Stop Searching. Start Trusting.

The curated directory of MCP servers, vetted for security, efficiency, and quality.

Tired of the MCP "Marketplace" Chaos?

We built MCPScout.ai to solve the ecosystems biggest pain points.

No Insecure Dumps

We manually analyze every server for basic security flaws.

Easy Setup

Our gotcha notes warn you about complex setups.

Avoid "Token Hogs"

We estimate token costs for cost-effective agents.

Products, Not Demos

We filter out "Hello World" demos.

CATEGORIES:
SORT:

Vetted Servers(8554)

0
0
Low Cost
kumaran-is icon

mcp-weather-server

by kumaran-is

Sec9

Provides current and forecasted weather data as a tool for AI agents (like Cline), as well as for general production APIs and custom applications, with robust resilience and security features.

Setup Requirements

  • ⚠️Requires Node.js and npm to run.
  • ⚠️Requires an external weather API key (e.g., Open-Meteo) for core functionality.
Verified SafeView Analysis
The server demonstrates a strong focus on security with comprehensive features including: - **Input Sanitization:** Uses `DOMPurify` via `SecurityManager` to prevent XSS, SQL injection, command injection, and path traversal in all inputs (body, query, params, headers). - **Threat Detection:** `SecurityMonitor` actively detects brute force attempts, rate limit violations, and suspicious patterns (SQL/XSS/command injection) and can auto-block malicious IPs. - **Authentication & Authorization:** API key validation with permissions and rate limiting (`auth.ts`, `rate-limit.ts`) is in place, supporting different client tiers. - **Audit Logging:** `AuditLogger` provides detailed audit trails for security, data access, and API usage, with configurable severity, categories, and sensitive data masking. - **Resilience Patterns:** `CircuitBreaker`, `RetryStrategy`, `Bulkhead`, and `RateLimiter` prevent cascading failures and protect external APIs. - **Secure Headers:** Automatically adds `Content-Security-Policy`, `X-Content-Type-Options`, `X-Frame-Options`, `X-XSS-Protection`, and `Referrer-Policy` headers. - **No obvious hardcoded secrets:** Environment variables are used for API keys and sensitive configurations. Potential areas for even higher scores (though already excellent): - Real-time threat intelligence feeds for dynamic pattern updates. - More advanced behavioral analysis for anomaly detection beyond defined patterns. - External security audits and penetration testing results.
Updated: 2025-12-04GitHub
0
0
High Cost
tayyab415 icon

directors-cut

by tayyab415

Sec8

Transforms long-form YouTube videos into viral-ready vertical edits using multi-modal AI for content analysis, editing, and production polish.

Setup Requirements

  • ⚠️Requires multiple paid AI API keys (Google Gemini, ElevenLabs, Nebius AI Studio) for full functionality.
  • ⚠️Requires FFmpeg to be installed as a system dependency.
  • ⚠️YouTube download features are restricted on Hugging Face Spaces, requiring manual YouTube cookies upload or a separate YouTube proxy service deployment.
  • ⚠️Requires `whisperx` and `torch` which might have complex installation steps (e.g., `pip install git+https://github.com/m-bain/whisperx.git`).
Verified SafeView Analysis
The core server logic (app.py, src/server.py) uses `json.loads` for parsing JSON inputs and constructs `subprocess.run` commands with lists of arguments, which mitigates common command injection vulnerabilities. API keys (Gemini, ElevenLabs, Nebius) are correctly loaded from environment variables. File paths are constructed using `os.path.join` to prevent path traversal. A test script (`verify_workflow.py`) contains an `eval()` call, which is a security risk if exposed to untrusted input, but it is isolated to a test context. Network requests to various AI APIs are expected for functionality but depend on external service security. YouTube download features may encounter network restrictions on certain deployment platforms (e.g., Hugging Face Spaces), requiring proxies or cookie workarounds.
Updated: 2025-11-29GitHub
0
0
Medium Cost

Manages HubSpot marketing emails (list, get, create draft, update) from Claude Desktop.

Setup Requirements

  • ⚠️Requires obtaining a HubSpot Access Token with 'content' scope, involving several manual steps in the HubSpot portal.
  • ⚠️Requires manual editing of the Claude Desktop configuration file (~/Library/Application Support/Claude/claude_desktop_config.json).
  • ⚠️The 'command' in Claude Desktop config requires the absolute path to the 'hubspot-email-mcp' directory.
Verified SafeView Analysis
The server correctly retrieves the HubSpot Access Token from an environment variable (HUBSPOT_ACCESS_TOKEN), avoiding hardcoded secrets. Input validation is performed using Zod schemas. It explicitly states that email sending functionality is not implemented to prevent accidental sends, which is a significant security consideration. Communication with the HubSpot API uses HTTPS. No 'eval' or other highly dangerous patterns are observed. The primary security responsibility lies with the user in securely managing their HubSpot Access Token.
Updated: 2025-11-30GitHub
0
0
Medium Cost

The Snowflake MCP Server provides a comprehensive suite of tools for managing, monitoring, and optimizing Snowflake data clouds, encompassing data discovery, intelligence, automation, security, and governance.

