Best MCP Server Registry: Where to Find Verified MCP Tools
Not all MCP registries are created equal. We compare the top options — AgentNode, Smithery, GitHub repos, npm packages, and community directories — on verification, trust, discovery, and security.
The Model Context Protocol (MCP) has become the standard way for AI agents to interact with tools, and the ecosystem has exploded. Thousands of MCP servers are now available across GitHub repositories, npm packages, community directories, and dedicated registries. But this abundance creates a new problem: how do you find MCP servers that actually work and are safe to run?
The answer depends entirely on where you look. The difference between MCP registries is not just about catalog size — it is about whether the tools have been verified, whether you can trust them in production, and whether they will still work next month. Some registries are curated goldmines. Others are minefields.
We evaluated every major MCP server registry and directory against five criteria that matter in production: verification depth, discovery quality, trust transparency, cross-framework support, and monetization potential for tool authors. Here is what we found.
What Makes a Good MCP Server Registry?
Before comparing specific registries, let's establish what "good" means. An MCP server registry needs to solve five problems:
- Verification — does the tool actually install, run, and produce correct output? Has anyone tested it beyond the author?
- Discovery — can you find the right tool quickly? Is search semantic or just keyword matching?
- Trust signals — can you assess risk before installing? Are there scores, reviews, or audit trails?
- Compatibility — does the tool work with your specific setup (Claude, Cursor, custom agents)?
- Maintenance — is the tool actively maintained? Will it break when dependencies update?
With these criteria in mind, let's look at each option.
AgentNode: The Verified MCP Registry
AgentNode is a purpose-built registry for AI agent tools, including MCP servers. Every tool published to AgentNode goes through a 4-step automated verification pipeline: installation check, import validation, smoke testing, and unit test execution. The result is a verification score from 0 to 100 and a trust tier (Gold, Verified, Partial, or Unverified).
Strengths
- Automated verification — every tool version is tested in a sandbox before it becomes discoverable. This catches broken installs, missing dependencies, and runtime errors automatically.
- Trust scores — each tool has a transparent verification score. Gold-tier tools (90+) have passed comprehensive testing. You can filter search results by trust level.
- Semantic search — search by capability description, not just keywords. "I need a tool that converts PDFs to text" finds the right tool even if the name does not mention PDF.
- Cross-framework — MCP servers on AgentNode also work as LangChain tools, CrewAI tools, and OpenAI function calling schemas. One registry, every framework.
- Security auditing — tools are checked for known vulnerability patterns including path traversal vulnerabilities and excessive permission requests.
Weaknesses
- Smaller catalog — because verification is mandatory, AgentNode has fewer tools than unverified directories. Quality over quantity is the explicit tradeoff.
- Publishing overhead — tool authors must follow the ANP format and pass verification. This is a feature for consumers but friction for publishers.
You can search verified MCP servers on AgentNode right now to see the catalog and trust scores in action.
Smithery: The Community Hub
Smithery is a community-driven MCP server directory that focuses on discoverability and ease of use. It features a web-based catalog with categories, tags, and user ratings.
Strengths
- Large catalog — Smithery has one of the largest collections of MCP servers, aggregated from multiple sources.
- User ratings — community members can rate and review tools, providing social proof of quality.
- Easy onboarding — listing a tool on Smithery is straightforward, which encourages contributions.
- Good categorization — tools are organized by use case, making browsing effective.
Weaknesses
- No automated verification — Smithery relies on community reviews rather than automated testing. A tool can be listed without ever being run in a test environment.
- Trust is social, not technical — ratings tell you what other people think, but not whether the tool passes security checks or handles edge cases.
- Maintenance visibility is low — it can be hard to tell whether a listed tool is actively maintained or abandoned.
GitHub Repositories
Many MCP servers live in GitHub repositories — either individual repos or curated "awesome" lists. GitHub is where most MCP server development happens, making it the most comprehensive source.
Strengths
- Source code access — you can read every line of code before installing. For security-conscious teams, this is invaluable.
- Activity signals — commit history, issue tracker, and contributor count provide genuine maintenance signals.
