Stop Searching. Start Trusting.

The curated directory of MCP servers, vetted for security, efficiency, and quality.

Tired of the MCP "Marketplace" Chaos?

We built MCPScout.ai to solve the ecosystems biggest pain points.

No Insecure Dumps

We manually analyze every server for basic security flaws.

Easy Setup

Our gotcha notes warn you about complex setups.

Avoid "Token Hogs"

We estimate token costs for cost-effective agents.

Products, Not Demos

We filter out "Hello World" demos.

CATEGORIES:
SORT:

Vetted Servers(8554)

0
0
Low Cost
linogarciavallejo icon

octopus-mcp-poc

by linogarciavallejo

Sec9

A proof-of-concept server designed to receive and log webhooks from GitHub and GitLab repositories.

Setup Requirements

  • ⚠️Requires Node.js and npm/yarn to install dependencies and run.
  • ⚠️Requires environment variables (PORT, WEBHOOK_SECRET, GITLAB_WEBHOOK_SECRET, APP_ID) to be set, typically via a .env file.
  • ⚠️For webhooks to reach it, the server must be publicly accessible or run behind a tunneling service (e.g., ngrok).
Verified SafeView Analysis
The server uses established webhook middleware libraries (`@octokit/webhooks` and `gitlab-webhook-middleware`) which are designed to verify webhook signatures using provided secrets, mitigating common spoofing risks. The current code primarily logs payloads and does not contain `eval`, obfuscation, or direct use of user-controlled input in shell commands. Hardcoded secrets are avoided through the use of `dotenv`. The main security consideration would be if further, unprovided logic were to act upon the logged webhook payloads in an insecure manner.
Updated: 2025-11-19GitHub
0
0
Medium Cost
BridgerB icon

metabase-mcp

by BridgerB

Sec8

Provides an MCP server to interact with Metabase instances, enabling programmatic access to databases, tables, saved questions (cards), dashboards, and collections, as well as raw API calls.

Setup Requirements

  • ⚠️Requires Deno runtime to execute.
  • ⚠️Requires a running Metabase instance reachable by the server.
  • ⚠️Requires either METABASE_API_KEY or (METABASE_USERNAME and METABASE_PASSWORD) environment variables for Metabase authentication, as used by `src/client.ts` (note: README uses METABASE_BASE_URL, but client.ts expects METABASE_URL).
Verified SafeView Analysis
The server correctly retrieves Metabase API credentials (API key or username/password) from environment variables, avoiding hardcoded secrets. It implements a session token management with expiration and retry. The 'api' tool allows arbitrary Metabase API calls, which is powerful but also broadens the potential attack surface if the agent using it is compromised; however, this is a feature, not a vulnerability in the server's implementation. No direct use of 'eval' or other highly dangerous functions are observed in the provided source code, with queries being executed against the Metabase API rather than locally.
Updated: 2025-12-03GitHub
0
0
Medium Cost
cardmagic icon

slack-messages

by cardmagic

Sec9

Fuzzy search and browse Slack messages and threads from the command line or as an MCP server.

Setup Requirements

  • ⚠️Requires Node.js 22+
  • ⚠️Requires a Slack User OAuth Token (xoxp-) with multiple specific scopes (`channels:history`, `groups:history`, `im:history`, `mpim:history`, `users:read`, `channels:read`, `groups:read`, `im:read`, `mpim:read`). Creating this token involves creating a Slack app and manually adding scopes.
  • ⚠️Initial indexing (`slack-messages index`) can take a long time for large Slack workspaces due to Slack API rate limits and the volume of messages.
Verified SafeView Analysis
The server stores Slack user OAuth tokens locally in `~/.slack-messages/config.json`. This is necessary for its functionality, and the README explicitly warns users not to share or commit these tokens. Sensitive input (Slack token) is handled securely via a password prompt. Database operations use parameterized queries, mitigating SQL injection risks. Slack API calls are rate-limited and use the official SDK, which handles retries. No 'eval', obfuscation, hardcoded secrets, or overtly malicious patterns were found in the provided source code.
Updated: 2026-01-18GitHub
0
0
Medium Cost
lascam-UFU icon

swechain-mcp-server

by lascam-UFU

Sec8

Orchestrates interactions with a SweChain blockchain, providing a Model Context Protocol (MCP) interface to manage auctions, bids, balances, and query blockchain status for programmatic access.

