Find out in under 4 minutes whether unapproved MCP servers are already operating inside your enterprise perimeter.
This is a governance visibility screen for unmanaged, local, containerized, or otherwise unapproved MCP deployments. It is not a network scanner, gateway, or telemetry product.
This screen classifies shadow MCP exposure quickly. It does not scan your network, enumerate servers, or export an inventory.
Use this to classify whether MCP usage is tightly controlled, drifting into shadow deployment, materially exposed, or already in an uncontrolled state.
The purpose of this screen is to classify shadow MCP exposure quickly, highlight the biggest gaps, and route the organization to the correct paid next step without giving away the implementation layer.
Shadow MCP means unmanaged, local, containerized, unapproved, or weakly governed MCP usage that sits outside a defendable registry, ownership model, logging baseline, or disable path.
A green result does not prove shadow usage is impossible. It means the current footprint appears more governable than the other states and still needs discipline to stay that way.
Green and amber results usually need baseline visibility, inventory, and gap analysis first, which sit in ACT Tier 1. Severe red states need formal governance, evidence, and response controls, which sit in ACT Tier 2.
Use the paid bridge when the screening result shows structural visibility gaps, control drift, or containment weakness that require more than another free quiz.
Structure the visibility baseline, inventory, gap analysis, and dashboard layer for shadow MCP cleanup.
Move to the formal governance, evidence, incident, and implementation layer when shadow MCP is materially exposed or uncontrolled.
Use the approval-focused screen when the issue is vetting a proposed server rather than discovering unmanaged MCP usage.