When an AI agent connects to an MCP server for the first time, it has no reliable way to verify whether that server has been audited, certified, or reviewed by anyone. The agent simply connects and hopes for the best. This is the trust-on-first-use problem, and it is one of the most significant unsolved challenges in the agentic AI ecosystem.

CraftedTrust solves this by anchoring every certification as an on-chain attestation using the Ethereum Attestation Service (EAS) on Base. The result: any person, system, or AI agent can independently verify a server's certification status without trusting a single API or centralized authority.

The Problem with Traditional Certifications

Today, certifications in cybersecurity and software compliance are delivered as PDFs, email confirmations, or self-reported badges on a website. These formats share a common weakness: they are trivially forgeable and impossible to verify programmatically.

Consider what happens when an enterprise wants to confirm that a vendor holds a SOC 2 report. Someone sends an email. Someone else forwards a PDF. A compliance analyst eyeballs it and checks a box in a spreadsheet. The entire chain of trust depends on manual human processes, and none of it is machine-readable.

Now scale that problem to AI agents. An autonomous agent deciding which MCP server to connect to cannot read a PDF. It cannot call a vendor's compliance team. It needs a trust signal that is structured, permanent, and verifiable in milliseconds. Traditional certifications were never designed for this world.

"If a certification cannot be verified by a machine, it does not exist in the agentic world."

What Is EAS?

The Ethereum Attestation Service (EAS) is an open-source, on-chain attestation framework. It allows anyone to make structured, cryptographically signed claims about anything - and store those claims on Ethereum (or an Ethereum L2) so they can be independently verified by anyone else.

An EAS attestation consists of three key components:

EAS attestations are not tokens. They are not NFTs. They are purpose-built data structures designed for making verifiable claims, and they are composable - meaning other attestations can reference them, building layered trust graphs over time.

Why Base?

CraftedTrust deploys its attestations on Base, the Ethereum Layer 2 built by Coinbase. The decision was driven by three factors:

How CraftedTrust Uses EAS

When an MCP server passes the CraftedTrust certification process - completing our 12-factor trust assessment and manual review - the platform creates an EAS attestation on Base. This attestation is a permanent, immutable record that contains:

The attestation is created from CraftedTrust's verified attester address, which is publicly documented. Anyone can look up the attestation on the EAS explorer for Base and confirm its authenticity without contacting CraftedTrust at all.

If a certification is revoked - for example, if a server is found to have introduced a vulnerability after certification - CraftedTrust revokes the on-chain attestation. The revocation is also permanent and publicly visible, ensuring that stale certifications cannot be used to misrepresent a server's status.

Agent-Verifiable Trust

The real power of on-chain attestations emerges when AI agents consume them programmatically. Today, most agent-to-server connections operate on a trust-on-first-use model: the agent connects, and the developer hopes the server is safe. There is no verification step.

With CraftedTrust's EAS attestations, an agent can verify a server's certification before establishing a connection. The verification flow works like this:

  1. The agent receives an MCP server URI it has not connected to before.
  2. The agent queries the CraftedTrust API (or reads the Base chain directly) to check whether a valid, non-revoked attestation exists for that server.
  3. If an attestation exists, the agent inspects the trust score, certification tier, and compliance mappings to determine whether the server meets its policy requirements.
  4. If the attestation meets the agent's trust threshold, the connection proceeds. If not, the agent refuses the connection and logs the reason.

This entire flow happens in milliseconds. No human is involved. No PDF is opened. The trust decision is fully automated, cryptographically backed, and auditable after the fact.

Trust Gating in Practice

We have published a reference implementation showing how agents can consume CraftedTrust attestations as trust gates. The trust-gated-agent repository demonstrates an agent that:

The implementation is intentionally minimal - under 200 lines of TypeScript - to show that trust gating is not a heavy lift. It is a pattern that any agent framework can adopt with minimal integration effort.

// Verify attestation before connecting
const attestation = await craftedTrust.getAttestation(serverUri);

if (!attestation || attestation.revoked) {
  logger.warn(`No valid attestation for ${serverUri}. Refusing connection.`);
  return null;
}

if (attestation.trustScore < policy.minimumTrustScore) {
  logger.warn(`Trust score ${attestation.trustScore} below threshold ${policy.minimumTrustScore}.`);
  return null;
}

// Attestation valid - proceed with connection
const client = await connectToMcpServer(serverUri);
logger.info(`Connected to ${serverUri} (attestation: ${attestation.uid})`);

Why This Is a Unique Differentiator

No other MCP trust platform has on-chain verification. The existing approaches to MCP server trust fall into three categories, and all of them have significant limitations:

CraftedTrust's on-chain attestations eliminate these weaknesses. The attestation exists on a public blockchain, independent of CraftedTrust's infrastructure. Even if CraftedTrust's servers went offline tomorrow, every attestation ever created would remain verifiable on Base. The attester address is public and immutable, so the provenance of every certification can be traced back to CraftedTrust's verified identity.

This is not blockchain for blockchain's sake. It is the only architecture that satisfies a specific and critical requirement: trust verification must not depend on the continued availability or honesty of a single centralized party. For AI agents making autonomous decisions about which servers to connect to, this property is not optional - it is foundational.


Explore CraftedTrust

On-chain attestations are live today for all CraftedTrust certifications. Every certified MCP server has a permanent, verifiable record on Base that any agent can query before connecting.

If you are building AI agents and want to integrate trust gating, start with the trust-gated-agent reference implementation. If you maintain an MCP server and want to earn a verifiable certification, start at CraftedTrust Platform and follow the registry and certification workflow from there.

Trust in the agentic world needs to be machine-readable, independently verifiable, and permanent. EAS attestations on Base deliver all three. Explore CraftedTrust Platform to see how on-chain trust connects with registry, certification, and governance workflows.