Stop Searching. Start Trusting.

The curated directory of MCP servers, vetted for security, efficiency, and quality.

Tired of the MCP "Marketplace" Chaos?

We built MCPScout.ai to solve the ecosystems biggest pain points.

No Insecure Dumps

We manually analyze every server for basic security flaws.

Easy Setup

Our gotcha notes warn you about complex setups.

Avoid "Token Hogs"

We estimate token costs for cost-effective agents.

Products, Not Demos

We filter out "Hello World" demos.

CATEGORIES:
SORT:

Vetted Servers(8554)

0
0
Low Cost
kfbyldy icon

mcp-server

by kfbyldy

Sec7

An MCP server designed to ingest data into a big data platform and provide weather information.

Setup Requirements

  • ⚠️Requires Python 3.13 or higher.
  • ⚠️Access to an internal network (specifically 'uds-index-platform.test.fnwintranet.com') is required for the big data upload functionality.
  • ⚠️The 'uv' tool for running the server might need prior installation (e.g., 'pip install uv' or 'pipx install uv').
Verified SafeView Analysis
The 'mcp_logger.py' script uses 'subprocess.Popen' to execute arbitrary commands, which is powerful but used for its intended purpose of command wrapping and logging. No 'eval' or explicit obfuscation is present. The 'USER="test"' is hardcoded in 'mcp_server.py', which is not a secret but a fixed configuration that might be problematic if 'test' user has elevated privileges or if it's not intended for a production environment. The target API base URL 'http://uds-index-platform.test.fnwintranet.com' is an internal test URL, implying an internal network dependency.
Updated: 2025-12-26GitHub
0
0
Medium Cost
adwonnacott icon

docs-scraper-mcp

by adwonnacott

Sec9

Scrapes documentation from websites using Firecrawl, stores it locally, backs it up to GitHub, and provides tools for retrieval, search, and management.

Setup Requirements

  • ⚠️Requires a Firecrawl API key (paid service after free tier).
  • ⚠️Requires a GitHub Personal Access Token with repository access.
  • ⚠️Requires a pre-initialized GitHub repository (with at least one commit) for backups.
Verified SafeView Analysis
The server correctly handles API keys and tokens via environment variables. File system operations are strictly confined to a dedicated 'scraped-docs' directory within the user's home. Input validation is performed using Zod schemas for tool arguments. There is no usage of 'eval' or apparent code obfuscation. Path construction for local files mitigates directory traversal risks. Interaction with external APIs (Firecrawl, GitHub) is well-structured with retry logic. The primary residual risk would be from the content scraped itself if it were crafted to exploit a downstream consumer, but this server does not introduce new vulnerabilities in that regard.
Updated: 2025-11-27GitHub
0
0
High Cost
hmmroger icon

simply-feed-mcp

by hmmroger

Sec8

A Model Context Protocol (MCP) server that enables AI assistants to fetch, search, and retrieve real-time information from RSS/news feeds, including summarization and topic extraction using an LLM.

Setup Requirements

  • ⚠️Requires Node.js 20+.
  • ⚠️Requires an OpenAI-compatible LLM API Key (paid service) for summarization and search capabilities.
  • ⚠️A separate worker process (e.g., `npx simply-feed-mcp --worker`) must be running to continuously fetch and process feed items, otherwise the MCP server will not have any data.
Verified SafeView Analysis
The server uses environment variables for sensitive configurations like LLM API keys and Azure Storage connection strings, which is good practice. Feed URLs for fetching content are loaded from a configuration file or Azure Blob, requiring trust in the source of these configurations to prevent Server-Side Request Forgery (SSRF). LLM responses are parsed as JSON and validated using Zod schemas, mitigating risks associated with untrusted LLM output. No direct 'eval' calls or obfuscation found.
Updated: 2026-01-19GitHub
0
0
Medium Cost
Sec4

A personalized AI Learning Coach MCP server that tracks learning progress, fetches relevant content, and generates daily learning insights using RAG.

