io.github.equilibrium-team/tweekit
TweekIT MCP Server
Normalize and convert more than 400 file types via TweekIT's hosted MCP streamable HTTP endpoint.
Status
Healthy
Score
75.4
Transport
streamable-http
Tools
5
Production readiness
Verdict
Needs remediation
Current validation evidence shows operational or discovery gaps that should be fixed first.
Critical alerts
0
Production verdicts degrade quickly when critical alerts are active.
Evidence confidence
Confidence score
65.0
Based on 20 recent validations, 26 captured checks, and validation age of 605.0 hours.
Live checks captured
26
More direct checks increase trust in the current verdict.
Validation age
605.0h
Lower age means fresher evidence.
Recommended for
Claude Desktop
Claude Desktop is marked compatible with score 100.
Smithery
Smithery is marked compatible with score 80.
Generic Streamable HTTP
Generic Streamable HTTP is marked compatible with score 100.
Client readiness verdicts
Ready for ChatGPT custom connector
Partial
OpenAI connectors expect OAuth for remote server auth.; Dynamic client registration materially improves connector setup.
Confidence: medium (65.0)
Evidence provenance
Winner: live_validation
Supporting sources: live_validation, history, server_card
Disagreements: none
initialize• OKtools_list• OKtransport_compliance_probe• Warningstep_up_auth_probe• Missingconnector_replay_probe• OK — Frozen tool snapshots must survive refresh.request_association_probe• Missing — Roots, sampling, and elicitation should stay request-scoped.
Ready for Claude remote MCP
Ready
No major blockers detected.
Confidence: medium (65.0)
Evidence provenance
Winner: live_validation
Supporting sources: live_validation, history, server_card
Disagreements: none
initialize• OKtools_list• OKtransport_compliance_probe• Warning
Unsafe for write actions
Yes
High-risk write, exec, or destructive tools need stronger auth and confirmation semantics.
Confidence: medium (65.0)
Evidence provenance
Winner: live_validation
Supporting sources: live_validation, history
Disagreements: none
action_safety_probe• Error
Snapshot churn risk
Low
No material tool-surface churn detected in the latest comparison.
Confidence: medium (65.0)
Evidence provenance
Winner: history
Supporting sources: history, live_validation
Disagreements: none
tool_snapshot_probe• OKconnector_replay_probe• OK
Why not ready by client
ChatGPT custom connector
Partial
Remediation checklist
- No explicit blockers recorded.
Claude remote MCP
Ready
Remediation checklist
- No explicit blockers recorded.
Write-safe publishing
Blocked
Remediation checklist
- No explicit blockers recorded.
Verdict traces
Production verdict
Needs remediation
Current validation evidence shows operational or discovery gaps that should be fixed first.
Confidence: medium (65.0)
Winning source: live_validation
Triggering alerts
validation_stale• medium • Validation evidence is stale
Client verdict trace table
| Verdict | Status | Checks | Winning source | Conflicts |
|---|---|---|---|---|
openai_connectors |
Partial | initialize, tools_list, transport_compliance_probe, step_up_auth_probe, connector_replay_probe, request_association_probe | live_validation | none |
claude_desktop |
Ready | initialize, tools_list, transport_compliance_probe | live_validation | none |
unsafe_for_write_actions |
Yes | action_safety_probe | live_validation | none |
snapshot_churn_risk |
Low | tool_snapshot_probe, connector_replay_probe | history | none |
Publishability policy profiles
ChatGPT custom connector publishability
Caution
OpenAI connectors expect OAuth for remote server auth.; Dynamic client registration materially improves connector setup.
- Search Fetch Only: No
- Write Actions Present: Yes
- Oauth Configured: No
- Admin Refresh Required: No
- Safe For Company Knowledge: No
- Safe For Messages Api Remote Mcp: No
Claude remote MCP publishability
Ready
Transport, discovery, and remote-MCP assumptions are satisfied.
- Search Fetch Only: No
- Write Actions Present: Yes
- Oauth Configured: No
- Admin Refresh Required: No
- Safe For Company Knowledge: No
- Safe For Messages Api Remote Mcp: No
Compatibility fixtures
ChatGPT custom connector fixture
Degraded
OpenAI connectors expect OAuth for remote server auth.; Dynamic client registration materially improves connector setup.
- remote_http_endpoint: Passes
- oauth_discovery: Degraded
- frozen_tool_snapshot_refresh: Passes
- request_association: Passes
Anthropic remote MCP fixture
Passes
Remote MCP transport and discovery assumptions are satisfied.
- remote_transport: Passes
- tool_discovery: Passes
- auth_connect: Passes
- safe_write_review: Degraded
Authenticated validation sessions
Latest profile
remote_mcp
Authenticated session used
Public score isolation
Preview endpoint
/v1/verifyCI preview endpoint
/v1/ci/previewPublic server reputation
Validation success 7d
n/a
Validation success 30d
1.0
Mean time to recover
n/a
Breaking diffs 30d
0
Registry drift frequency 30d
0
Snapshot changes 30d
0
Incident & change feed
| Timestamp | Event | Details |
|---|---|---|
| Apr 09, 2026 12:54:20 AM UTC | Latest validation: healthy | Score 75.4 with status healthy. |
Capabilities
- OAuth:
- DCR/CIMD:
- Prompts:
- Homepage: https://www.tweekit.io/
- Docs: none
- Support: none
- Icon: none
- Remote endpoint: https://mcp.tweekit.io/mcp
- Server card: none
Use-case taxonomy
development database search communication
Security posture
Tools analyzed
5
High-risk tools
3
Destructive tools
2
Exec tools
1
Egress tools
2
Secret tools
3
Bulk-access tools
2
Risk distribution
medium:2, high:1, critical:2
Tool capability & risk inventory
| Tool | Capabilities | Risk | Findings | Notes |
|---|---|---|---|---|
doctype |
read write filesystem secrets | Medium | secret material access filesystem mutation | No explicit safeguard hints detected. |
convert |
read write delete network filesystem secrets export | Critical | destructive operation bulk data access secret material access filesystem mutation | No explicit safeguard hints detected. |
convert_url |
read write delete network filesystem secrets export | Critical | destructive operation arbitrary network egress bulk data access secret material access freeform input surface filesystem mutation | No explicit safeguard hints detected. |
fetch |
read network filesystem | Medium | arbitrary network egress freeform input surface | No explicit safeguard hints detected. |
search |
read write exec network | High | command execution freeform input surface | No explicit safeguard hints detected. |
Write-action governance
Governance status
Error
Safe to publish
Auth boundary
public_or_unclear
Blast radius
High
High-risk tools
3
Confirmation signals
none
Safeguard count
0
Status detail: 3 high-risk tool(s), 2 destructive tool(s), 1 exec-capable tool(s) are exposed without a clear auth boundary; no safeguards or confirmation signals detected.