Setup Requirements

  • ⚠️Requires a running SweChain node (from `lascam-UFU/swechain` repository)
  • ⚠️Requires the `swechaind` binary to be installed and available in the system's PATH
  • ⚠️Uses `--keyring-backend test` for all `swechaind` interactions, implying a test/development keyring setup.
Verified SafeView Analysis
The server primarily operates by executing the `swechaind` command-line utility with arguments derived from user input. While `exec.CommandContext` is used (which mitigates direct shell injection by passing arguments separately), the security critically depends on `swechaind`'s robust handling of its arguments. Input validation (e.g., `isValidCosmosAddress`, numeric checks) is present, reducing common risks. The `--keyring-backend test` flag suggests a development/testing environment, which is less secure for production. No 'eval' or direct malicious patterns were found. Overall, the code appears safe assuming the underlying `swechaind` binary handles its parameters securely.
Updated: 2025-11-24GitHub
0
0
Medium Cost
luisfelipesena icon

webots-youbot-mcp

by luisfelipesena

Sec7

Provides a Model Context Protocol (MCP) bridge to allow AI agents like Claude Code and Cursor to monitor and control Webots robot simulations in real-time.

Setup Requirements

  • ⚠️Requires Python 3.10+.
  • ⚠️Requires 'mcp', 'pydantic', and optionally 'Pillow' Python packages.
  • ⚠️On macOS, force reload/reset functionality requires granting accessibility permissions to the terminal/IDE running the server for 'osascript' to control Webots.
  • ⚠️Requires a running Webots simulation with the 'mcp_bridge.py' integrated into the robot controller.
Verified SafeView Analysis
The server uses file-based inter-process communication (via status.json and commands.json) within a designated 'data' directory. This mechanism, while central to MCP, means local file system access could be a vector for malicious commands if compromised. A notable concern is the use of 'subprocess.run' to execute 'osascript' commands on macOS for 'force reload' and 'force reset' functionalities. This grants the script the ability to send keyboard shortcuts directly to the Webots application, requiring the user to grant accessibility permissions to the terminal or IDE running the server. No 'eval' or direct network listeners are present, and no hardcoded secrets were found.
Updated: 2025-12-25GitHub
0
0
Medium Cost
dawkareshubham icon

mcp-server-study

by dawkareshubham

Sec3

A collection of Model Context Protocol (MCP) projects demonstrating various server implementations and client interactions, including tools, resources, prompts, multi-server connections, and OpenAI integration.

Setup Requirements

  • ⚠️Requires `uv` for dependency management and running projects.
  • ⚠️Requires Python 3.11+ (some projects specify 3.10+, but 3.11+ is common).
  • ⚠️OpenAI API Key is required for projects integrating with LLMs (e.g., mcp-client, mcp-build-memory-tracker, mcp-build-client-agent-airbnb-memory).
Review RequiredView Analysis
The project includes a client that executes an external `npx` command (`@openbnb/mcp-server-airbnb`), which downloads and runs remote code. This is a critical security risk as it can introduce arbitrary, untrusted code into the execution environment. Additionally, one server (`mcp-server-deepdive-functionality/screenshot.py`) uses `pyautogui` to capture screenshots, posing a significant privacy risk if the server is compromised or misused. While `OPENAI_API_KEY` is handled via `.env` files (good practice), the inherent risks from `npx` and `pyautogui` are substantial.
Updated: 2025-11-24GitHub
0
0
Medium Cost
Sec8

Provides read-only access to MetaTrader 5 market data, technical analysis, and forecasting capabilities via Model Context Protocol.

Setup Requirements

  • ⚠️Requires Windows OS as the MetaTrader5 library is Windows-only.
  • ⚠️MetaTrader 5 terminal must be installed and running on the same machine.
  • ⚠️Python 3.10+ is required.
  • ⚠️Algorithmic trading must be enabled within the MetaTrader 5 terminal (Tools → Options → Expert Advisors).
Verified SafeView Analysis
The `execute_mt5` tool allows arbitrary Python code execution. However, the server implements robust guardrails: a restricted namespace whitelisting only read-only MT5 functions and data science libraries, explicit blocking of dangerous functions (`mt5.initialize()`, `os.system`, `eval`, `exec`, `subprocess`), command length limits, and IP-based rate limiting for HTTP. While not entirely risk-free due to code execution, these mitigations significantly enhance safety within its intended operational scope.
Updated: 2025-12-03GitHub
0
0
Low Cost

This server acts as a remote intermediary for trend analysis, receiving analysis requests via WebSocket, forwarding them to another backend service, and relaying results back to clients, while also providing an API for data reporting.

