CuratedMCP
For Engineering Leaders

Enterprise MCP marketplace for Claude, Cursor, Windsurf, OpenAI and Gemini

Discover, govern, and audit MCP servers in one place—instead of chasing random configs across GitHub and internal wikis.

Security-reviewed catalogCentralized deploymentAudit-ready logs

The problem

Shadow MCP is already happening in your org

Every engineer with Claude Desktop or Cursor has likely installed MCP servers you've never audited.

Today — without governance

⚠️

Developers self-install anything

Engineers pull MCP servers directly from GitHub with no IT approval — giving AI assistants access to production GitHub repos, Stripe keys, Slack, and databases.

👁️

Zero visibility

IT has no idea which MCP servers are running on developer laptops, what credentials they hold, or what data they can access.

🚪

No off-boarding process

When an engineer leaves, their locally installed MCP servers keep running with their production credentials until someone notices.

📋

No audit trail

Nothing is logged. No evidence of what tools accessed what data. No compliance story for SOC 2 or ISO 27001.

With CuratedMCP Enterprise

Pre-approved catalog

IT selects from 50+ security-reviewed servers. Engineers pick only from what's allowed — nothing else installs.

One-click org deployment

Distribute one universal config to your entire team. Every engineer gets the same approved setup in minutes.

Full audit log

Every tool call, every access, every change — logged and exportable for compliance requirements.

Instant revocation

Remove a server or a user's access from the admin panel. Takes effect immediately across the org.

The solution

Three layers of enterprise control

Approved Catalog

IT selects from 50+ security-reviewed MCP servers. Every server has passed a human code audit for secrets exposure, injection vulnerabilities, and unsafe network access. Developers pick only from what's approved.

Centralized Deployment

One configuration snippet. Your entire dev team gets the same approved setup — no individual installs, no config drift. New servers added to the catalog appear for all engineers instantly.

Audit, Compliance & Safety

Every tool call logged with timestamp, user identity, and status. PII and secrets auto-redacted before tools fire. High-risk operations require human approval via Slack or Teams. Export reports for SOC 2, ISO 27001, or internal reviews.

How it works

Org-wide deployment in three steps

01

IT admin builds the approved catalog

Log into CuratedMCP, browse the security-reviewed server library, and select which MCP servers your team is approved to use. Set version pins and access policies.

02

Distribute one universal config

Copy a single JSON configuration snippet — or push it via your MDM or dotfiles system. Every developer gets the exact same approved server setup with no individual configuration.

03

Monitor, revoke, and stay compliant

Watch usage in the admin dashboard. Revoke access for specific users or servers in one click. Pin server versions to prevent silent updates. Export audit logs on demand.

Why us

The governance layer your CISO can trust

Independent — not a vendor

CuratedMCP is not Anthropic, not Microsoft, not AWS. We're a neutral party with no incentive to push specific tools. Your CISO can trust the catalog reflects security merit, not vendor relationships.

Client-agnostic by design

Works with Claude, Cursor, Windsurf, Claude Code, OpenAI Agents, and Gemini CLI — all six major MCP clients. Your governance layer doesn't break when your team switches AI tools.

Human-reviewed, not auto-scraped

Every server in the catalog was read by a human engineer. We reject auto-scraped noise. The catalog is intentionally small — because reliability matters more than volume.

Example workflows

Example MCP workflows for enterprises

Customer support

Connect help desks (Zendesk, Intercom), internal knowledge bases, and ticketing tools so agents can resolve issues faster without leaving their AI assistant.

Analytics & BI

Wire data warehouses, dashboards, and metrics tools into MCP so analysts can ask questions in natural language—with guardrails on what data they can access.

DevOps & engineering

Tie together GitHub, CI/CD, observability, and incident tools via MCP servers so developers can manage workflows directly from Claude, Cursor, or Windsurf.

Works with what you have

Works with your existing AI tools

CuratedMCP does not replace your AI platform. Instead, it acts as the MCP layer underneath tools like Claude, Claude Code, Cursor, Windsurf, OpenAI, and Gemini.

Your teams continue using their preferred AI interfaces, while CuratedMCP standardizes which MCP servers they can access and how they are configured—so your governance layer doesn't break when your team switches AI tools.