| Tool | Risk | Flags | Safeguards |
|---|---|---|---|
convert |
Critical | destructive operation bulk data access secret material access filesystem mutation | no |
convert_url |
Critical | destructive operation arbitrary network egress bulk data access secret material access freeform input surface filesystem mutation | no |
search |
High | command execution freeform input surface | no |
Action-controls diff
Snapshot changed
no
Disabled-by-default candidates
none
Manual review candidates
none
New actions
| Action | Risk | Flags |
|---|---|---|
| No newly added actions. | ||
Changed actions
| Action | Change types | Risk |
|---|---|---|
| No materially changed actions. | ||
Why this score?
Access & Protocol
32/44
Connectivity, auth, and transport expectations for common clients.
Interface Quality
37/56
How well the tool/resource interface communicates and behaves under automation.
Security Posture
27.25/36
How safely the exposed tool surface handles destructive actions, egress, execution, secrets, and risky inputs.
Reliability & Trust
23/24
Operational stability, consistency, and trustworthiness over time.
Discovery & Governance
22.5/28
How well the server is documented, listed, and governed in public registries.
Adoption & Market
6/8
Adoption clues and public evidence that the server is intended for external use.
Algorithmic score breakdown
Auth Operability
2/4
Measures whether auth discovery and protected access behave predictably for clients.
Error Contract Quality
0/4
Grades machine-readable error structure, status alignment, and remediation hints.
Rate-Limit Semantics
2/4
Checks whether quota/throttle responses are deterministic and automation-friendly.
Schema Completeness
3/4
Completeness of tool descriptions, parameter docs, examples, and schema shape.
Backward Compatibility
4/4
Stability score across tool schema/name drift relative to prior validations.
SLO Health
3/4
Availability, latency, and burst-failure profile across recent validation history.
Security Hygiene
4/4
HTTPS posture, endpoint hygiene, and response-surface hardening checks.
Task Success
4/4
Can an agent reliably initialize, enumerate tools, and execute core MCP flows?
Trust Confidence
4/4
Confidence-adjusted reliability score that penalizes low evidence volume.
Abuse/Noise Resilience
4/4
How well the server preserves core behavior in the presence of noisy traffic patterns.
Prompt Contract
2/4
Quality of prompt metadata, argument shape, and prompt discoverability for clients.
Resource Contract
4/4
How completely resources and resource templates describe URIs, types, and usage shape.
Discovery Metadata
4/4
Homepage, docs, icon, repository, support, and license coverage for directory consumers.
Registry Consistency
2/4
Agreement between stored registry metadata, live server-card data, and current validation output.
Installability
4/4
How cleanly a real client can connect, initialize, enumerate tools, and proceed through auth.
Session Semantics
4/4
Determinism and state behavior across repeated MCP calls, including sticky-session surprises.
Tool Surface Design
3/4
Naming clarity, schema ergonomics, and parameter complexity across the tool surface.
Result Shape Stability
3/4
Stability of declared output schemas across validations, with penalties for drift or missing shapes.
OAuth Interop
3/4
Depth and client compatibility of OAuth/OIDC metadata beyond the minimal protected-resource check.
Recovery Semantics
0/4
Whether failures include actionable machine-readable next steps such as retry or upgrade guidance.
Maintenance Signal
4/4
Versioning, update recency, and historical validation cadence that indicate active stewardship.
Adoption Signal
3/4
Directory presence and distribution clues that suggest the server is intended for external use.
Freshness Confidence
4/4
Confidence that recent validations are current enough and dense enough to trust operationally.
Transport Fidelity
4/4
Whether declared transport metadata matches the observed endpoint behavior and response formats.
Spec Recency
2/4
How close the server’s claimed MCP protocol version is to the latest known public revision.
Session Resume
3/4
Whether Streamable HTTP session identifiers and resumed requests behave cleanly for real clients.
Step-Up Auth
3/4
Whether OAuth metadata and WWW-Authenticate challenges support granular, incremental consent instead of broad upfront scopes.
Transport Compliance
2/4
Checks session headers, protocol-version enforcement, session teardown, and expired-session behavior.
Utility Coverage
2/4
Signals support for completions, pagination, and task-oriented utility surfaces that larger clients increasingly expect.
Advanced Capability Coverage
3/4
Coverage of newer MCP surfaces like roots, sampling, elicitation, structured output, and related metadata.
Connector Publishability
3/4
How ready the server looks for client catalogs and managed connector programs.
Tool Snapshot Churn
4/4
Stability of the tool surface across recent validations, including add/remove and output-shape drift.
Connector Replay
4/4
Whether a previously published frozen connector snapshot would remain backward compatible after the latest tool refresh.
Request Association
3/4
Whether roots, sampling, and elicitation appear tied to active client requests instead of arriving unsolicited on idle sessions.
Interactive Flow Safety
3/4
Whether prompts and docs steer users toward safe auth flows instead of pasting secrets directly.
Action Safety
2/4
Risk-weighted view of destructive, exec, egress, and confirmation semantics across the tool surface.
Official Registry Presence
4/4
Whether the server appears directly or indirectly in the official MCP registry.
Provenance Divergence
4/4
How closely official registry metadata, the live server card, and public repo/package signals agree with each other.
Safety Transparency
2/4
Clarity of docs, auth disclosure, support links, and other trust signals visible to integrators.
Tool Capability Clarity
4/4
How clearly the tool surface communicates whether each action reads, writes, deletes, executes, or exports data.
Destructive Operation Safety
2.5/4
Penalizes delete/revoke/destroy style tools unless auth and safeguards reduce blast radius.