Setup Requirements

  • ⚠️Requires a separate 'remote server' running at the `REMOTE_SERVER_URL` to perform the actual trend analysis, as this server acts primarily as a proxy/orchestrator.
  • ⚠️The data-store uses an in-memory array for simplicity, meaning all reported data is lost on server restart, making it unsuitable for persistent data storage without modifications.
  • ⚠️Lacks any authentication or authorization, making it vulnerable to unauthorized access and misuse if deployed in a production environment.
Review RequiredView Analysis
The server uses a wildcard CORS origin (`*`) for Socket.IO, which is a significant security risk for production environments. It directly forwards data received via WebSocket (`requestTrendAnalysis` event) to an upstream `REMOTE_SERVER_URL` without clear input validation, potentially exposing it to Server-Side Request Forgery (SSRF) or other injection attacks if the upstream service is vulnerable or the data contains malicious payloads. Critically, there are no visible authentication or authorization mechanisms for either the WebSocket connections or the `/api/report-data` endpoint, meaning any client can connect, request analysis, and report data, making it an open relay.
Updated: 2026-01-17GitHub
0
0
Medium Cost
suryansh639 icon

mcp-aws-devops-server

by suryansh639

Sec8

Enables AI agents to safely execute DevOps and CloudOps operations across AWS, Azure, GCP, and Kubernetes environments using a zero-trust security model.

Setup Requirements

  • ⚠️Requires AWS CLI configured for AWS operations.
  • ⚠️Requires Docker installed for containerized deployments.
  • ⚠️Requires Terraform and/or kubectl configured for IaC deployments.
  • ⚠️Requires Python 3.11+.
  • ⚠️Azure operations require `AZURE_SUBSCRIPTION_ID` environment variable.
  • ⚠️GCP operations require `GOOGLE_APPLICATION_CREDENTIALS` path to service account key.
Verified SafeView Analysis
The platform is designed with a strong zero-trust security model, utilizing IAM roles/Managed Identities instead of stored credentials, API key/JWT authentication, and comprehensive audit logging. Resource tagging is enforced to limit operations, and least-privilege IAM policies are provided. The default `MCP_SECRET_KEY` value of 'change-me-in-production' is a minor risk if not overridden, but deployment scripts facilitate proper secrets management. Kubernetes configurations include RBAC and IRSA. Overall, security is a high priority in its design.
Updated: 2025-12-03GitHub
0
0
Medium Cost
Sec9

Allows AI assistants to query and manage configurations in a Nacos server.

Setup Requirements

  • ⚠️Requires a running and accessible Nacos server instance.
  • ⚠️Nacos server authentication (username/password) must be provided via environment variables if enabled.
  • ⚠️The NACOS_VERSION environment variable is crucial for selecting the correct Nacos API client (1, 2, or 3) and port configuration.
  • ⚠️Requires Python 3.10 or newer.
Verified SafeView Analysis
The server reads sensitive Nacos connection details (host, ports, username, password) from environment variables, which is good practice. It uses `httpx` for network communication with the Nacos API. No 'eval' or other highly dangerous patterns were found. The primary security considerations involve ensuring the environment variables are securely managed and that the Nacos server it connects to is trusted.
Updated: 2026-01-18GitHub
0
0
Medium Cost

An AI-powered monitoring system for the Canadian Arctic Ocean, designed for defense, environmental protection, and scientific research.

Setup Requirements

  • ⚠️Requires Google Cloud API access for Gemini 2.5 Flash (incurs costs).
  • ⚠️Requires a LangSmith account for experiment tracking and traceability (paid service).
  • ⚠️Involves setup and secure management of RS256 asymmetric encryption keys.
  • ⚠️Lists 'MCP Server' as a prerequisite, which is ambiguous and could be a significant, unclarified dependency.
Verified SafeView Analysis
The project claims strong security features, including RS256 end-to-end encryption, role-based access control, and 100% audit-trace coverage with tamper-proof logging. The presence of a SECURITY.md file indicates security awareness. However, without access to the actual source code, it's impossible to verify the implementation quality of these claims or audit for common vulnerabilities such as hardcoded secrets or insecure configurations. The dependency on an unspecified 'MCP Server' also introduces an unknown security factor. The score reflects the strong stated intent for security, but acknowledges the lack of verifiable implementation details.
Updated: 2026-01-19GitHub
0
0
Low Cost
Xxx00xxX33 icon

tushare_etf_mcp

by Xxx00xxX33

Sec9

Provides a Model-Context-Protocol (MCP) server for retrieving and analyzing Exchange-Traded Fund (ETF) data from the Chinese A-share market via the TuShare API.

Setup Requirements

  • ⚠️Requires a TuShare API Token (free registration is available, but usage limits apply).
  • ⚠️Python 3.9+ is required for local development.
  • ⚠️Docker and Docker Compose are recommended for easy deployment and setup.
Verified SafeView Analysis
The server uses FastAPI for its web interface and handles external API tokens via environment variables, a good security practice. Input parameters are used to query the TuShare API, which is expected to handle its own input validation; there are no obvious direct command or SQL injection vulnerabilities. Async operations are properly managed using `asyncio.to_thread` to prevent blocking. No 'eval' or other highly dangerous patterns are detected.
Updated: 2025-12-15GitHub
PreviousPage 593 of 713Next