A GitHub Action that checks Fidensa certification status for AI capabilities (MCP servers, skills, rules files, hooks, sub-agents, and plugins) in your CI/CD pipeline.
Fail or warn your build if a dependency's certification is missing, expired, suspended, or below your trust threshold.
- uses: fidensa/check-certification@v1
with:
capabilities: |
mcp-server-filesystem
mcp-server-everythingname: CI
on: [push, pull_request]
jobs:
check-trust:
runs-on: ubuntu-latest
steps:
- uses: fidensa/check-certification@v1
with:
capabilities: |
mcp-server-filesystem
mcp-server-everything
docx-skillCreate a .fidensa.yml in your repo root:
capabilities:
- mcp-server-filesystem
- mcp-server-everything
- docx-skillThen reference it (or rely on the default path):
- uses: fidensa/check-certification@v1- uses: fidensa/check-certification@v1
with:
capabilities: mcp-server-filesystem, mcp-server-everything
fail-on: suspended,revoked,expired,missing
min-score: 70
min-tier: verified- uses: fidensa/check-certification@v1
with:
capabilities: mcp-server-filesystem
warn-only: true- uses: fidensa/check-certification@v1
id: fidensa
with:
capabilities: mcp-server-filesystem
- run: echo "Passed: ${{ steps.fidensa.outputs.passed }}"
- if: steps.fidensa.outputs.passed == 'false'
run: echo "Some capabilities failed certification checks"| Input | Description | Default |
|---|---|---|
capabilities |
Newline or comma-separated capability IDs | — |
config |
Path to .fidensa.yml config file |
.fidensa.yml |
fail-on |
Statuses that cause failure (suspended, revoked, expired, missing) |
suspended,revoked |
min-score |
Minimum trust score (0–100) | 0 |
min-tier |
Minimum tier (evaluated, verified, certified) |
— |
warn-only |
Log warnings without failing | false |
api-url |
Fidensa API base URL | https://fidensa.com |
| Output | Description |
|---|---|
passed |
true if all checks passed, false otherwise |
results |
JSON array of per-capability results |
Match your policy to your risk tolerance:
Permissive — only block actively problematic certifications:
fail-on: suspended,revokedStandard — also block expired and uncertified capabilities:
fail-on: suspended,revoked,expired,missing
min-score: 60Strict — require Certified tier with a high trust score:
fail-on: suspended,revoked,expired,missing
min-score: 80
min-tier: certifiedThe action writes a Markdown summary to the GitHub Actions job summary, showing a table of all checked capabilities with their status, score, grade, tier, and pass/fail result. Any violations are listed with details.
- Reads capability IDs from the
capabilitiesinput or a.fidensa.ymlconfig file - Queries the Fidensa attestation API for each capability (Open tier, no API key required)
- Evaluates each response against your configured policy (fail-on statuses, minimum score, minimum tier)
- Writes results to the job summary and sets outputs
- Exits with code 1 if any capability fails policy checks (unless
warn-onlyis true)
This action uses the Fidensa attestation endpoint, which is part of the Open tier — free and permanently available with no authentication. Basic trust checks should never be gated behind a paywall.
- Fidensa — Independent AI certification authority
- Certification Catalog — Browse all certifications
- API Documentation — Full API reference
- @fidensa/mcp-server — MCP server for agent-native trust checks
MIT