Stop Searching. Start Trusting.

The curated directory of MCP servers, vetted for security, efficiency, and quality.

Tired of the MCP "Marketplace" Chaos?

We built MCPScout.ai to solve the ecosystems biggest pain points.

No Insecure Dumps

We manually analyze every server for basic security flaws.

Easy Setup

Our gotcha notes warn you about complex setups.

Avoid "Token Hogs"

We estimate token costs for cost-effective agents.

Products, Not Demos

We filter out "Hello World" demos.

CATEGORIES:
SORT:

Vetted Servers(8554)

0
0
Low Cost
baiyaoyu icon

news-mcp-server

by baiyaoyu

Sec9

An MCP server designed to scrape news headlines from Chinese (ThePaper) and Singaporean (Zaobao) news outlets, exposing them via an API.

Setup Requirements

  • ⚠️Requires Python 3.13+ (currently in beta/release candidate)
  • ⚠️Requires `uv` package manager (and `uvx` for execution)
Verified SafeView Analysis
The code uses httpx for network requests with timeouts and error handling. BeautifulSoup is used for parsing, and no eval() or direct arbitrary code execution vectors were found. The use of json.loads(body) is on a controlled, integer-derived string, mitigating risk. No hardcoded secrets. General web scraping risks (IP blocking, HTML changes) apply but are not direct security flaws in the code itself.
Updated: 2025-11-19GitHub
0
0
Medium Cost
erold-dev icon

mcp-server

by erold-dev

Sec9

Enables AI assistants to directly manage Erold projects by interacting with tasks, projects, knowledge bases, and team contexts.

Setup Requirements

  • ⚠️Requires EROLD_API_KEY environment variable to be set.
  • ⚠️Requires EROLD_TENANT environment variable (your tenant ID or slug) to be set.
  • ⚠️AI assistants (e.g., Claude) may not expand shell variables in their MCP configuration; direct key/value assignment for environment variables within their config is often required.
Verified SafeView Analysis
The server securely handles API keys via environment variables (EROLD_API_KEY, EROLD_TENANT) and uses standard HTTPS for communication with the Erold API. It includes robust error handling, retries, and explicit logging for sensitive operations like retrieving vault secrets. No direct use of 'eval' or other highly risky dynamic code execution patterns was found in the provided source code. The core functionality relies on making authenticated HTTP requests to a defined external API, which is a common and generally safe pattern for an integration server. The primary security concern lies in the secure management of the EROLD_API_KEY by the user, which the project's documentation clearly advises on.
Updated: 2026-01-10GitHub
0
0
Medium Cost
james116blue icon

journald-mcp-server

by james116blue

Sec9

Access and filter systemd journal logs through an MCP server.

Setup Requirements

  • ⚠️Requires systemd-journal group access for the user running the server (usermod -aG systemd-journal $USER).
  • ⚠️Requires Python 3.12+.
  • ⚠️Operates exclusively on Linux systems with systemd and journald.
  • ⚠️Requires 'uv' for dependency management and running the server.
Verified SafeView Analysis
The server uses `systemd-python` for journal access, and `dateparser` for datetime parsing. Input parameters for filtering are used safely (e.g., `add_match` for journal reader, case-insensitive string `in` comparison for messages) without direct command execution or shell injection points. No hardcoded secrets are identified. Running the server requires the user to be part of the `systemd-journal` group, which is a standard privilege configuration for journal access and not a code vulnerability itself.
Updated: 2025-12-15GitHub
0
0
Low Cost
Sec9

A Python MCP (Model Context Protocol) server providing current time functionality via HTTP or Stdio.

Setup Requirements

  • ⚠️Requires `uv` for installation and execution.
  • ⚠️Requires Python 3.8 or higher.
Verified SafeView Analysis
The server implements a simple JSON-RPC style protocol with predefined methods (`initialize`, `tools/list`, `tools/call`). The `tools/call` method specifically checks for a 'get_current_time' tool, preventing arbitrary code execution. Inputs are parsed as JSON, and no 'eval' or similar dangerous functions are used. The server binds to `0.0.0.0`, which is standard but requires external firewalling for production environments to restrict access if needed. Overall, the limited functionality and clear input handling make it relatively secure for its purpose.
Updated: 2025-12-11GitHub
0
0
Medium Cost
bobatenikhil725 icon

database_mcp_server

by bobatenikhil725

Sec1

A server designed to manage and interact with a database, potentially related to a Master Control Program or Minecraft Protocol application.

