European Parliament MCP Server API - v1.1.26
    Preparing search index...

    Hack23 Logo

    πŸ›‘οΈ European Parliament MCP Server β€” CRA Conformity Assessment

    Evidence-Driven Conformity Through Systematic Assessment
    Demonstrating CRA Compliance Excellence for Open Source MCP Server

    Owner Version Effective Date Review Cycle OpenSSF Best Practices

    πŸ“‹ Document Owner: CEO | πŸ“„ Version: 1.1 | πŸ“… Last Updated: 2026-03-19 (UTC) πŸ”„ Review Cycle: Quarterly | ⏰ Next Review: 2026-06-19 🏷️ Classification: Public (Open Source MCP Server) βœ… ISMS Compliance: ISO 27001 (A.14.2), NIST CSF 2.0 (PR.DS, ID.SC), CIS Controls v8.1 (16.1)



    Where this document fits in the security documentation portfolio:

    Document Focus Link
    SECURITY.md Vulnerability reporting & security policy View
    SECURITY_ARCHITECTURE.md Current security controls & design View
    THREAT_MODEL.md STRIDE analysis & threat scenarios View
    πŸ›‘οΈ CRA-ASSESSMENT.md ← You are here β€” CRA conformity assessment View
    SECURITY_HEADERS.md HTTP security headers implementation View
    BCPPlan.md Business continuity & disaster recovery View
    FinancialSecurityPlan.md Security investment strategy View

    Hack23 AB's CRA conformity assessment demonstrates how systematic regulatory compliance directly enables business growth rather than creating operational burden. Our comprehensive assessment framework serves as both operational tool and client demonstration of our cybersecurity consulting methodologies.

    This assessment documents the European Parliament MCP Server's conformity with the EU Cyber Resilience Act (CRA), providing evidence-based compliance verification for open-source software distribution via npm. The assessment follows the CRA Conformity Assessment Process template.

    β€” James Pether SΓΆrling, CEO/Founder


    Supports CRA Annex V Β§ 1 β€” Product Description Requirements

    Field Value
    πŸ“¦ Product European Parliament MCP Server
    🏷️ Version Tag v1.1.13 (reflects current project state)
    πŸ”— Repository https://github.com/Hack23/European-Parliament-MCP-Server
    πŸ“§ Security Contact security@hack23.org
    🎯 Purpose MCP server providing AI assistants with structured access to European Parliament open datasets (MEPs, plenary sessions, committees, legislative documents, parliamentary questions) via 61 tools, 9 resources, and 7 prompts
    πŸͺ Market Open Source

    OSS

    Public Open source, processes only public European Parliament data

    Moderate Parliamentary data accuracy important for political analysis

    Standard Tolerates brief outages; local stdio transport

    Standard npm reinstallation restores service

    Extended No persistent state; source-of-truth is EP Open Data API


    Supports CRA Article 6 β€” Scope and Article 7 β€” Product Classification Assessment

    Non-commercial OSS

    Community Published via npm registry; source on GitHub

    Standard Self-assessment approach

    πŸ“ CRA Scope Justification: The European Parliament MCP Server is a non-commercial open-source tool distributed via npm that processes publicly available European Parliament data. It does not handle critical infrastructure, cryptographic functions, or safety-critical operations. As a standard-classification product, self-assessment is the appropriate conformity route.

    πŸ” Classification Impact:

    • Standard: Self-assessment approach (this document supports the documentation requirement)
    • No notified body assessment required
    • Evidence maintained through automated CI/CD and public badges
    graph LR
        subgraph "πŸ“‹ Assessment"
            A1[Product Classification] --> A2[Risk Assessment]
            A2 --> A3[Requirements Mapping]
        end
        subgraph "πŸ›‘οΈ Implementation"
            A3 --> B1[Security Controls]
            B1 --> B2[Testing & Validation]
            B2 --> B3[Evidence Collection]
        end
        subgraph "πŸ“¦ Maintenance"
            B3 --> C1[Vulnerability Monitoring]
            C1 --> C2[Security Updates]
            C2 --> C3[Continuous Assessment]
            C3 --> A2
        end
    