- Largest total catalog — every MCP server is on GitHub somewhere, making it the most complete source.
Weaknesses
- No verification — a repo existing does not mean the code works. Many MCP server repos are abandoned, broken, or incomplete.
- Discovery is terrible — GitHub search is not designed for finding MCP servers. Searching "MCP server" returns thousands of results with no quality ranking.
- No trust scoring — stars are a weak proxy for quality. Popular repos are not necessarily safe or well-maintained.
- Security risk — installing code directly from unverified GitHub repos is inherently risky. Are MCP servers on GitHub safe? Not automatically — see our analysis of MCP server security vulnerabilities for real examples.
npm Packages
Many MCP servers for JavaScript/TypeScript agents are published as npm packages. npm provides a familiar distribution mechanism for the JavaScript ecosystem.
Strengths
- Familiar tooling — if you work in JavaScript,
npm installis second nature. - Version management — npm's semver system and lockfiles provide predictable dependency resolution.
- Download stats — weekly download counts give some signal about adoption.
Weaknesses
- No MCP-specific verification — npm verifies that a package installs, but not that it functions as a valid MCP server.
- Discovery is generic — searching npm for MCP servers mixes results with unrelated packages.
- Supply chain risks — npm has a well-documented history of supply chain attacks. MCP servers often require elevated permissions, making this especially dangerous.
- JavaScript only — Python-based MCP servers are not on npm, limiting the catalog.
Comparison Table
| Criteria | AgentNode | Smithery | GitHub | npm |
|---|---|---|---|---|
| Automated verification | Yes (4-step) | No | No | Install only |
| Trust scores | 0-100 + tiers | User ratings | Stars | Downloads |
| Semantic search | Yes | Category-based | Keyword only | Keyword only |
| Security auditing | Yes | No | Manual only | npm audit (deps) |
| Cross-framework | MCP + LangChain + CrewAI + OpenAI | MCP only | Varies | JS/TS only |
| Maintenance signals | Re-verification on update | Community reports | Commit history | Version dates |
| Publisher verification | Yes | No | No | 2FA available |
| Catalog size | Medium (verified) | Large | Largest | Medium |
The Verification Gap
The most important difference between these registries is the verification gap. An MCP server that installs is not the same as an MCP server that works. And an MCP server that works is not the same as one that is safe.
Here is what happens without verification:
- A tool lists 10 capabilities in its manifest but only 3 actually work.
- A tool works on the author's machine but fails on yours because of an undeclared system dependency.
- A tool requests filesystem access but also opens a network socket to an unknown server.
- A tool passes basic testing but crashes on edge-case inputs that a production agent will inevitably encounter.
AgentNode's verification pipeline catches all of these cases automatically. Every tool version is installed in a clean sandbox, imported, smoke-tested against its declared capabilities, and run through unit tests if provided. The result is a score that tells you exactly how much of the tool's claimed functionality actually works.
How to Evaluate an MCP Server from Any Source
Regardless of which registry you use, apply these checks before installing any MCP server in a production environment:
- Check the permission scope — what does the tool request access to? Filesystem? Network? Environment variables? Be suspicious of tools that request more than they need.
- Read the source code — for tools from GitHub or npm, skim the main module. Look for network calls, file writes, and subprocess invocations that are not explained by the tool's stated purpose.
- Test in isolation — run the tool in a container or VM before giving it access to your production environment.
- Check maintenance status — when was the last commit? Are issues being addressed? An abandoned tool is a liability.
- Look for verification — if the tool is on AgentNode, check its verification score. If it is not, consider setting it up through AgentNode's MCP server support to get the benefits of verification.
Setting Up Verified MCP Servers
If you want to start using verified MCP servers today, the fastest path is through AgentNode. Here is the quick setup:
# Install the AgentNode CLI
pip install agentnode-sdk
# Search for MCP servers
agentnode search "database query" --type mcp
# Install a verified MCP server
agentnode install sql-query-mcp --verified-only
# Start the MCP server
agentnode serve sql-query-mcp
For a detailed walkthrough including Claude Desktop and Cursor configuration, see the guide on setting up MCP servers for Claude and Cursor.
