Table of Contents

  1. The Viral Claim: "52% Dead Across 2,181 Endpoints"
  2. Source Verification: Apigene and Rapid Claw
  3. ⚠️ Verdict: The Numbers Are Conditionally True
  4. Cross-Reference with KanseiLink's 225+ Service Data
  5. Why MCP Servers Die — The Three Root Causes
  6. 7 Prevention Steps for Japanese SaaS Vendors
  7. FAQ

The Viral Claim: "52% Dead Across 2,181 Endpoints"

In late April 2026, a single number is spreading through AI agent developer communities.

"An audit of 2,181 remote MCP server endpoints found 52% completely dead, with only 9% healthy."

The figure traces to Apigene's April 2026 "Host MCP Server: The 2026 Deployment Guide," which has been widely cited. It surfaced concurrently with Cloudflare's enterprise MCP architecture announcement (April 22, 2026, reported by InfoQ), reinforcing a narrative that "ghost servers are proliferating beneath the MCP boom."

Rapid Claw published a separate study the same month: "Of 1,847 MCP servers audited, 52% are abandoned, 31% lightly maintained, and only 17% meet a reasonable production bar." Both studies converge — strangely — on the same 52% dead/abandoned figure.

April 2026: Two Independent Audits (Compared)

52%
Apigene:
Completely Dead (n=2,181)
39%
Apigene:
Degraded
9%
Apigene:
Fully Healthy
17%
Rapid Claw:
Production-Grade (n=1,847)

Source Verification: Apigene and Rapid Claw

To assess the claim's validity, we examined the following dimensions of both studies.

① Source Independence

Apigene and Rapid Claw are independent vendors and publishers. Neither cites the other, and the convergence on 52% may either be coincidental or reflect that both scraped overlapping populations (public MCP registries). At minimum, no derivative relationship is observable in the public record.

② Sampling Methodology

Neither audit publishes detailed sampling methodology. This category of study typically scrapes endpoints from modelcontextprotocol.io/servers, third-party MCP registries, and public GitHub repositories listing remote MCP endpoints. Critically, this represents "MCP servers listed in public registries," not "all MCP servers in existence" — a sample biased toward open-source and demo deployments.

③ Health-Judgment Criteria

Apigene defines healthy as "responds to a health check with HTTP 200 and a valid JSON response." Dead encompasses timeouts, 5xx errors, and connection refusal. Rapid Claw's "production-grade" bar is stricter, additionally requiring "commits in the last 30 days," "complete documentation," and "semantic versioning" — explaining why their healthy-equivalent figure (17%) exceeds Apigene's (9%) despite both reporting 52% dead/abandoned.

⚠️ Conditionally True

Verdict: "Most public MCP servers are dead" is broadly correct, but population matters

The convergence of two independent April 2026 audits on 52% dead/abandoned makes the claim credible for public-registry-listed MCP servers. However, the figure does not generalize to enterprise-internal deployments or closed servers. The gap between "9% healthy" and "17% production-grade" reflects different judgment thresholds, not contradictory findings — both point to the same underlying reality.

KanseiLink evaluates Agent Readiness across 225+ services (primarily Japanese SaaS). Direct comparison with external audits isn't possible due to different populations, but structurally analogous metrics align as follows.

Metric Apigene (n=2,181) Rapid Claw (n=1,847) KanseiLink (n=225+)
Healthy / Top Quality 9% 17% ~3% (verified, 6 services)
Connectable but Unverified 39% 31% Majority (connectable)
Effectively Unusable 52% 52% ~30% (info_only)

KanseiLink only catalogs services with vendor-confirmed existence, so its "effectively unusable" rate runs lower than the external audits. Conversely, KanseiLink's verified rate (~3%) is more demanding than Apigene's "healthy 9%" because verification requires demonstrated agent success in production. Once you normalize for population and threshold, all three studies converge: the vast majority of MCP servers are 'connectable but not trustworthy.'

Implications for Japanese SaaS

In KanseiLink data, AAA-rated services nearly all reach verified status (success rate ≥80%), but AA-and-below ratings show wide variance in actual success. This signals a substantial gap between "released an official MCP server" and "agents can rely on it in production" — consistent with what the external audits show at scale.

Why MCP Servers Die — The Three Root Causes

Synthesizing Apigene's analysis, industry commentary, and KanseiLink's error logs yields three primary failure modes.

Cause ①: Abandoned Servers with Expired Credentials

Demo MCP servers built by individual developers fall into disuse after API keys or OAuth tokens expire. They remain listed in registries but score as "dead" in health audits because they can no longer authenticate to upstream services.

Cause ②: Silent Breakage from Upstream API Changes

When SaaS vendors revise API specifications, MCP servers that don't track the changes return broken response schemas. They still return HTTP 200, evading dead/alive classification, but agents can't parse the result. KanseiLink's api_error error class captures most of this category.

Cause ③: Serverless Cold-Start Timeouts

MCP servers deployed on serverless platforms other than Cloudflare Workers (AWS Lambda, Vercel Functions) suffer 10-second-plus cold starts under low traffic. Agents time out and abandon the call. These servers register as unstable in health audits — passing or failing depending on time-of-day.

7 Prevention Steps for Japanese SaaS Vendors

The "52% public-registry death rate" data is a wake-up call for Japanese SaaS vendors. Here are seven concrete prevention steps to keep an MCP server alive after launch.

⚠️ "Ship and Forget" is the Biggest Risk

An MCP server that ships in a press release but receives no updates for six months gets logged as "dead" by external audits, damaging the vendor's reliability score. Treat MCP servers as living software assets requiring the same quality lifecycle as your APIs.

Will Your MCP Server Make the "Healthy 9%"?

KanseiLink's AEO assessment evaluates your MCP server's production readiness from an independent third-party perspective and maps the path to verified status.

Request an AEO Assessment

FAQ

Where does the "2,181 endpoints, 52% dead" figure come from?

The most widely cited source is Apigene's April 2026 "Host MCP Server: 2026 Deployment Guide." Rapid Claw separately published "1,847 servers audited, 52% abandoned" the same month. Two independent studies converge on the same conclusion. However, neither publishes full sampling methodology or judgment criteria.

Does KanseiLink data show the same trend?

KanseiLink covers 225+ services (mostly Japanese SaaS) — a different population. Verified (success rate ≥80%) is just 3% (6 services), aligning structurally with the external audits' "9% healthy" and "17% production-grade." All three studies point to the same conclusion: trustworthy MCP servers are a small minority.

What are the main reasons MCP servers die?

(1) Abandoned servers with expired credentials, (2) silent breakage from upstream API changes (HTTP 200 with broken response schemas), (3) cold-start timeouts on serverless platforms. Japanese SaaS vendors can prevent these with continuous health monitoring and pinned API versions.

Data Disclosure & Disclaimer

This article cites third-party studies published by Apigene and Rapid Claw in April 2026. Neither study fully publishes sampling methodology or judgment criteria, and the population (public-registry-listed MCP servers) may be biased toward open-source and demo deployments. KanseiLink data reflects 225+ services' agent-call logs and is not directly comparable to the external audits.