Egress / SSRF Resilience
3/4
Assesses arbitrary URL fetch, crawl, webhook, and remote-request exposure on the tool surface.
Execution / Sandbox Safety
3.8/4
Evaluates shell, code, script, and command-execution exposure and whether that surface appears contained.
Data Exfiltration Resilience
3/4
Assesses export, dump, backup, and bulk-read behavior against the surrounding auth and safeguard signals.
Least Privilege Scope
2/4
Rewards scoped auth metadata and penalizes broad or missing scopes around privileged tools.
Secret Handling Hygiene
3/4
Assesses secret-bearing tools, token leakage risk, and whether the public surface avoids obvious secret exposure.
Supply Chain Signal
2.5/4
Public metadata signal for repository, changelog, license, versioning, and recency that supports supply-chain trust.
Input Sanitization Safety
3/4
Penalizes risky freeform string inputs when schemas do not constrain URLs, code, paths, queries, or templates.
Tool Namespace Clarity
3/4
Measures naming uniqueness and ambiguity across the tool namespace to reduce collision and confusion risk.
Compatibility profiles
OpenAI Connectors
77.8
partial
OpenAI connectors expect OAuth for remote server auth.; Dynamic client registration materially improves connector setup.
Connector URL: https://mcp.tweekit.io/mcp # No OAuth metadata detected. # Server: io.github.equilibrium-team/tweekit
Claude Desktop
100.0
compatible
No major blockers detected.
{
"mcpServers": {
"tweekit": {
"command": "npx",
"args": ["mcp-remote", "https://mcp.tweekit.io/mcp"]
}
}
}
Smithery
80.0
compatible
Machine-readable failure semantics should be present.
smithery mcp add "https://mcp.tweekit.io/mcp"
Generic Streamable HTTP
100.0
compatible
No major blockers detected.
curl -sS https://mcp.tweekit.io/mcp -H 'content-type: application/json' -d '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2025-03-26","capabilities":{},"clientInfo":{"name":"mcp-verify","version":"0.1.0"}}}'
Actionable remediation
| Severity | Remediation | Why it matters | Recommended action |
|---|---|---|---|
| High | Add confirmation and dry-run semantics for risky actions | High-risk write, delete, exec, or egress tools should communicate safeguards clearly. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| High | Align session and protocol behavior with Streamable HTTP expectations | Clients increasingly rely on MCP-Protocol-Version, session teardown, and expired-session semantics. | Align MCP-Protocol-Version, MCP-Session-Id, DELETE teardown, and expired-session handling with the transport spec.Playbook
|
| High | Associate roots, sampling, and elicitation with active client requests | Modern MCP guidance expects roots, sampling, and elicitation traffic to be tied to an active client request instead of arriving unsolicited on idle sessions. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| High | Expose /.well-known/oauth-protected-resource | Without a protected-resource document, OAuth clients cannot discover auth requirements reliably. | Serve /.well-known/oauth-protected-resource and point it at your authorization server metadata.Playbook
|
| High | Publish OAuth authorization-server metadata | Clients need authorization-server metadata to discover issuer, endpoints, and DCR support. | Publish /.well-known/oauth-authorization-server from your issuer and include registration_endpoint when supported.Playbook
|
| High | Publish a complete server card | Missing or incomplete server-card metadata weakens discovery, documentation, and trust signals. | Serve /.well-known/mcp/server-card.json and include tools, prompts/resources, homepage, and support links.Playbook
|
| High | Stop asking users to paste secrets directly | Public MCP servers should prefer OAuth or browser-based auth guidance over in-band secret collection. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Adopt a current MCP protocol revision | Older protocol revisions reduce compatibility with newer clients and registry programs. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Close connector-publishing gaps | Connector catalogs care about protocol recency, session behavior, auth clarity, and tool-surface stability. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Document minimal scopes and return cleaner auth challenges | Modern clients expect granular scopes and step-up auth signals such as WWW-Authenticate scope hints. | Return granular scopes and WWW-Authenticate challenge hints instead of forcing overly broad auth upfront.Playbook
|
| Medium | Publish OpenID configuration | OIDC metadata improves token validation and client compatibility. | Expose /.well-known/openid-configuration with issuer, jwks_uri, and supported grants.Playbook
|
| Medium | Respond to validation evidence is stale | Latest validation is 605.0 hours old. | Trigger a fresh validation run or increase scheduler priority for this server.Playbook
|
| Medium | Support resumable HTTP sessions cleanly | Modern MCP clients increasingly expect resumable session behavior on streamable HTTP transports. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Low | Expose modern utility surfaces like completions, pagination, or tasks | Utility coverage improves interoperability with larger clients and long-lived agent workflows. | Expose completions, pagination, and task metadata where supported so larger clients can plan and resume work safely.Playbook
|
Point loss breakdown
| Component | Current | Points missing |
|---|---|---|
| Recovery Semantics | 0/4 | -4.0 |
| Error Contract | 0/4 | -4.0 |
| Utility Coverage | 2/4 | -2.0 |
| Transport Compliance | 2/4 | -2.0 |
| Spec Recency | 2/4 | -2.0 |
| Safety Transparency | 2/4 | -2.0 |
| Registry Consistency | 2/4 | -2.0 |
| Rate Limit Semantics | 2/4 | -2.0 |
| Prompt Contract | 2/4 | -2.0 |
| Least Privilege Scope | 2/4 | -2.0 |
| Auth Operability | 2/4 | -2.0 |
| Action Safety | 2/4 | -2.0 |
Validation diff
Score delta
0
Summary changed
no
Tool delta
0
Prompt delta
0
Auth mode changed
no
Write surface expanded
no
Protocol regressed
no
Registry drift changed
no
Regressed checks: none
Improved checks: none
| Component | Previous | Latest | Delta |
|---|---|---|---|
| No component deltas between the latest two runs. | |||
Tool snapshot diff & changelog
Snapshot changed
no
Added tools
none
Removed tools
none
Required-argument changes
| Tool | Added required args | Removed required args |
|---|---|---|
| No required-argument changes detected. | ||
Output-schema drift
| Tool | Previous properties | Latest properties |
|---|---|---|
| No output-schema drift detected. | ||
Connector replay
Status
OK
Backward compatible
Would break after refresh
Added tools
none
Removed tools
none
Additive output changes
none
Required-argument replay breaks
| Tool | Added required args | Removed required args |
|---|---|---|
| No required-argument replay breaks detected. | ||
Output-schema replay breaks
| Tool | Removed properties | Added properties |
|---|---|---|
| No output-schema replay breaks detected. | ||
Transport compliance drilldown
Probe status
Warning
Transport
streamable-http
Session header
no
Protocol header
no
Bad protocol response
400
DELETE teardown
n/a
Expired session retry
n/a
Last-Event-ID visible
no
Issues: missing_session_id, missing_protocol_header
Request association
Status
Missing
Advertised capabilities
none
Observed idle methods
none
Violating methods
none
Probe HTTP status
n/a
Issues
none
Utility coverage
Probe status
Missing
Completions
not detected
Completion probe target: {
"type": "resource",
"uri": "config://tweekit-version"
}
Pagination
not detected
No nextCursor evidence.
