AI Security

MCP Server Inventory: Griffin AI vs Mythos

MCP servers are privileged dependencies. An inventory that tracks them like SBOM tracks packages is the minimum bar — and not every tool meets it.

Nayan Dey
Senior Security Engineer
5 min read

Every MCP server an AI agent uses is a privileged dependency. It has tools. Those tools have capabilities. Those capabilities often include access to production data, production credentials, or production systems. An inventory that tracks MCP servers with the same rigour that SBOMs track software packages is the minimum bar for enterprise AI governance in 2026. Griffin AI treats MCP servers as first-class tracked assets; Mythos-class general-purpose tools typically do not, and the gap has compliance and operational consequences worth understanding before scaling MCP adoption.

What an MCP server inventory needs

Five data points per server:

  • Source and signature. Where the server came from, who signed it, whether the signature verifies.
  • Capability manifest. What tools the server exposes, with their declared capabilities.
  • Credential scope. What credentials have been provisioned for this server, with what permissions.
  • Deployment footprint. Where the server is running — which environments, which tenant boundaries, which AI agents connect.
  • Invocation history. What tool calls have been made, when, by which agent, with what arguments.

An inventory with all five is auditable. An inventory missing any is a gap.

Why this matters

Three concrete failure modes that inventory closes:

  • Stale server accumulation. An experiment adds a server, the experiment ends, the server keeps running with stale credentials. Without inventory, the server is invisible until the credentials are compromised.
  • Capability drift. A server's capability manifest declares three tools; a new version adds a fourth that grants broader access. Without drift detection, the new capability is live before anyone approved it.
  • Cross-tenant credential leakage. A credential provisioned for one server is reused by another by accident or design. Without scoped credentials in the inventory, the leak is invisible.

Each of these has produced real incidents in 2025–2026 as MCP adoption accelerated.

How Griffin AI handles it

Four integrated capabilities:

Registry integration. Every approved MCP server in the organisation is in the Safeguard MCP registry. Installations outside the registry are flagged. The registry entry includes source provenance, signature, manifest, and review status.

Invocation audit. Every tool call flows through a logging layer that records server ID, tool name, argument hash, agent identity, and result status. The logs are queryable and retainable per the organisation's policy.

Credential scoping. Per-server service identities with capability-scoped permissions. Credentials rotate on the same schedule as the rest of the organisation's secrets. Expired credentials are flagged before they expire.

Drift detection. Capability manifest changes between server versions are surfaced as review-required events. Unauthorised capability additions are blocked at deploy.

The output is an MCP posture view that looks much like an SBOM view — queryable, auditable, integrable with the rest of the security program.

Where Mythos-class tools land

Pure-LLM security tools often have some MCP visibility at the "we see that these servers are installed" level. Deeper inventory — capability manifests, invocation audit, credential scoping — varies. The failure mode is not that Mythos-class tools don't care about MCP; it is that the architectural centre of gravity is elsewhere, and MCP inventory is a secondary feature rather than a first-class one.

A concrete example

A fintech customer onboards five MCP servers across six months: two for internal data queries, two for customer support workflows, one experimental server for a specific business process. At the six-month mark they discover:

  • The experimental server was shut down four months ago but the credentials are still active. One of those credentials has been used 23 times in the last month by an unknown agent.
  • One of the customer-support servers received a version update three months ago that added a new "send_email" capability. The update was installed without review.
  • Two of the servers are sharing the same credential secret in an environment variable because of a misconfiguration three quarters ago.

Each of these is a real incident waiting for a trigger. Each is invisible without inventory. Each is surfaced automatically with Griffin AI's MCP registry integration.

What an audit should look like

A quarterly MCP audit answers:

  • Every MCP server currently deployed. In the registry? Signed? Capability manifest current?
  • Every credential provisioned to MCP servers. Scoped correctly? Used recently? Rotated on schedule?
  • Every tool invocation in the period. Anomalous patterns? Off-hours usage? Cross-tenant?
  • Capability drift since last audit. What changed? Who approved?

With inventory integrated, this is a query. Without inventory, it is a project.

What to evaluate

Three concrete checks during procurement:

  1. Show the platform running against an MCP-using environment. Does it inventory servers automatically, or does it require manual registration?
  2. Add a new MCP server with a drift-worthy capability. Is the drift surfaced?
  3. Query "every tool invocation on server X in the last 30 days." Is the query supported?

The answers determine whether the platform is MCP-aware or just MCP-adjacent.

How Safeguard Helps

Safeguard's MCP server inventory is built into the SBOM and AI-BOM foundation. Registry integration, invocation audit, credential scoping, and drift detection ship as default capabilities. Griffin AI reviews MCP server onboarding requests and surfaces capability manifests with review recommendations. For organisations scaling MCP adoption across many business units, the inventory discipline is what makes the adoption safe.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.