Setup Requirements

  • ⚠️Requires a Supabase database instance with pgvector extension and a specific SQL schema to be set up manually.
  • ⚠️Requires a Groq API Key, which is a paid service for LLM inference.
  • ⚠️Requires `sentence-transformers` to download and run a local embedding model (e.g., `all-MiniLM-L6-v2`), which consumes local CPU/RAM.
Review RequiredView Analysis
The `src/ingestion/content_fetcher.py` file explicitly bypasses SSL certificate verification for network requests (`ssl._create_default_https_context = ssl._create_unverified_context`). This is a critical security vulnerability that makes the server susceptible to Man-in-the-Middle (MiTM) attacks when fetching content from RSS feeds or blogs, potentially allowing attackers to inject malicious content. While other parts of the code (Supabase client usage, Groq API key handling via environment variables) appear to follow good practices, this SSL bypass is a severe flaw for any system interacting with external content sources. No 'eval' or obvious hardcoded secrets were found.
Updated: 2025-12-10GitHub
0
0
Medium Cost
jayasimhag1reddy icon

Context-Persistance

by jayasimhag1reddy

Sec8

Enables cross-window context sharing for AI conversations in VS Code by persistently storing and linking discussions across different repositories.

Setup Requirements

  • ⚠️Requires manual configuration in VS Code's `mcpServers.json` settings file with the absolute path to the compiled server.
  • ⚠️Requires Node.js and `npm` to build and run (`npm install`, `npm run build`).
Verified SafeView Analysis
The server uses `better-sqlite3` with prepared statements for database operations, which effectively prevents common SQL injection vulnerabilities. Communication occurs via standard I/O (`StdioServerTransport`), meaning no network ports are directly exposed by this server instance. Entity extraction and search queries rely on regex and FTS5 `MATCH` clauses, treating user input as literal search terms rather than executable code. The database is stored locally in the user's home directory. While FTS5 queries with very complex syntax could potentially be used for local resource exhaustion, the overall design for a local-only server interacting with Copilot appears robust against common remote attack vectors and data manipulation.
Updated: 2025-12-13GitHub
0
0
Low Cost
mlopezgez icon

mcp-server-repomix

by mlopezgez

Sec10

Serves model context via the Model Context Protocol, integrated as an extension within the Zed editor for the 'Repomix' project.

Setup Requirements

  • ⚠️Requires the Rust toolchain (compiler and Cargo) to build the extension.
  • ⚠️Not a standalone executable; it must be compiled as a dynamic library and loaded by the Zed editor as an extension.
  • ⚠️The provided `main` function is a placeholder and does not initiate the actual Model Context Protocol server functionality.
Verified SafeView Analysis
The provided source code is extremely minimal, consisting of a 'Hello, world!' main function, and common, well-regarded Rust dependencies. It's intended to be compiled as a C-compatible dynamic library (cdylib) for an editor extension. No network activity, file system operations, user input processing, hardcoded secrets, 'eval' patterns, or obfuscation are present in the provided snippet. The actual server logic is not visible.
Updated: 2025-12-02GitHub
0
0
Low Cost
Sec8

A starter template for building Model Context Protocol (MCP) servers in Rust, enabling AI assistant integrations.

Setup Requirements

  • ⚠️Requires Rust 1.85+ (Rust 2024 edition).
  • ⚠️The `rmcp` library has specific API patterns (e.g., `#[tool]` macros) that users need to follow.
  • ⚠️No built-in authentication, authorization, or TLS for HTTP transport; users must implement these for secure production deployments.
Verified SafeView Analysis
The server explicitly provides guidance on security considerations, such as using environment variables for sensitive values, binding to localhost (127.0.0.1) in production, and sanitizing inputs. It utilizes `figment` for robust configuration management (TOML, environment variables, CLI) which helps prevent hardcoded secrets. Structured logging with `tracing` mitigates log injection. However, the template explicitly states that it does *not* provide built-in authentication, authorization, or TLS, advising users to add these as needed for production deployments. The default HTTP host bind `0.0.0.0` is configurable, but also requires users to be aware of network exposure.
Updated: 2025-11-25GitHub
0
0
Medium Cost
Sec8

Integrates Exploit-DB with AI assistants (e.g., Open-WebUI) to assist with penetration testing workflows by searching for and retrieving exploit information.