Tasks
Missing
Advertised: no
Benchmark tasks
| Benchmark task | Status | Evidence |
|---|---|---|
| Discover tools | Passes |
|
| Read-only fetch flow | Passes |
|
| OAuth-required connect | Degraded |
|
| Safe write flow with confirmation | Likely to fail |
|
Registry & provenance divergence
Probe status
OK
Direct official match
yes
Drift fields
none
| Field | Registry | Live server card |
|---|---|---|
| Title | n/a | n/a |
| Version | n/a | n/a |
| Homepage | n/a | n/a |
Active alerts
- Validation evidence is stale (medium)
Latest validation is 605.0 hours old.
Aliases & registry graph
| Identifier | Source | Canonical | Score |
|---|---|---|---|
io.github.equilibrium-team/tweekit |
official_registry | yes | 75.38 |
Alias consolidation
Canonical identifier
io.github.equilibrium-team/tweekit
Duplicate aliases
0
Registry sources
official_registry
Remote URLs
Homepages
Source disagreements
| Field | What differs | Observed values |
|---|---|---|
| No source disagreements detected. | ||
Install snippets
Openai Connectors
Connector URL: https://mcp.tweekit.io/mcp # No OAuth metadata detected. # Server: io.github.equilibrium-team/tweekit
Claude Desktop
{
"mcpServers": {
"tweekit": {
"command": "npx",
"args": ["mcp-remote", "https://mcp.tweekit.io/mcp"]
}
}
}
Smithery
smithery mcp add "https://mcp.tweekit.io/mcp"
Generic Http
curl -sS https://mcp.tweekit.io/mcp -H 'content-type: application/json' -d '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2025-03-26","capabilities":{},"clientInfo":{"name":"mcp-verify","version":"0.1.0"}}}'
Agent access & tool surface
Live server tools
doctype convert convert_url fetch search
Observed from the latest live validation against https://mcp.tweekit.io/mcp. This is the target server surface, not Verify's own inspection tools.
Live capability counts
5 tools • 0 prompts • 2 resources
Counts come from the latest
tools/list, prompts/list, and resources/list checks.Inspect with Verify
search_servers recommend_servers get_server_report compare_servers
Use Verify itself to search, recommend, compare, and fetch the full report for
io.github.equilibrium-team/tweekit.Direct machine links
Claims & monitoring
Server ownership
No verified maintainer claim recorded.
Watch subscriptions
0
Teams: none
Alert routing
Active watches
0
Generic webhooks
0
Slack routes
0
Teams routes
0
Email routes
0
| Watch | Team | Channels | Minimum severity |
|---|---|---|---|
| No active watch destinations. | |||
Maintainer analytics
Validation Run Count
20
Average Latency Ms
6183.8
Healthy Run Ratio Recent
1.0
Registry Presence Count
1
Active Alert Count
1
Watcher Count
0
Verified Claim
False
Taxonomy Tags
development, database, search, communication
Score Trend
75.38, 75.38, 75.38, 75.38, 74.87, 75.38, 75.38, 75.38, 75.38, 74.87
Remediation Count
14
High Risk Tool Count
3
Destructive Tool Count
2
Exec Tool Count
1
Maintainer response quality
Score
16.67
Verified claim
Support contact
Changelog present
Incident notes present
Tool changes documented
Annotation history
Annotation count
0
Maintainer annotations
No maintainer annotations have been recorded yet.
Maintainer rebuttals & expected behavior
No maintainer rebuttals or expected-behavior overrides are recorded yet.
