Overview
This repository implements an MCP Server that is remotely attestable by MCP clients. It runs inside a trusted execution environment (TEE) using Gramine and Intel SGX, generating a certificate that represents the currently running code of the attestable-mcp-server. During the TLS handshake, the server presents this RA-TLS certificate to the client, proving that the code executing is the same code built on the project's GitHub Actions workflows and that it can be independently verified by running the code locally on emulated or secure hardware. The certificate embeds an SGX quote in the standardized X.509 extension field with the TCG DICE "tagged evidence" OID, including the SGX report and the full Intel SGX certificate chain. In addition to code measurements, the certificate includes evidence claims such as the pubkey-hash, containing the hash of the ephemeral public key used by the TEE memory image. The project also documents producing signed artifacts via GitHub Actions, building a Docker container with the attestable-mcp-server and generating a signed attestation for verification with or without secure hardware. Dependencies include Intel SGX hardware, Gramine, Python 3.13, Ubuntu 22.04, and the Intel SGX SDK & PSW.
Features
Remote attestation of MCP Server code
MCP Clients can remotely attest the code running on any MCP Server using RA-TLS.
Server-side attestation of MCP Clients (optional)
MCP Servers can optionally remotely attest MCP Clients.