    Supports CRA Annex V Β§ 2 β€” Technical Documentation Requirements

    πŸ—οΈ CRA Technical Area πŸ“ Implementation Summary πŸ“‹ Evidence Location
    🎨 Product Architecture (Annex V § 2.1) C4 model with Context, Container, Component views; Mermaid diagrams ARCHITECTURE.md, ARCHITECTURE_DIAGRAMS.md
    πŸ“¦ SBOM & Components (Annex I Β§ 1.1) CycloneDX SBOM generation per release; npm dependency tree docs/SBOM.md, GitHub Release artifacts
    πŸ” Cybersecurity Controls (Annex I Β§ 1.2) 4-layer security: Zod validation β†’ rate limiting β†’ audit logging β†’ GDPR compliance SECURITY_ARCHITECTURE.md
    πŸ›‘οΈ Supply Chain Security (Annex I Β§ 1.3) SLSA Level 3 build provenance, npm provenance, Dependabot GitHub Attestations
    πŸ”„ Update Mechanism (Annex I Β§ 1.4) npm update mechanism with semantic versioning CHANGELOG.md
    πŸ“Š Security Monitoring (Annex I Β§ 1.5) CodeQL analysis, OpenSSF Scorecard, Dependabot alerts .github/workflows/
    🏷️ Data Protection (Annex I § 2.1) Public data only, no PII storage, GDPR compliance SECURITY_ARCHITECTURE.md
    πŸ“š User Guidance (Annex I Β§ 2.2) Comprehensive documentation portal, API guide, deployment guide README.md, API_USAGE_GUIDE.md, DEPLOYMENT_GUIDE.md
    πŸ” Vulnerability Disclosure (Annex I Β§ 2.3) Coordinated disclosure via SECURITY.md, GitHub Security Advisories SECURITY.md

    πŸ“‹ ISMS Policy Integration:


    Supports CRA Annex V Β§ 3 β€” Risk Assessment Documentation

    Reference: πŸ“Š Risk Assessment Methodology and ⚠️ Risk Register

    🚨 CRA Risk Category 🎯 Asset πŸ“Š Likelihood πŸ’₯ Impact (C/I/A) πŸ›‘οΈ CRA Control Implementation βš–οΈ Residual πŸ“‹ Evidence
    Supply Chain Attack (Art. 11) npm dependencies M L/H/M SBOM + SLSA provenance + Dependabot + npm audit L Attestations
    Input Injection (Art. 11) MCP tool parameters M L/M/L Zod schema validation on all 61 tools L src/tools/ (Zod schemas)
    Data Integrity (Art. 11) EP API responses L L/H/L HTTPS transport + response validation + Zod parsing L SECURITY_ARCHITECTURE.md
    Denial of Service (Art. 11) Rate limiter M L/L/H Token-bucket rate limiting (100 req/min) + LRU cache L src/clients/ep/baseClient.ts
    Component Vulnerability (Art. 11) npm packages M L/M/M CodeQL + npm audit + Dependabot + weekly scans L .github/workflows/
    Information Disclosure (Art. 11) Error messages L L/L/L Sanitized error responses, no stack traces in production L Error handling patterns

    βš–οΈ CRA Risk Statement: LOW β€” Assessment supports CRA essential cybersecurity requirements evaluation. The product processes only publicly available European Parliament data via a local stdio transport, significantly limiting the attack surface.

    βœ… Risk Acceptance: James Pether SΓΆrling (CEO) β€” 2026-03-19

    πŸ“‹ Risk Management Framework:


    Supports CRA Annex I β€” Essential Requirements Self-Assessment

    πŸ“‹ CRA Annex I Requirement βœ… Status πŸ“‹ Implementation Evidence
    πŸ›‘οΈ Β§ 1.1 β€” Secure by Design [x] TypeScript strict mode, Zod validation for all 61 tools, defense-in-depth architecture β€” SECURITY_ARCHITECTURE.md
    πŸ”’ Β§ 1.2 β€” Secure by Default [x] Safe defaults, no credentials required, public data only, stdio transport (no network exposure) β€” src/config.ts
    🏷️ Β§ 2.1 β€” Personal Data Protection [x] Public data only, no PII storage, GDPR compliance, data minimization in API requests β€” SECURITY_ARCHITECTURE.md
    πŸ” Β§ 2.2 β€” Vulnerability Disclosure [x] Public VDP via SECURITY.md + GitHub Security Advisories + ⚠️ Vulnerability Management
    πŸ“¦ Β§ 2.3 β€” Software Bill of Materials [x] CycloneDX SBOM generation per release: docs/SBOM.md + GitHub Release artifacts
    πŸ” Β§ 2.4 β€” Secure Updates [x] npm registry distribution with SLSA Level 3 attestation: GitHub Attestations
    πŸ“Š Β§ 2.5 β€” Security Monitoring [x] CodeQL (every PR), OpenSSF Scorecard, Dependabot, npm audit in CI/CD β€” .github/workflows/
    πŸ“š Β§ 2.6 β€” Security Documentation [x] Comprehensive security documentation: SECURITY.md, SECURITY_ARCHITECTURE.md, THREAT_MODEL.md, SECURITY_HEADERS.md