Latest validation evidence
Latest summary
Healthy
Validation profile
remote_mcp
Started
Apr 09, 2026 12:54:12 AM UTC
Latency
7609.7 ms
Failures
oauth_authorization_serverno authorization serveroauth_protected_resourceClient error '404 Not Found' for url 'https://mcp.tweekit.io/.well-known/oauth-protected-resource' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404openid_configurationno authorization serverserver_cardClient error '404 Not Found' for url 'https://mcp.tweekit.io/.well-known/mcp/server-card.json' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404
Checks
| Check | Status | Latency | Evidence |
|---|---|---|---|
action_safety_probe |
Error | n/a | 3 high-risk, 2 destructive, 1 exec-capable tool(s); no clear auth boundary; safeguards=0; confirmation=none. |
advanced_capabilities_probe |
OK | n/a | 4 capability signal(s): prompts, resource links, resources, structured outputs. |
connector_publishability_probe |
Warning | n/a | Publishability blockers: action safety, server card. |
connector_replay_probe |
OK | n/a | Backward compatible with no breaking tool-surface changes. |
determinism_probe |
OK | 230.6 ms | Check completed |
initialize |
OK | 99.8 ms | Protocol 2025-03-26 |
interactive_flow_probe |
Missing | n/a | Check completed |
oauth_authorization_server |
Missing | n/a | no authorization server |
oauth_protected_resource |
Error | 112.7 ms | Client error '404 Not Found' for url 'https://mcp.tweekit.io/.well-known/oauth-protected-resource' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 |
official_registry_probe |
OK | n/a | Check completed |
openid_configuration |
Missing | n/a | no authorization server |
probe_noise_resilience |
OK | 102.3 ms | Fetched https://mcp.tweekit.io/robots.txt |
prompt_get |
Missing | n/a | not advertised |
prompts_list |
OK | 112.5 ms | 0 prompt(s) exposed |
protocol_version_probe |
Warning | n/a | Claims 2025-03-26; 2 release(s) behind 2025-11-25. |
provenance_divergence_probe |
OK | n/a | Check completed |
request_association_probe |
Missing | n/a | No request-association capabilities were advertised. |
resource_read |
OK | 6141.5 ms | 1 resource content item(s) returned |
resources_list |
OK | 98.0 ms | 2 resource item(s) exposed |
server_card |
Error | 199.3 ms | Client error '404 Not Found' for url 'https://mcp.tweekit.io/.well-known/mcp/server-card.json' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 |
session_resume_probe |
Warning | n/a | no session id |
step_up_auth_probe |
Missing | n/a | No OAuth or incremental-scope signals detected. |
tool_snapshot_probe |
OK | n/a | Check completed |
tools_list |
OK | 107.0 ms | 5 tool(s) exposed |
transport_compliance_probe |
Warning | 77.3 ms | Issues: missing session id, missing protocol header (bad protocol=400). |
utility_coverage_probe |
Missing | 71.0 ms | No completions evidence; no pagination evidence; tasks missing. |
Raw evidence view
Show raw JSON evidence
{
"checks": {
"action_safety_probe": {
"details": {
"auth_present": false,
"confirmation_signals": [],
"safeguard_count": 0,
"summary": {
"bulk_access_tools": 2,
"capability_distribution": {
"delete": 2,
"exec": 1,
"export": 2,
"filesystem": 4,
"network": 4,
"read": 5,
"secrets": 3,
"write": 4
},
"destructive_tools": 2,
"egress_tools": 2,
"exec_tools": 1,
"high_risk_tools": 3,
"risk_distribution": {
"critical": 2,
"high": 1,
"low": 0,
"medium": 2
},
"secret_tools": 3,
"tool_count": 5
}
},
"latency_ms": null,
"status": "error"
},
"advanced_capabilities_probe": {
"details": {
"capabilities": {
"completions": false,
"elicitation": false,
"prompts": true,
"resource_links": true,
"resources": true,
"roots": false,
"sampling": false,
"structured_outputs": true
},
"enabled": [
"prompts",
"resource_links",
"resources",
"structured_outputs"
],
"enabled_count": 4,
"initialize_capability_keys": [
"experimental",
"prompts",
"resources",
"tools"
]
},
"latency_ms": null,
"status": "ok"
},
"connector_publishability_probe": {
"details": {
"blockers": [
"action_safety",
"server_card"
],
"criteria": {
"action_safety": false,
"auth_flow": true,
"connector_replay": true,
"initialize": true,
"protocol_version": true,
"remote_transport": true,
"request_association": true,
"server_card": false,
"session_resume": true,
"step_up_auth": true,
"tool_surface": true,
"tools_list": true,
"transport_compliance": true
},
"high_risk_tools": 3,
"tool_count": 5,
"transport": "streamable-http"
},
"latency_ms": null,
"status": "warning"
},
"connector_replay_probe": {
"details": {
"added_tools": [],
"additive_output_changes": [],
"backward_compatible": true,
"output_breaks": [],
"removed_tools": [],
"required_arg_breaks": [],
"would_break_after_refresh": false
},
"latency_ms": null,
"status": "ok"
},
"determinism_probe": {
"details": {
"attempts": 2,
"baseline_signature": "34a0fb7e5bd2b3ea0b5420354503d8eea8fdcf9799d58e732faffbab7823a453",
"errors": [],
"matches": 2,
"stable_ratio": 1.0,
"successful": 2
},
"latency_ms": 230.63,
"status": "ok"
},
"initialize": {
"details": {
"headers": {
"content-type": "text/event-stream"
},
"http_status": 200,
"payload": {
"id": 1,
"jsonrpc": "2.0",
"result": {
"capabilities": {
"experimental": {},
"prompts": {
"listChanged": true
},
"resources": {
"listChanged": true,
"subscribe": false
},
"tools": {
"listChanged": true
}
},
"protocolVersion": "2025-03-26",
"serverInfo": {
"name": "Tweekit MCP Server - convert and/or optimize almost any file on-demand for any AI workflow or website from anywhere",
"version": "1.17.0"
}
}
},
"url": "https://mcp.tweekit.io/mcp"
},
"latency_ms": 99.85,
"status": "ok"
},
"interactive_flow_probe": {
"details": {
"oauth_supported": false,
"prompt_available": false,
"risk_hits": [],
"safe_hits": []
},
"latency_ms": null,
"status": "missing"
},
"oauth_authorization_server": {
"details": {
"reason": "no_authorization_server"
},
"latency_ms": null,
"status": "missing"
},
"oauth_protected_resource": {
"details": {
"error": "Client error '404 Not Found' for url 'https://mcp.tweekit.io/.well-known/oauth-protected-resource'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://mcp.tweekit.io/.well-known/oauth-protected-resource"
},
"latency_ms": 112.7,
"status": "error"
},
"official_registry_probe": {
"details": {
"direct_match": true,
"official_peer_count": 1,
"registry_identifier": "io.github.equilibrium-team/tweekit",
"registry_source": "official_registry"
},
"latency_ms": null,
"status": "ok"
},
"openid_configuration": {
"details": {
"reason": "no_authorization_server"
},
"latency_ms": null,