Security features

Built for security-first organisations

Pre-vetted server catalog

Every server audited by a human engineer before inclusion. No auto-scraped junk.

Zero-retention logging

We log metadata only — tool name, user, timestamp, status code. Never input values or API response payloads. On by default.

Coming soon

PII & secret auto-redaction

The gateway automatically detects and masks patterns like AWS keys, SSNs, and credit card numbers in tool arguments before they leave your firewall.

Coming soon

Human-in-the-loop approvals

High-stakes tools (delete_user, execute_trade, modify_payroll) trigger a Slack or Teams approval request. The AI waits. A human approves or denies. Only then does the tool execute.

Coming soon

Self-hosted / VPC deployment

Run the gateway entirely in your own AWS, Azure, or GCP account. We ship the software. Your data never leaves your infrastructure.

Coming soon

Access revocation

Remove any server or user's access instantly from the admin panel.

Coming soon

SSO / SAML

Connect to Okta, Azure AD, or Google Workspace for unified access management.

Coming soon

SOC 2 + audit export

Structured audit logs exportable as CSV or PDF for SOC 2, ISO 27001, or internal security reviews.

FAQ

Common questions

Will CuratedMCP see our internal data or API responses?

No. Zero-retention logging is on by default: we log metadata only — which tool was called, by whom, when, and whether it succeeded. We never log input parameter values or API response payloads. For companies with strict data residency requirements, the self-hosted deployment option runs the gateway entirely inside your own VPC — your API keys and data never leave your infrastructure. Your CISO gets the policy dashboard and audit visibility; we never touch the data plane. A Docker Compose deployment that works inside any AWS, Azure, or GCP account is on the near-term roadmap. Request a briefing to discuss your specific requirements.

What exactly is an MCP server?

MCP (Model Context Protocol) is an open standard that lets AI assistants connect to external tools and data sources. An MCP server is a small program that exposes tools — like reading a GitHub repo, querying a database, or sending a Slack message — directly into AI clients like Claude or Cursor. They're already widely used by engineering teams, often without IT awareness.

How does your security review work?

A human engineer reads the server's source code and checks for: exposed secrets or credentials, unsafe network calls to external endpoints, injection vulnerabilities in tool inputs, and correct MCP specification compliance. Servers that pass are marked Certified. We re-review when authors push major updates.

Can we connect our own internal APIs, not just public MCP servers?

Yes — this is one of our core enterprise features. Paste your internal API's OpenAPI/Swagger URL into the API Converter tool and get a working MCP server in 30 seconds. The hosted gateway then runs that server with RBAC and audit logging, so your engineers can use AI tools against your internal data without writing any integration code.

What's the timeline for the hosted gateway and self-hosted deployment?

The hosted gateway (RBAC, audit logs, Okta/AAD SSO) is our near-term priority. Self-hosted deployment — a Docker Compose package that runs the full gateway inside your own AWS, Azure, or GCP VPC — follows shortly after. The control plane (policies, RBAC rules, audit log dashboard) remains on curatedmcp.com; the data plane runs in your network and phones home only to sync rules, never to relay data. Request a briefing and we'll share the roadmap and can prioritise based on your compliance requirements.

What happens when an AI tries to call a high-risk tool like 'delete_user' or 'execute_trade'?

The gateway intercepts the call and triggers a Human-in-the-Loop approval gate instead of executing immediately. It sends a structured message to your Slack or Microsoft Teams #ops-approvals channel showing the agent identity, tool name, and exact parameters. A human clicks Approve or Deny. Only if approved does the gateway resume execution and return the result to the AI. This prevents prompt injection attacks — where an attacker tricks an AI into taking a destructive action — from ever reaching your systems.

How do we get started?

Request a Security Briefing using the form below. We'll schedule a 30-minute call with your CTO or security team, walk through your current MCP exposure, and show you exactly what the governance layer looks like for your stack. No commitment required.

Get in touch

Talk to us about MCP governance

If you're evaluating MCP or already experimenting with servers in production, we can help you roll it out in a secure, governed way. Book a 20-minute call and see how other teams are using CuratedMCP.

We respond within one business day. No sales pressure, no spam.