Review RequiredView Analysis
CRITICAL: No source code was provided for analysis. Therefore, a comprehensive security audit could not be performed. The score is defaulted to 1 (lowest) as safety cannot be guaranteed without examining the code.
Updated: 2025-11-27GitHub
0
0
Medium Cost
goodshileidev icon

mcp-servers

by goodshileidev

Sec3

Manages the full development lifecycle for a Next Generation System (NGS) code generation platform, including data modeling, requirement, project, UI, report, template, and delivery management.

Setup Requirements

  • ⚠️Requires an external NGS API server to be running and accessible.
  • ⚠️Python 3.8+ is required.
  • ⚠️API communication relies on the `curl` command with the `--insecure` flag, bypassing TLS certificate validation and posing a significant security risk for sensitive data.
Verified SafeView Analysis
The server makes API calls to an external NGS API server using `curl` via `subprocess.run(..., shell=True)`. This setup inherently carries risks, although the data passed to curl is JSON-encoded and quoted, mitigating simple shell injection via arguments. CRITICALLY, the curl commands consistently use the `--insecure` flag, disabling SSL/TLS certificate validation. This makes all communications vulnerable to man-in-the-middle attacks and should never be used in production or for sensitive data. Additionally, the `token: null` header suggests either unauthenticated API access or a placeholder for a token, which could be insecure if the backend API is not designed for it. The base URL for the backend API can be configured via an environment variable, which is good practice, but the default or hardcoded URLs are accessed insecurely.
Updated: 2025-12-11GitHub
0
0
High Cost
mcorpening85 icon

neo4j-mcp-synthesis

by mcorpening85

Sec9

This MCP server ingests and parses transcripts to extract knowledge concepts (frameworks, principles, problems, relationships, insights) and stores them in a Neo4j knowledge graph.

Setup Requirements

  • ⚠️Requires Anthropic API Key (Paid API for LLM extraction).
  • ⚠️Requires a Neo4j database instance (Can be paid or self-hosted).
  • ⚠️Designed to run as a Cloudflare Worker/Durable Object, requiring a Cloudflare account and wrangler CLI for deployment.
Verified SafeView Analysis
The server uses parameterized queries for Neo4j, mitigating Cypher injection risks. Anthropic API keys are loaded from environment variables. LLM output (JSON) is parsed using a regex to isolate the JSON string before `JSON.parse`, reducing the risk of arbitrary code execution.
Updated: 2025-11-22GitHub
0
0
Medium Cost
openpharma-org icon

cdc-mcp

by openpharma-org

Sec4

Provides a unified interface to access a wide range of public health data from the CDC's Socrata Open Data API, covering disease prevalence, risk factors, and real-time surveillance.

Setup Requirements

  • ⚠️Requires Node.js version 18 or higher.
  • ⚠️Requires TypeScript to be installed and the project to be built (`tsc`) before running the generated JavaScript file.
  • ⚠️A `CDC_APP_TOKEN` environment variable is highly recommended for enhanced API rate limits (1,000 requests/hour vs. a shared pool), impacting performance without it.
Review RequiredView Analysis
The `search_dataset` method directly injects user-provided `where_clause` into a SoQL (Socrata Query Language) query without sanitization. This is a significant injection vulnerability, allowing for arbitrary manipulation of the query against the external CDC API, potentially leading to unintended data access, exfiltration, or denial of service on the Socrata platform. While it does not directly lead to RCE on the server, it is a critical flaw in data interaction.
Updated: 2025-12-22GitHub
0
0
Medium Cost
zobra-auto icon

valeria-mcp-server

by zobra-auto

Sec8

Provide a Microservices Communication Platform (MCP) API for managing barber shop appointments, including catalog search, barber resolution, and Google Calendar integration for scheduling and availability checks.

