist, policy assets, incident workflow, evidence structure, and implementation plan needed to formalize credential control.
Use the approval gate when the main question is whether a proposed server belongs in sandbox, production review, or the reject pile.
Use the adjacent identity screen when the problem extends beyond MCP into broader agent and OAuth-grant visibility.
It evaluates credential issuance, scope minimization, environment separation, secret storage, rotation, revocation, logging, approval discipline, ownership, and business impact for MCP-connected access paths.
Because shared credentials and broad scopes make incidents harder to contain, reduce accountability, and expand the blast radius when an MCP server or token is abused.
Authentication alone does not solve secret sprawl, plaintext storage, or long-lived credential exposure. Storage and lifecycle controls determine whether access remains governable over time.
No. It is a governance triage tool. It does not scan repositories, inspect live tokens, or proxy MCP traffic.
No. The assessment runs entirely in the browser. Answers are not stored, synced, or submitted to a server.
Source and review note: This page was last reviewed on 6 May 2026 against the current Move78 public site baseline and relevant official or authoritative sources where laws, standards, frameworks, cybersecurity controls, product scope, pricing, support policy, or implementation guidance are discussed. It provides operational implementation guidance and product information only; it is not legal advice, tax advice, audit assurance, certification assurance, conformity-assessment advice, buyer-approval assurance, or security assurance. Validate legal, regulatory, contractual, tax, audit, and security decisions with qualified professionals.