    Extended Annex I Requirements:

    # Requirement Implementation Evidence Status
    1 Security by design TypeScript strict mode, Zod validation, defense-in-depth SECURITY_ARCHITECTURE.md βœ…
    2 Secure default configuration Safe defaults, no credentials required, public data only src/config.ts βœ…
    3 Protection against unauthorized access stdio transport (local only), input validation on all tools SECURITY_ARCHITECTURE.md βœ…
    4 Confidentiality of data Public data only, no PII storage, GDPR compliance SECURITY_ARCHITECTURE.md βœ…
    5 Integrity of data HTTPS for EP API calls, Zod response validation, typed schemas src/tools/ (all tool handlers) βœ…
    6 Data minimization Request only needed fields, TTL-based LRU caching src/clients/ep/baseClient.ts βœ…
    7 Availability Rate limiting (100 req/min), graceful error handling, circuit patterns src/clients/ep/baseClient.ts βœ…
    8 Minimize negative impact Error isolation per tool, no cascade failures, sanitized errors Error handling patterns βœ…
    9 Security updates Dependabot automated updates, CI/CD pipeline, npm publishing .github/workflows/ βœ…
    10 Vulnerability handling CodeQL, npm audit, responsible disclosure process SECURITY.md βœ…
    11 Information and instructions README, API docs, security documentation, deployment guide README.md, API_USAGE_GUIDE.md βœ…
    12 Software Bill of Materials CycloneDX SBOM generation per release docs/SBOM.md βœ…
    13 Coordinated vulnerability disclosure Security policy, GitHub advisories, 48h acknowledgment SLA SECURITY.md βœ…

    🎯 CRA Self-Assessment Status: EVIDENCE_GATHERED β€” All requirements documented with implementation evidence


    Supports CRA Article 19 β€” Conformity Assessment Documentation

    Reference: πŸ› οΈ Secure Development Policy

    πŸ§ͺ Control 🎯 Requirement βœ… Implementation πŸ“‹ Evidence
    πŸ§ͺ Unit Testing β‰₯80% line coverage, β‰₯70% branch βœ… 80%+ coverage, 1130+ tests Coverage Reports
    🌐 E2E Testing Critical user journeys validated βœ… 4 E2E suites / 71 tests passing E2E Results
    πŸ” SAST Scanning Zero critical/high vulnerabilities βœ… CodeQL on every PR CodeQL Workflow
    πŸ“¦ SCA Scanning Zero critical unresolved dependencies βœ… Dependabot + npm audit Dependabot Config
    πŸ”’ Secret Scanning Zero exposed secrets/credentials βœ… GitHub secret scanning enabled GitHub Security Settings
    πŸ“¦ SBOM Generation CycloneDX per release βœ… Automated in release workflow docs/SBOM.md
    πŸ›‘οΈ Provenance SLSA Level 3 attestation βœ… npm provenance + GitHub attestations Attestations
    πŸ“Š Quality Gates Passing quality metrics βœ… CI/CD pipeline with lint, build, test gates Workflows
    πŸ” License Compliance OSI-approved license verification βœ… Apache-2.0, automated license checks LICENSE.md, npm run test:licenses

    πŸ” Supply Chain Security: OpenSSF Scorecard SLSA 3

    πŸ† Best Practices & Quality: OpenSSF Best Practices License

    πŸ“Š Project Health: npm version Security Architecture Threat Model Documentation

    Evidence Type Location Verification CRA Mapping
    OpenSSF Scorecard Scorecard Automated Annex I Β§10
    SLSA Level 3 Attestations Build provenance Annex V Β§8
    SBOM (CycloneDX) docs/SBOM.md Generated per build Annex V Β§7
    Test Coverage (80%+) Coverage Automated Annex I Β§1
    Dependency Scanning Dependabot alerts Automated Annex I Β§10
    Static Analysis CodeQL results Automated per PR Annex I Β§1
    Security Documentation This repository Manual review Annex V Β§1-9
    npm Audit CI/CD pipeline Automated Annex I Β§9
    License Compliance npm run test:licenses Automated Annex V Β§1
    Branch Protection GitHub settings Configured Annex I Β§2