Setup Requirements

  • ⚠️Requires manual extraction of the `exploitdb-main.zip` database to a specified path (defaults to home directory).
  • ⚠️Optional but recommended: `searchsploit` must be installed separately for faster searches; otherwise, CSV parsing is used, which can be slower.
  • ⚠️Requires manual configuration within Open-WebUI (Admin Panel or `mcp.json` modification). Docker Open-WebUI users require volume mounts and Python installed within the container.
Verified SafeView Analysis
The server executes external commands via `subprocess.run` (specifically `searchsploit`) with user-provided `keyword` and `edb_id`. While `searchsploit` is a legitimate and common tool for this purpose, direct passing of unsanitized user input to external commands can be a vector for command injection if not handled carefully, or if `searchsploit` itself has vulnerabilities. However, `searchsploit` is designed to process arbitrary search terms. The `README.md` explicitly warns against exposing the server to the internet and emphasizes use for authorized testing only, which mitigates the primary risks. No `eval` or hardcoded secrets were found.
Updated: 2025-12-14GitHub
0
0
Low Cost

A web dashboard for Magalu Marketplace sellers to manage their products, orders, customer service tickets, customer questions, and chat conversations.

Setup Requirements

  • ⚠️Requires a valid Magalu API Key (obtained from the Magalu Developer Portal)
  • ⚠️Requires a valid Magalu Seller ID
Verified SafeView Analysis
The application stores the Magalu API Key and Seller ID directly in the browser's localStorage in plaintext. This is a critical security vulnerability, as these credentials can be easily exfiltrated via Cross-Site Scripting (XSS) attacks. Any successful XSS exploit would grant an attacker full access to the seller's Magalu account via the exposed API key and seller ID.
Updated: 2025-11-22GitHub
0
0
Low Cost
TheseHandsAreSpiders icon

remote-mcp-server-authless

by TheseHandsAreSpiders

Sec8

Deploys a remote Model Context Protocol (MCP) server without authentication on Cloudflare Workers, providing basic calculator tools for AI agents.

Setup Requirements

  • ⚠️Requires a Cloudflare Workers account for deployment.
  • ⚠️Requires Node.js and npm/yarn for local development and dependency management.
  • ⚠️The server is intentionally unauthenticated; consider this carefully if extending for non-demo use cases.
Verified SafeView Analysis
The server is explicitly designed to be 'authless' for demonstration and playground purposes, as indicated in its name and README. This means anyone with the URL can access and use the exposed arithmetic tools. While there are no obvious code vulnerabilities like 'eval' or hardcoded secrets in the provided source, deploying an unauthenticated server in a production environment or with sensitive tools would be a significant security risk.
Updated: 2025-12-12GitHub
0
0
High Cost

This server acts as a Model Context Protocol (MCP) server, allowing LLMs and other clients to query and retrieve information from the NIH RePORTER grants database.

Setup Requirements

  • ⚠️Requires Python 3.13+
  • ⚠️Relies on external NIH RePORTER API for data access
  • ⚠️Uses `uv` runner (e.g., `uv run`)
Verified SafeView Analysis
The code uses Pydantic for input validation and makes requests to a known NIH API. No 'eval' or hardcoded secrets were found in the provided snippets. The project explicitly states it's a 'proof of concept and is not intended for production use,' suggesting it may lack comprehensive security hardening for production environments, but the visible code itself does not present immediate critical vulnerabilities.
Updated: 2026-01-16GitHub
0
0
Medium Cost
ApreisP4x icon

perspectives

by ApreisP4x

Sec9

A basic implementation of persistent memory using a local knowledge graph, allowing an AI assistant to remember information across chats.

Setup Requirements

  • ⚠️Requires Node.js and npm/npx to run.
  • ⚠️Persistence of the knowledge graph requires proper volume or path configuration for 'memory.jsonl', as data stored in ephemeral environments will be lost on restart (e.g., Docker without volume mounts, 'npx' in a temporary directory).
  • ⚠️Performs a one-time migration from 'memory.json' to 'memory.jsonl' if a legacy file is detected.
Verified SafeView Analysis
The server operates locally via standard I/O and uses a local JSONL file for persistence. File operations are limited to the configured 'memory.jsonl' path. No 'eval', obfuscation, or direct network exposure. The primary security consideration is ensuring 'MEMORY_FILE_PATH' is configured by the user to a non-sensitive location, but this is a user configuration risk, not an inherent server vulnerability.
Updated: 2025-12-02GitHub
PreviousPage 511 of 713Next