The Future of MCP Registries
The MCP registry landscape is evolving rapidly. We expect convergence around a few trends:
- Verification becomes table stakes — as more teams deploy MCP servers in production, unverified registries will lose trust. The ClawHavoc incident demonstrated the consequences of running unverified tools.
- Monetization for tool authors — registries that let developers monetize their tools will attract the best talent and the most maintained tools.
- Cross-registry standards — the ANP format and similar standards will enable tools to be published once and discovered across multiple registries.
- Automated re-verification — tools need to be re-tested as their dependencies update. Registries that do this automatically will surface stale tools before they break your agent.
You can compare registries on AgentNode to see how different options stack up for your specific use case.
Where can I find MCP servers?
MCP servers are available from multiple sources: dedicated registries like AgentNode and Smithery, GitHub repositories and "awesome" lists, npm packages, and community directories. For verified, production-ready tools, AgentNode offers the most comprehensive verification pipeline. For the largest unverified catalog, GitHub repositories are the most complete source.
What is the safest MCP registry?
AgentNode is the safest MCP registry because it is the only one that runs automated verification on every tool version. Each tool goes through installation checks, import validation, smoke testing, and security auditing in a sandboxed environment before it becomes discoverable. Other registries rely on community reviews or have no verification at all.
How many MCP servers does AgentNode have?
AgentNode's catalog is continuously growing as tool authors publish and verify new packages. Because every tool must pass automated verification, the catalog is smaller than unverified directories but every listed tool has a transparent verification score and trust tier. You can browse the current catalog and filter by category, trust level, and capability at any time.
Are MCP servers on GitHub safe?
Not automatically. GitHub hosts source code but performs no verification of MCP server functionality or security. Many MCP server repositories are abandoned, contain vulnerabilities, or request excessive permissions. Before using an MCP server from GitHub, you should review the source code, test it in an isolated environment, check the commit history for active maintenance, and verify that its permission requests match its stated functionality.
LLM Runtime: Let the Model Handle It
If your agent uses OpenAI or Anthropic tool calling, AgentNodeRuntime handles tool registration, system prompt injection, and the tool loop automatically. The LLM discovers, installs, and runs AgentNode capabilities on its own — no hardcoded tool calls needed.
from openai import OpenAI
from agentnode_sdk import AgentNodeRuntime
runtime = AgentNodeRuntime()
result = runtime.run(
provider="openai",
client=OpenAI(),
model="gpt-4o",
messages=[{"role": "user", "content": "your task here"}],
)
print(result.content)
The Runtime registers 5 meta-tools (agentnode_capabilities, agentnode_search, agentnode_install, agentnode_run, agentnode_acquire) that let the LLM search the registry, install packages, and execute tools autonomously. Works with Anthropic too — just change provider="anthropic" and pass an Anthropic client.
See the LLM Runtime documentation for the full API reference, trust levels, and manual tool calling.
Frequently Asked Questions
- Where can I find MCP servers?
- MCP servers are available from multiple sources: dedicated registries like AgentNode and Smithery, GitHub repositories, npm packages, and community directories. For verified, production-ready tools, AgentNode offers the most comprehensive verification pipeline. For the largest unverified catalog, GitHub repositories are the most complete source.
- What is the safest MCP registry?
- AgentNode is the safest MCP registry because it runs automated verification on every tool version. Each tool goes through installation checks, import validation, smoke testing, and security auditing in a sandboxed environment before it becomes discoverable.
- How many MCP servers does AgentNode have?
- AgentNode's catalog is continuously growing as tool authors publish and verify new packages. Because every tool must pass automated verification, the catalog is smaller than unverified directories but every listed tool has a transparent verification score and trust tier.
- Are MCP servers on GitHub safe?
- Not automatically. GitHub hosts source code but performs no verification of MCP server functionality or security. Many repositories are abandoned, contain vulnerabilities, or request excessive permissions. Review source code, test in isolation, and check maintenance status before using any MCP server from GitHub.