Skip to main content

Anthropic MCP Directory Policy

Updated today

Anthropic's Connector Directory curates third-party Model Context Protocol servers to help users find high-quality tools that work seamlessly within Claude. We review submissions to our directory to ensure they meet our standards for safety, security, and compatibility with other servers. We conduct both initial and ongoing reviews of servers, and may require developers to address compliance issues to maintain directory inclusion. All servers must maintain compliance with these requirements, including any future changes, to remain in the directory.

Safety and Security

  1. MCP servers must not be designed to facilitate or easily enable violation of our Usage Policy. All MCP servers must comply with our Universal Usage Standards and High-Risk Use Case requirements.

  2. MCP servers must not employ methods to evade or enable users to circumvent Claude's safety guardrails.

  3. MCP servers should prioritize user privacy protection. Developers should take care to responsibly handle personal data, follow privacy best practices, and ensure compliance with applicable laws.

  4. MCP servers should only collect data from the user’s context that is necessary to perform their function. MCP servers should not collect extraneous conversation data, even for logging purposes.

  5. MCP servers must not infringe on the intellectual property rights of others.

  6. At this time, MCP servers may not be used to transfer money, cryptocurrency, or other financial assets, or to execute financial transactions on behalf of users. We may reassess this policy as security and legal frameworks evolve.

    Compatibility

  7. MCP tool descriptions must narrowly and unambiguously describe what the tool does and when they should be invoked.

  8. MCP tool descriptions must precisely match actual functionality, ensuring the server is called at correct and appropriate times. Descriptions must not include unexpected functionality or promise undelivered features.

  9. MCP tool descriptions should not create confusion or conflict with other MCP servers in our directory.

  10. MCP servers should not intentionally call or coerce Claude into calling other servers. Similarly, tool descriptions should not be written in a way that intentionally leads to other servers calling them.

  11. MCP servers should not attempt to interfere with Claude calling tools from other servers.

  12. MCP servers should not direct Claude to dynamically pull behavioral instructions from external sources for Claude to execute.

    Functionality

  13. MCP servers must deliver reliable performance with fast response times and maintain consistently high availability.

  14. MCP servers must gracefully handle errors and provide helpful feedback rather than generic error messages.

  15. MCP servers should be frugal with their use of tokens. The amount of tokens a given tool call uses should be roughly commensurate with the complexity or impact of the task. When possible, users should be given options to exclude unnecessary text in the response. Tool names may not exceed 64 characters.

  16. Remote MCP servers that connect to a remote service and require authentication must use secure OAuth 2.0 with certificates from recognized authorities.

  17. MCP servers must provide all applicable annotations for their tools, and in particular whether a tool is read-only or destructive.

  18. Remote MCP servers should support the Streamable HTTP transport. Servers may support SSE for the time being, but in the future it will be deprecated.

  19. Local MCP servers should be built with reasonably current versions of all dependencies, including packages in node_modules.

    Developer Requirements

  20. Developers of MCP servers that collect user data or connect to a remote service must provide a clear, accessible privacy policy link explaining data collection, usage, and retention.

  21. Developers must provide verified contact information and support channels for users with product concerns.

  22. Developers must document how their MCP server works, its intended purpose, and how users can troubleshoot issues.

  23. Developers must provide a standard testing account with sample data for Anthropic to verify full MCP functionality.

  24. Developers must provide at least three working examples of prompts or use cases that demonstrate core functionality.

  25. Developers must verify that they own or control any API endpoint their MCP server connects to.

  26. Developers must maintain their MCP server and address issues within reasonable timeframes.

  27. Developers must agree to our MCP Directory Terms.

Did this answer your question?