    Step Action Timeline
    1 Report via SECURITY.md or GitHub Security Advisories Immediate
    2 Acknowledgment of report 48 hours
    3 Initial assessment and triage 72 hours
    4 Fix development and testing Based on severity
    5 Security advisory publication With fix release
    6 npm package update Same day as fix

    Per ⚠️ Vulnerability Management:

    Severity CVSS Score Remediation Target
    πŸ”΄ Critical 9.0 – 10.0 24 hours
    🟠 High 7.0 – 8.9 7 days
    🟑 Medium 4.0 – 6.9 30 days
    🟒 Low 0.1 – 3.9 90 days
    • βœ… Dependabot automated dependency updates
    • βœ… CodeQL static analysis on every PR
    • βœ… npm audit in CI/CD pipeline
    • βœ… OpenSSF Scorecard monitoring
    • βœ… SLSA Level 3 build provenance
    • βœ… GitHub secret scanning
    • βœ… Dependency review on PRs

    πŸ” Standard Security Reporting Process:

    • πŸ“§ Private Reporting: GitHub Security Advisories for confidential disclosure
    • ⏱️ Response Timeline: 48h acknowledgment, 72h validation, severity-based resolution
    • πŸ† Recognition Program: Public acknowledgment unless anonymity requested
    • πŸ”„ Continuous Support: Latest version maintained with security updates
    • πŸ“‹ Vulnerability Scope: Input injection, data integrity, dependency vulnerabilities, rate limit bypass

    ISMS Integration: All vulnerability reports processed through ⚠️ Vulnerability Management procedures


    The following Hack23 AB projects demonstrate completed CRA assessments using the CRA Conformity Assessment Process template:

    πŸš€ Project πŸ“¦ Product Type 🏷️ CRA Classification πŸ“‹ Assessment Status πŸ”— Reference Link
    πŸ•΅οΈ CIA Political transparency platform Standard (Non-commercial OSS) βœ… Complete πŸ“„ CRA Assessment
    ⚫ Black Trigram Korean martial arts game Standard (Non-commercial OSS) βœ… Complete πŸ“„ CRA Assessment
    πŸ›‘οΈ CIA Compliance Manager Compliance automation tool Standard (Non-commercial OSS) βœ… Complete πŸ“„ CRA Assessment
    πŸ‡ͺπŸ‡Ί European Parliament MCP Server Political intelligence MCP server Standard (Non-commercial OSS) βœ… Complete This document

    ISMS Policy Relevance Link
    πŸ” Information Security Overarching security governance Information_Security_Policy.md
    πŸ”’ Secure Development Development security practices Secure_Development_Policy.md
    πŸ“¦ Open Source Policy OSS governance and transparency Open_Source_Policy.md
    πŸ” Vulnerability Management Vulnerability handling SLAs Vulnerability_Management.md
    🏷️ Classification Data classification framework CLASSIFICATION.md
    πŸ”’ Cryptography Encryption standards Cryptography_Policy.md
    🚨 Incident Response Incident procedures Incident_Response_Plan.md
    πŸ›‘οΈ CRA Process CRA conformity assessment template CRA_Conformity_Assessment_Process.md

    Document Description Link
    🎯 Threat Model STRIDE analysis, attack trees, and risk assessment THREAT_MODEL.md
    πŸ›‘οΈ Security Architecture Current security controls and 4-layer defense model SECURITY_ARCHITECTURE.md
    πŸ›οΈ Architecture C4 model system design overview ARCHITECTURE.md
    πŸ”„ Business Continuity Plan Recovery procedures and degradation strategy BCPPlan.md
    πŸ’° Financial Security Plan Security investment strategy FinancialSecurityPlan.md
    πŸ“¦ End-of-Life Strategy Technology lifecycle and migration planning End-of-Life-Strategy.md
    πŸ”’ Security Headers HTTP security headers implementation SECURITY_HEADERS.md
    πŸ“Š Data Model Entity relationships and data flows DATA_MODEL.md
    πŸ”„ Workflows CI/CD pipeline documentation WORKFLOWS.md

    This CRA assessment follows the Hack23 CRA Conformity Assessment Process template.
    Maintained as part of the Hack23 AB ISMS framework.
    Licensed under Apache-2.0