MCP servers in Agent BOM output
When you rundrako bom, Drako’s static analysis detects any MCP servers configured in your agent project and includes them in the inventory:
Perms field. A filesystem MCP server, for example, will surface filesystem in the permissions list, which can trigger relevant scan rules.
Drako’s MCP server
Drako ships a local MCP server (drako-local) that exposes Drako’s governance capabilities to any MCP-compatible client — Claude Desktop, Cursor, or custom agents.
Available tools
The server exposes five tools over the MCP JSON-RPC protocol:audit_log_action
audit_log_action
Log an agent action to the immutable audit hash chain.
verify_agent_identity
verify_agent_identity
Verify an agent’s identity and retrieve its trust score.
evaluate_policy
evaluate_policy
Evaluate whether an action is permitted by the active governance policies.
verify_audit_chain
verify_audit_chain
Verify the cryptographic integrity of the audit hash chain.
check_quota
check_quota
Check the tenant’s current usage quota against configured limits.
Transports
The server supports two transports:- STDIO
- HTTP + SSE
For local tools like Claude Desktop and Cursor. The server reads JSON-RPC requests from stdin and writes responses to stdout.
Smithery configuration
Drako’s MCP server is deployable as a container via Smithery. The server accepts two configuration properties:| Property | Required | Description |
|---|---|---|
apiKey | No | Your Drako platform API key. Required for runtime governance features; optional for scan-only use. |
policyEndpoint | No | URL of your Drako backend for policy evaluation and audit logging. |
8000 by default.
Scanning MCP-enabled agents
MCP tool calls go through the same enforcement pipeline as any other tool call. If your agent uses an MCP server, governance rules that apply to network access, filesystem access, or code execution will fire based on the permissions declared by that server. To include MCP server detection in your scan:MCP server directory
Drako publishes governance assessments for popular MCP servers at getdrako.com/mcp-directory. Each entry includes:- Permission scope (filesystem, network, code execution, etc.)
- Input validation analysis
- Governance assessment and grade
Configuring MCP-enabled agents in .drako.yaml
If your agent uses MCP servers, declare them explicitly in .drako.yaml to apply ODD policies:
.drako.yaml