"status": "missing"
},
"probe_noise_resilience": {
"details": {
"headers": {
"content-type": "text/plain; charset=utf-8"
},
"http_status": 404,
"url": "https://mcp.tweekit.io/robots.txt"
},
"latency_ms": 102.33,
"status": "ok"
},
"prompt_get": {
"details": {
"reason": "not_advertised"
},
"latency_ms": null,
"status": "missing"
},
"prompts_list": {
"details": {
"headers": {
"content-type": "text/event-stream"
},
"http_status": 200,
"payload": {
"id": 3,
"jsonrpc": "2.0",
"result": {
"prompts": []
}
},
"url": "https://mcp.tweekit.io/mcp"
},
"latency_ms": 112.47,
"status": "ok"
},
"protocol_version_probe": {
"details": {
"claimed_version": "2025-03-26",
"lag_days": 244,
"latest_known_version": "2025-11-25",
"releases_behind": 2,
"validator_protocol_version": "2025-03-26"
},
"latency_ms": null,
"status": "warning"
},
"provenance_divergence_probe": {
"details": {
"direct_official_match": true,
"drift_fields": [],
"metadata_document_count": 2,
"registry_homepage": null,
"registry_repository": null,
"registry_title": null,
"registry_version": null,
"server_card_homepage": null,
"server_card_repository": null,
"server_card_title": null,
"server_card_version": null
},
"latency_ms": null,
"status": "ok"
},
"request_association_probe": {
"details": {
"reason": "no_request_association_capabilities_advertised"
},
"latency_ms": null,
"status": "missing"
},
"resource_read": {
"details": {
"headers": {
"content-type": "text/event-stream"
},
"http_status": 200,
"payload": {
"id": 6,
"jsonrpc": "2.0",
"result": {
"contents": [
{
"mimeType": "text/plain",
"text": "1.0.0.73",
"uri": "config://tweekit-version"
}
]
}
},
"resource_uri": "config://tweekit-version",
"url": "https://mcp.tweekit.io/mcp"
},
"latency_ms": 6141.51,
"status": "ok"
},
"resources_list": {
"details": {
"headers": {
"content-type": "text/event-stream"
},
"http_status": 200,
"payload": {
"id": 5,
"jsonrpc": "2.0",
"result": {
"resources": [
{
"_meta": {
"_fastmcp": {
"tags": []
}
},
"description": "Get current version of the TweekIT API.",
"mimeType": "text/plain",
"name": "version",
"uri": "config://tweekit-version"
},
{
"_meta": {
"_fastmcp": {
"tags": []
}
},
"description": "Return the TweekIT MCP server version.",
"mimeType": "text/plain",
"name": "mcp_version",
"uri": "config://tweekit-mcp-version"
}
]
}
},
"url": "https://mcp.tweekit.io/mcp"
},
"latency_ms": 98.04,
"status": "ok"
},
"server_card": {
"details": {
"error": "Client error '404 Not Found' for url 'https://mcp.tweekit.io/.well-known/mcp/server-card.json'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://mcp.tweekit.io/.well-known/mcp/server-card.json"
},
"latency_ms": 199.3,
"status": "error"
},
"session_resume_probe": {
"details": {
"protocol_version": "2025-03-26",
"reason": "no_session_id",
"resume_expected": true,
"transport": "streamable-http"
},
"latency_ms": null,
"status": "warning"
},
"step_up_auth_probe": {
"details": {
"auth_required_checks": [],
"broad_scopes": [],
"challenge_headers": [],
"minimal_scope_documented": false,
"oauth_present": false,
"scope_specificity_ratio": 0.0,
"step_up_signals": [],
"supported_scopes": []
},
"latency_ms": null,
"status": "missing"
},
"tool_snapshot_probe": {
"details": {
"added": [],
"changed_outputs": [],
"current_tool_count": 5,
"previous_tool_count": 5,
"removed": [],
"similarity": 1.0
},
"latency_ms": null,
"status": "ok"
},
"tools_list": {
"details": {
"headers": {
"content-type": "text/event-stream"
},
"http_status": 200,
"payload": {
"id": 2,
"jsonrpc": "2.0",
"result": {
"tools": [
{
"_meta": {
"_fastmcp": {
"tags": []
}
},
"description": "Retrieve a list of supported file formats or map a file extension to its document type.\n\nArgs:\n apiKey (str): The API key for authentication. Falls back to TWEEKIT_API_KEY when omitted.\n apiSecret (str): The API secret for authentication. Falls back to TWEEKIT_API_SECRET when omitted.\n extension (str): The file extension to query (e.g., 'jpg', 'pdf') or leave off or use '*' to return all supported input formats.\n\nReturns:\n Dict[str, Any]: A dictionary containing the supported file formats or an error message.",
"inputSchema": {
"properties": {
"apiKey": {
"anyOf": [
{
"type": "string"
},
{
"type": "null"
}
],
"default": null,
"description": "TweekIT API key passed via the ApiKey header. Defaults to the TWEEKIT_API_KEY environment variable when omitted."
},
"apiSecret": {
"anyOf": [
{
"type": "string"
},
{
"type": "null"
}
],
"default": null,
"description": "TweekIT API secret paired with the apiKey. Defaults to the TWEEKIT_API_SECRET environment variable when omitted."
},
"extension": {
"default": "*",
"description": "File extension to inspect; use '*' to list all supported inputs.",
"type": "string"
}
},
"type": "object"
},
"name": "doctype",
"outputSchema": {
"additionalProperties": true,
"type": "object"
}
},
{
"_meta": {
"_fastmcp": {
"tags": []
}
},
"description": "Convert an uploaded document payload with TweekIT.\n\nThe file must already be base64 encoded (see `blob`). The conversion can be\nresized and cropped by providing optional geometry parameters. For raster\noutputs, set `alpha`/`bgColor` to control transparency handling.\n\nArgs:\n inext: Source file extension such as `pdf`, `docx`, or `png`.\n outfmt: Desired output format (`Fmt` in the API body).\n blob: Base64 encoded document payload (`DocData`).\n apiKey: TweekIT API key (`ApiKey` header). Falls back to `TWEEKIT_API_KEY` env var.\n apiSecret: TweekIT API secret (`ApiSecret` header). Falls back to `TWEEKIT_API_SECRET` env var.\n noRasterize: Forwarded to TweekIT to skip rasterization when possible.\n width: Optional pixel width to request in the output.\n height: Optional pixel height to request in the output.\n x1: Left crop coordinate in source pixels.\n y1: Top crop coordinate in source pixels.\n x2: Right crop coordinate in source pixels.\n y2: Bottom crop coordinate in source pixels.\n page: Page number to extract for multipage inputs.\n alpha: Whether the output should preserve alpha transparency.\n bgColor: Background color to composite behind transparent pixels.\n\nReturns:\n A FastMCP `Image` or `File` payload, or an error description.",
"inputSchema": {
"properties": {
"alpha": {
"default": true,
"description": "Preserve alpha transparency when producing raster formats.",
"type": "boolean"
},
"apiKey": {
"anyOf": [
{
"type": "string"
},
{
"type": "null"
}
],
"default": null,
"description": "TweekIT API key passed via the ApiKey header. Defaults to the TWEEKIT_API_KEY environment variable when omitted."