Setup Requirements

  • ⚠️Requires Docker and Docker Compose for deployment.
  • ⚠️Requires Snowflake ACCOUNTADMIN role credentials (account, user, base64-encoded DER private key).
  • ⚠️Requires specific firewall port (8083 by default) to be open for access.
Review RequiredView Analysis
The server is configured to run with `ACCOUNTADMIN` privileges, exposing full control over the Snowflake environment via its API. The `run_snowflake_query` tool (and potentially others) executes arbitrary SQL strings directly without parameter binding, making it highly vulnerable to SQL injection. Furthermore, the `server_http.py`'s CORS policy `allow_origins=["*"]` enables access from any domain, significantly broadening the attack surface. Snowflake private keys are stored as environment variables, which, while more secure than passwords, are still sensitive credentials.
Updated: 2025-11-27GitHub
0
0
Low Cost
Sec9

Provides real-time weather forecasts and alerts for US locations by integrating with the National Weather Service API.

Setup Requirements

  • ⚠️Requires Python 3.13 or higher.
  • ⚠️Requires the `uv` package manager for installation and execution.
  • ⚠️Requires internet access to communicate with the National Weather Service API.
  • ⚠️Only provides data for US locations.
Verified SafeView Analysis
The server uses `httpx` for network requests to a public API (api.weather.gov) which requires no API key. There are no hardcoded secrets, `eval` calls, or other obvious vulnerabilities. Error handling for network requests is broad but returns `None` which is handled by the calling functions, preventing direct exposure of internal errors.
Updated: 2026-01-19GitHub
0
0
Low Cost
andreasgerstmayr icon

tempo-mcp-gateway

by andreasgerstmayr

Sec9

The tempo-mcp-gateway acts as an instance-aware and tenant-aware gateway for Grafana Tempo's MCP (Management Control Plane) server, simplifying interaction with multiple Tempo instances within a Kubernetes cluster.

Setup Requirements

  • ⚠️Requires a Kubernetes cluster for deployment and operation.
  • ⚠️Relies on Grafana Tempo Operator Custom Resource Definitions (CRDs) (TempoStack, TempoMonolithic) to discover Tempo instances.
  • ⚠️The provided deployment manifests include OpenShift-specific resources (Route), implying an OpenShift environment, though it can be adapted for standard Kubernetes.
Verified SafeView Analysis
The server uses standard Kubernetes practices for secure communication, including in-cluster configuration for the Kubernetes API client and a service CA certificate for TLS. It properly forwards client authorization tokens to downstream Tempo instances, maintaining the client's original permissions. There are no observed hardcoded secrets, 'eval' usage, or other obvious malicious patterns. The RBAC rules are appropriately scoped to 'list' Tempo custom resources, limiting its own cluster permissions. The filtering of accessible tenants by probing readiness endpoints is a good practice to ensure the gateway only exposes what the client is authorized to access.
Updated: 2025-12-15GitHub
0
0
High Cost
slop-at icon

slopnet-mcp

by slop-at

Sec7

This server allows users to post markdown notes ('slops') to a distributed knowledge graph, automatically extracting entities and integrating with a user's GitHub repository.

Setup Requirements

  • ⚠️Requires `uv` (a modern Python package installer) to be installed locally.
  • ⚠️Requires users to create and configure a GitHub repository for storing their slops.
  • ⚠️Requires the Claude Desktop application and manual modification of its `claude_desktop_config.json`.
  • ⚠️The GLiNER2 entity extraction model (340M parameters) will be downloaded on first use, requiring significant disk space and an internet connection.
Verified SafeView Analysis
The server uses `subprocess.run` for Git operations (clone, add, commit, push), which are necessary for its functionality and appear to be well-controlled with predefined commands and arguments. It makes network requests to 'https://slop.at' (default) for knowledge graph queries, updates, and publishing slop content and extracted entities. This means user data (slops, extracted entities, RDF triples) is sent to an external service, which is inherent to its distributed design. SPARQL queries and updates are passed directly to the remote server. While `query_slops` is for data retrieval, `update_graph` explicitly warns 'Advanced users only - use with caution!', as arbitrary SPARQL UPDATE queries could be destructive if the backend server is not properly secured against such operations or if a malicious prompt were to generate one. No `eval` or obvious hardcoded secrets were found.
Updated: 2026-01-19GitHub
0
0
High Cost
Sec9

This server connects Claude AI to an OpenCTI threat intelligence platform, allowing the AI to query, analyze, and manage cybersecurity intelligence data.