Setup Requirements

  • ⚠️Requires a Google Cloud Project with the Calendar API enabled and a Service Account configured with appropriate permissions. Service Account credentials must be provided via `GOOGLE_SA_KEYFILE`, `GOOGLE_APPLICATION_CREDENTIALS_JSON`, or `GOOGLE_SA_JSON_BASE64` environment variables.
  • ⚠️Requires `data/barbers.json` and `data/business_hours.json` files to exist and be correctly formatted in the project root or specified via environment variables.
  • ⚠️An `API_KEY` environment variable is required for all API authentication.
Verified SafeView Analysis
The server implements API key authentication with `timingSafeCompare` to prevent timing attacks, and includes rate limiting. It securely loads Google Service Account credentials from environment variables or files. The `calendar.create` action includes a critical conflict check (`SLOT_OCCUPIED`) before adding events, preventing double-bookings. CORS is enabled globally, which might require careful configuration in a production environment to restrict origins.
Updated: 2025-11-24GitHub
0
0
Medium Cost
labki-org icon

mw-mcp-server

by labki-org

Sec9

Integrates MediaWiki with large language models to provide semantic search, conversational AI, and structured wiki data access through LLM-callable tools.

Setup Requirements

  • ⚠️Requires OpenAI API Key (Paid Service).
  • ⚠️Requires PostgreSQL with pgvector extension (handled by provided Docker image).
  • ⚠️The 'WIKI_CREDS' environment variable requires a JSON string with specific secrets for each wiki, which can be complex to set up for multi-tenant environments.
Verified SafeView Analysis
The server employs robust security practices including: bidirectional JWT authentication with strong validation (scopes, issuers, audiences, `wiki_id`), Pydantic models for strict input/output validation (e.g., `extra="forbid"`), explicit tool dispatching with allow-listing, and safeguards against path traversal. SQLAlchemy ORM is used for database interactions mitigating common SQL injection risks. A global exception handler prevents sensitive information leakage. The primary security dependency lies in the MediaWiki Semantic MediaWiki (SMW) extension's handling of raw `#ask` queries forwarded by the server, though the server adds validation for known properties/categories to mitigate LLM hallucinations. No direct `eval` or `exec` on user input is observed.
Updated: 2026-01-18GitHub
0
0
Medium Cost
gouthamgo icon

mcp-server

by gouthamgo

Sec9

Provides Model Context Protocol (MCP) server implementations to integrate AI clients (like Claude) with various external services, including a virtual try-on shopping assistant, Salesforce Marketing Cloud, and a comprehensive ecommerce suite.

Setup Requirements

  • ⚠️Requires Node.js v18+ (v20+ recommended) for Node.js servers or Python 3.8+ for Python servers, crucial for `fetch` API support.
  • ⚠️Requires manually populating `.env` files with API keys and other credentials (e.g., Salesforce credentials, HuggingFace token) for specific tools.
  • ⚠️Requires absolute paths for server command and arguments when configuring with Claude Desktop or other MCP clients.
  • ⚠️In-memory data stores in demo ecommerce servers must be replaced with a real database for production use.
Verified SafeView Analysis
The project extensively documents security best practices in `SECURITY.md`, covering input validation, secrets management (environment variables, `.gitignore`), API security (rate limiting, HTTPS), network security (SSRF, domain allowlisting), and deployment security (Docker, non-root users). Tool execution includes generic `try-catch` blocks and uses `McpError` to prevent raw error leakage. However, actual security relies on users implementing the documented best practices and replacing in-memory data stores with secure databases in production, as some demo servers currently use in-memory state.
Updated: 2025-11-18GitHub
0
0
High Cost
Sec8

Provides semantic search and code vectorization capabilities using Qdrant vector database and various embedding providers, suitable for AI-assisted development and knowledge base management.

Setup Requirements

  • ⚠️Requires Qdrant and Ollama Docker containers (or local installations) to be running.
  • ⚠️The 'nomic-embed-text' Ollama model (or specified embedding model) must be pulled if using Ollama.
  • ⚠️Requires API keys (e.g., OPENAI_API_KEY, COHERE_API_KEY, VOYAGE_API_KEY) if not using Ollama as the embedding provider.
Verified SafeView Analysis
The server includes path validation (`validatePath`) to prevent directory traversal attacks when indexing codebases. For HTTP transport, the README provides critical security warnings regarding deployment (HTTPS, authentication, firewalls, reverse proxy). Rate limiting is implemented for the HTTP server to mitigate abuse. The `containsSecrets` function is a feature to detect potential secrets within *indexed user codebases*, not within the server's own codebase, which is a good safety measure. No 'eval' or obvious hardcoded secrets were found in the provided source.
Updated: 2026-01-17GitHub
PreviousPage 443 of 713Next