},
"apiSecret": {
"anyOf": [
{
"type": "string"
},
{
"type": "null"
}
],
"default": null,
"description": "TweekIT API secret paired with the apiKey. Defaults to the TWEEKIT_API_SECRET environment variable when omitted."
},
"bgColor": {
"default": "",
"description": "Background color (hex RGB) to composite behind transparent pixels.",
"type": "string"
},
"blob": {
"description": "Base64 encoded document payload (DocData).",
"type": "string"
},
"height": {
"default": 0,
"description": "Optional pixel height for the converted output.",
"type": "integer"
},
"inext": {
"description": "Input file extension (e.g., pdf, docx, png).",
"type": "string"
},
"noRasterize": {
"default": false,
"description": "Forward to TweekIT to disable rasterization when supported.",
"type": "boolean"
},
"outfmt": {
"description": "Requested output format to send as Fmt.",
"type": "string"
},
"page": {
"default": 1,
"description": "Page number to convert for multi-page inputs.",
"type": "integer"
},
"width": {
"default": 0,
"description": "Optional pixel width for the converted output.",
"type": "integer"
},
"x1": {
"default": 0,
"description": "Left crop coordinate in source pixels.",
"type": "integer"
},
"x2": {
"default": 0,
"description": "Right crop coordinate in source pixels.",
"type": "integer"
},
"y1": {
"default": 0,
"description": "Top crop coordinate in source pixels.",
"type": "integer"
},
"y2": {
"default": 0,
"description": "Bottom crop coordinate in source pixels.",
"type": "integer"
}
},
"required": [
"inext",
"outfmt",
"blob"
],
"type": "object"
},
"name": "convert"
},
{
"_meta": {
"_fastmcp": {
"tags": []
}
},
"description": "Download a remote file and convert it with TweekIT in one step.\n\nThis helper first fetches `url`, infers the input extension when possible,\nand then forwards the bytes to `convert`. Supply `fetchHeaders` when the\nremote resource needs authentication or custom headers.\n\nArgs:\n url: Direct download URL for the source document or image.\n outfmt: Desired output format (`Fmt`).\n apiKey: TweekIT API key (`ApiKey` header). Falls back to `TWEEKIT_API_KEY` env var.\n apiSecret: TweekIT API secret (`ApiSecret` header). Falls back to `TWEEKIT_API_SECRET` env var.\n inext: Optional override for the source extension if it cannot be\n detected from the URL or response headers.\n noRasterize: Forwarded to TweekIT to skip rasterization when possible.\n width: Optional pixel width to request in the output.\n height: Optional pixel height to request in the output.\n x1: Left crop coordinate in source pixels.\n y1: Top crop coordinate in source pixels.\n x2: Right crop coordinate in source pixels.\n y2: Bottom crop coordinate in source pixels.\n page: Page number to extract for multipage inputs.\n alpha: Whether the output should preserve alpha transparency.\n bgColor: Background color to composite behind transparent pixels.\n fetchHeaders: Optional mapping of HTTP headers to include when fetching.\n\nReturns:\n A FastMCP `Image` or `File` payload, or an error description.",
"inputSchema": {
"properties": {
"alpha": {
"default": true,
"description": "Preserve alpha transparency when producing raster formats.",
"type": "boolean"
},
"apiKey": {
"anyOf": [
{
"type": "string"
},
{
"type": "null"
}
],
"default": null,
"description": "TweekIT API key passed via the ApiKey header. Defaults to the TWEEKIT_API_KEY environment variable when omitted."
},
"apiSecret": {
"anyOf": [
{
"type": "string"
},
{
"type": "null"
}
],
"default": null,
"description": "TweekIT API secret paired with the apiKey. Defaults to the TWEEKIT_API_SECRET environment variable when omitted."
},
"bgColor": {
"default": "",
"description": "Background color (hex RGB) to composite behind transparent pixels.",
"type": "string"
},
"fetchHeaders": {
"anyOf": [
{
"additionalProperties": {
"type": "string"
},
"type": "object"
},
{
"type": "null"
}
],
"default": null,
"description": "Optional HTTP headers to include when downloading the URL."
},
"height": {
"default": 0,
"description": "Optional pixel height for the converted output.",
"type": "integer"
},
"inext": {
"anyOf": [
{
"type": "string"
},
{
"type": "null"
}
],
"default": null,
"description": "Override for the detected input extension (e.g., pdf)."