Setup Requirements

  • ⚠️Requires an existing OpenCTI instance (v5.x or v6.x) to be deployed and accessible.
  • ⚠️An OpenCTI API token with appropriate permissions is mandatory.
  • ⚠️Requires Python 3.10 or higher.
Verified SafeView Analysis
The project demonstrates a strong focus on security best practices: API tokens are loaded from environment variables (`.env`) and explicitly warned against committing to version control. SSL verification is enabled by default for all HTTP communications. Input validation is performed for observable types and GraphQL queries use variables, reducing direct injection risks. There are no signs of 'eval', obfuscation, or arbitrary code execution. The documentation provides clear security notes on token management and SSL usage.
Updated: 2025-11-26GitHub
0
0
Medium Cost
RaphaEnterprises-AI icon

argus-mcp-server

by RaphaEnterprises-AI

Sec9

Model Context Protocol (MCP) server for Argus E2E Testing Agent, enabling AI coding assistants to interact with web automation, E2E testing, and quality intelligence capabilities.

Setup Requirements

  • ⚠️Requires a Cloudflare account for deployment and utilization of Workers, R2, KV, and Durable Objects.
  • ⚠️Dependencies on external Argus API (ARGUS_API_URL) and Argus Brain API (ARGUS_BRAIN_URL) for core functionality (browser automation, AI intelligence, test generation, etc.). These services are not part of this repository.
  • ⚠️Requires configuration of several Cloudflare bindings (Workers AI, R2 bucket, KV namespace, Durable Objects) and secrets (API_TOKEN, BROWSER_POOL_JWT_SECRET, ANTHROPIC_API_KEY) for full operation.
Verified SafeView Analysis
The server uses JWT for authenticating with its browser pool, signed URLs for R2 screenshot access, and an OAuth2 device flow for user authentication, which are good security practices. Secrets like API tokens and JWT signing keys are stored as environment variables/Cloudflare secrets. A minor concern is the 'default-secret-for-dev' fallback for BROWSER_POOL_JWT_SECRET, which could be a risk if inadvertently used in production, though it's clearly labeled for development.
Updated: 2026-01-17GitHub
0
0
Medium Cost
bioanywhere icon

happy

by bioanywhere

Sec8

This repository provides client libraries for interacting with the World News API, enabling access to news sources and semantic news search capabilities.

Setup Requirements

  • ⚠️Requires Python 3.7+ for the Python package.
  • ⚠️Requires Qt and CMake 3.2+ for the C++ client.
  • ⚠️Access to the World News API requires an API key, which might entail registration or a paid plan.
  • ⚠️Requires internet access to connect to the external World News API.
Verified SafeView Analysis
The project is an API client library, shifting primary security responsibilities (API key storage, input sanitization) to the consuming application. API keys are passed in query parameters or headers, which is standard but requires HTTPS for confidentiality. The C++ client includes a local TCP ReplyServer for OAuth redirect handling, which, while standard, needs careful implementation to prevent local network vulnerabilities. URL parameter substitution uses regular expressions, which could be a ReDoS vector if server variable values were untrusted, but they are typically fixed configuration. There are no obvious hardcoded secrets or malicious patterns in the provided truncated code.
Updated: 2025-12-13GitHub
0
0
Medium Cost
AbdelilahOu icon

DBMcp

by AbdelilahOu

Sec3

This MCP server provides AI assistants with a standardized interface to connect, query, and manage various SQL databases, enabling data interaction and schema exploration.

Setup Requirements

  • ⚠️Requires direct network access to the configured PostgreSQL and MySQL databases from the server's host environment.
  • ⚠️A 'connections.json' configuration file, containing database connection details and credentials, must be provided to the server.
  • ⚠️To build the server from source, a Go development environment (Go 1.18+ recommended) is required.
Review RequiredView Analysis
CRITICAL: Database credentials (usernames and passwords) are hardcoded directly into 'connections.json' as plain text. This file is likely committed to the repository, representing a severe exposure of sensitive information. The 'execute_query' tool allows direct execution of arbitrary SQL (INSERT, UPDATE, DELETE, CREATE, ALTER, DROP) provided by an AI, with only a weak blacklist for specific dangerous operations (like 'DROP DATABASE' or 'TRUNCATE'). This makes the server highly vulnerable to SQL injection, unauthorized data manipulation, and schema destruction if the AI's input is compromised or crafted maliciously. There is no explicit authentication or authorization layer implemented for AI clients interacting with the server's tools, relying solely on the underlying MCP transport's security (which is 'stdio' for local clients in the provided configuration, but can change).
Updated: 2025-12-01GitHub
0
0
Low Cost
anandramkumar2020 icon

mcp-101

by anandramkumar2020

Sec9

An educational MCP (Model Context Protocol) server demonstrating fundamental concepts and providing simple calculator and API bridge tools for AI models.

Setup Requirements

  • ⚠️Requires Python 3.10 or higher
  • ⚠️Requires `uv` package manager for dependency management
Verified SafeView Analysis
No 'eval' or similar dynamic code execution found in the server or tool implementation files. Tool calls are explicitly routed based on string matching (`if name == "x_add"`) in `server.py`, preventing arbitrary function calls. The `x_api_demo` function explicitly uses a simulated response, avoiding direct external network calls within this demo implementation. Input parameters for calculator functions expect integers, and division by zero is handled gracefully.
Updated: 2025-11-23GitHub
PreviousPage 452 of 713Next