},
"noRasterize": {
"default": false,
"description": "Forward to TweekIT to disable rasterization when supported.",
"type": "boolean"
},
"outfmt": {
"description": "Requested output format to send as Fmt.",
"type": "string"
},
"page": {
"default": 1,
"description": "Page number to convert for multi-page inputs.",
"type": "integer"
},
"url": {
"description": "Direct download URL for the source document or image.",
"type": "string"
},
"width": {
"default": 0,
"description": "Optional pixel width for the converted output.",
"type": "integer"
},
"x1": {
"default": 0,
"description": "Left crop coordinate in source pixels.",
"type": "integer"
},
"x2": {
"default": 0,
"description": "Right crop coordinate in source pixels.",
"type": "integer"
},
"y1": {
"default": 0,
"description": "Top crop coordinate in source pixels.",
"type": "integer"
},
"y2": {
"default": 0,
"description": "Bottom crop coordinate in source pixels.",
"type": "integer"
}
},
"required": [
"url",
"outfmt"
],
"type": "object"
},
"name": "convert_url"
},
{
"_meta": {
"_fastmcp": {
"tags": []
}
},
"description": "Fetch a URL and return content.\n\n- Images return as FastMCP Image.\n- PDFs return as File(format=\"pdf\").\n- Text/JSON return as a JSON payload with metadata and text.",
"inputSchema": {
"properties": {
"url": {
"description": "HTTP or HTTPS URL to retrieve and normalize.",
"type": "string"
}
},
"required": [
"url"
],
"type": "object"
},
"name": "fetch"
},
{
"_meta": {
"_fastmcp": {
"tags": []
}
},
"description": "Simple web search using DuckDuckGo HTML endpoint.\n\nReturns a list of {title, url, snippet} objects. Best\u2011effort parsing.",
"inputSchema": {
"properties": {
"max_results": {
"default": 5,
"description": "Maximum number of results to return (1-10).",
"type": "integer"
},
"query": {
"description": "Search keywords to send to DuckDuckGo.",
"type": "string"
}
},
"required": [
"query"
],
"type": "object"
},
"name": "search",
"outputSchema": {
"additionalProperties": true,
"type": "object"
}
}
]
}
},
"url": "https://mcp.tweekit.io/mcp"
},
"latency_ms": 107.05,
"status": "ok"
},
"transport_compliance_probe": {
"details": {
"bad_protocol_error": null,
"bad_protocol_headers": {
"content-type": "application/json"
},
"bad_protocol_payload": {
"error": {
"code": -32600,
"message": "Bad Request: Unsupported protocol version: 1999-99-99. Supported versions: 2024-11-05, 2025-03-26, 2025-06-18"
},
"id": "server-error",
"jsonrpc": "2.0"
},
"bad_protocol_status_code": 400,
"delete_error": null,
"delete_status_code": null,
"expired_session_error": null,
"expired_session_status_code": null,
"issues": [
"missing_session_id",
"missing_protocol_header"
],
"last_event_id_visible": false,
"protocol_header_present": false,
"requested_protocol_version": "2025-03-26",
"session_id_present": false,
"transport": "streamable-http"
},
"latency_ms": 77.26,
"status": "warning"
},
"utility_coverage_probe": {
"details": {
"completions": {
"advertised": false,
"live_probe": "not_executed",
"sample_target": {
"type": "resource",
"uri": "config://tweekit-version"
}
},
"initialize_capability_keys": [
"experimental",
"prompts",
"resources",
"tools"
],
"pagination": {
"metadata_signal": false,
"next_cursor_methods": [],
"supported": false
},
"tasks": {
"advertised": false,
"http_status": 200,
"probe_status": "missing"
}
},
"latency_ms": 71.04,
"status": "missing"
}
},
"failures": {
"oauth_authorization_server": {
"reason": "no_authorization_server"
},
"oauth_protected_resource": {
"error": "Client error '404 Not Found' for url 'https://mcp.tweekit.io/.well-known/oauth-protected-resource'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://mcp.tweekit.io/.well-known/oauth-protected-resource"
},
"openid_configuration": {
"reason": "no_authorization_server"
},
"server_card": {
"error": "Client error '404 Not Found' for url 'https://mcp.tweekit.io/.well-known/mcp/server-card.json'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://mcp.tweekit.io/.well-known/mcp/server-card.json"
}
},
"remote_url": "https://mcp.tweekit.io/mcp",
"server_card_payload": null,
"server_identifier": "io.github.equilibrium-team/tweekit"
}
Known versions
1.6.1
Validation history
7 day score delta
+0.0
30 day score delta
+0.0
Recent healthy ratio
100%
Freshness
605.0h
| Timestamp | Status | Score | Latency | Tools |
|---|---|---|---|---|
| Apr 09, 2026 12:54:20 AM UTC | Healthy | 75.4 | 7609.7 ms | 5 |
| Apr 08, 2026 12:51:02 AM UTC | Healthy | 75.4 | 4636.2 ms | 5 |
| Apr 07, 2026 12:46:12 AM UTC | Healthy | 75.4 | 7539.4 ms | 5 |
| Apr 06, 2026 12:43:02 AM UTC | Healthy | 75.4 | 4646.5 ms | 5 |
| Apr 05, 2026 12:40:14 AM UTC | Healthy | 74.9 | 11203.8 ms | 5 |
| Apr 04, 2026 12:39:38 AM UTC | Healthy | 75.4 | 3657.7 ms | 5 |
| Apr 03, 2026 12:34:46 AM UTC | Healthy | 75.4 | 7453.7 ms | 5 |
| Apr 02, 2026 12:21:02 AM UTC | Healthy | 75.4 | 8081.7 ms | 5 |
Validation timeline
| Validated | Summary | Score | Protocol | Auth mode | Tools | High-risk tools | Changes |
|---|---|---|---|---|---|---|---|
| Apr 09, 2026 12:54:20 AM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
| Apr 08, 2026 12:51:02 AM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
| Apr 07, 2026 12:46:12 AM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
| Apr 06, 2026 12:43:02 AM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
| Apr 05, 2026 12:40:14 AM UTC | Healthy | 74.9 | 2025-03-26 | public | 5 | 3 | none |
| Apr 04, 2026 12:39:38 AM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
| Apr 03, 2026 12:34:46 AM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
| Apr 02, 2026 12:21:02 AM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
| Mar 31, 2026 11:43:58 PM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
| Mar 30, 2026 11:35:23 PM UTC | Healthy | 74.9 | 2025-03-26 | public | 5 | 3 | none |
| Mar 29, 2026 11:24:13 PM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
| Mar 28, 2026 10:03:58 PM UTC | Healthy | 75.4 | 2025-03-26 | public | 5 | 3 | none |
Recent validation runs
| Started | Status | Summary | Latency | Checks |
|---|---|---|---|---|
| Apr 09, 2026 12:54:12 AM UTC | Completed | Healthy | 7609.7 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 08, 2026 12:50:57 AM UTC | Completed | Healthy | 4636.2 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 07, 2026 12:46:05 AM UTC | Completed | Healthy | 7539.4 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 06, 2026 12:42:57 AM UTC | Completed | Healthy | 4646.5 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 05, 2026 12:40:03 AM UTC | Completed | Healthy | 11203.8 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 04, 2026 12:39:34 AM UTC | Completed | Healthy | 3657.7 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 03, 2026 12:34:39 AM UTC | Completed | Healthy | 7453.7 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 02, 2026 12:20:54 AM UTC | Completed | Healthy | 8081.7 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Mar 31, 2026 11:43:51 PM UTC | Completed | Healthy | 6799.8 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Mar 30, 2026 11:35:12 PM UTC | Completed | Healthy | 11174.7 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |