Stop Searching. Start Trusting.

The curated directory of MCP servers, vetted for security, efficiency, and quality.

Tired of the MCP "Marketplace" Chaos?

We built MCPScout.ai to solve the ecosystems biggest pain points.

No Insecure Dumps

We manually analyze every server for basic security flaws.

Easy Setup

Our gotcha notes warn you about complex setups.

Avoid "Token Hogs"

We estimate token costs for cost-effective agents.

Products, Not Demos

We filter out "Hello World" demos.

CATEGORIES:
SORT:

Vetted Servers(9120)

38
1
Low Cost

A minimal Node.js server exposing a controlled sales dataset preview tool via the Model Context Protocol (MCP) for AI agent workflows.

Setup Requirements

  • ⚠️Requires Node.js and npm to be installed.
  • ⚠️The 'sales_sample.csv' file from the Python agent's directory must be accessible at the correct relative path for the server to function.
Verified SafeView Analysis
The server's function is limited to exposing a 'dataset_preview' tool which reads a local CSV and returns only its first 8 lines. No 'eval' or arbitrary code execution is apparent. Sensitive data (like OpenAI API keys) are managed by the separate Python agent, not the MCP server itself. Data exposure is explicitly limited and controlled.
Updated: 2025-11-27GitHub
38
4
Medium Cost
Sec9

Semantic search engine for public documents of Nordstemmen municipality, integrated with AI platforms via the Model Context Protocol (MCP).

Setup Requirements

  • ⚠️Requires Node.js 18+ and Python 3.11+ for different components.
  • ⚠️Requires external API keys for Jina AI (for query embeddings) and Qdrant (vector database).
  • ⚠️Requires Backblaze B2 credentials for PDF file hosting, necessitating an active B2 bucket and application key.
  • ⚠️Initial setup involves `git lfs pull` to download PDF documents and a potentially complex Python environment setup, including system-level Tesseract OCR for scanned PDFs.
Verified SafeView Analysis
Sensitive API keys (Jina AI, Qdrant, Backblaze B2) are correctly loaded from environment variables, preventing hardcoded secrets. Error responses are explicitly sanitized in production environments to avoid leaking internal details. All external API calls are to expected services (Jina AI, Qdrant, Backblaze B2) essential for the application's core functionality, which are assumed to be secure endpoints. No 'eval' or obfuscation is present in the provided code.
Updated: 2025-12-02GitHub
38
201
Medium Cost
Sec8

This server provides tools for interacting with Trello boards, enabling automation of project management, task management, and reporting workflows.

Setup Requirements

  • ⚠️Requires Trello API Key (Free, but needs setup)
  • ⚠️Requires Trello Token (Free, but needs generation)
  • ⚠️Bun runtime recommended for optimal performance (Node.js fallback for npx/npm)
Verified SafeView Analysis
The server uses environment variables for sensitive API keys and tokens, avoiding hardcoded secrets. Input validation is handled via Zod schemas before API calls, mitigating common injection risks. File attachment logic includes checks for local file paths, which is a sensitive area, but the implementation aims to limit risks. There is no direct use of 'eval' or other easily exploitable patterns observed.
Updated: 2025-12-18GitHub
38
23
Low Cost

Provides static code analysis feedback (most critical design issue) to AI agents for Java code refactoring via the Model Context Protocol (MCP).

Setup Requirements

  • ⚠️Requires Node.js 18+ and Npm for server execution.
  • ⚠️Requires Python and Pip for the Aibolit static analyzer.
  • ⚠️Requires the `aibolit` Python package (version 1.3.0 or newer) to be installed and accessible in the system PATH.
Review RequiredView Analysis
The server uses `execSync` to run `aibolit` (a Python tool). The `path` variable, which is a user-provided argument from the AI agent, is directly interpolated into the shell command string (e.g., `python3 -m aibolit check --full --filenames ${path}`). This creates a command injection vulnerability, allowing an attacker to execute arbitrary shell commands by crafting a malicious file path.
Updated: 2026-01-07GitHub
38
1
High Cost
Helms-AI icon

rpg

by Helms-AI

Sec3

A markdown-driven multi-language code generation tool that translates natural language specifications into idiomatic code across multiple programming languages, exposed as an MCP server for AI agents.

Setup Requirements

  • ⚠️Requires Go 1.21+ to build and run.
  • ⚠️Requires an MCP-compatible AI client (e.g., Claude Code, Cursor, VS Code Continue) for interaction.
  • ⚠️Requires Git installed for `import_spec_from_github` functionality.
  • ⚠️Requires specific language toolchains (e.g., Java JDK, Rust toolchain, Python interpreter, .NET SDK, TypeScript compiler) installed for deep analysis (`deep_analyze_source`) and generation in those respective languages.
  • ⚠️GitHub Personal Access Token (PAT) required via `GITHUB_TOKEN` environment variable or tool parameter for private repository imports.
Review RequiredView Analysis
The server includes tools like `import_spec_from_github` and `import_spec_from_source` which clone or analyze external source code. The `internal/importer/semantic/subprocess_analyzer.go` explicitly shows execution of external language toolchains (e.g., `javac`, `dotnet`, `python`, `rustc`, `tsc`) on this potentially untrusted code. This poses a significant Remote Code Execution (RCE) risk if malicious code is introduced via an imported repository or local source, especially if build scripts are also processed without strict sandboxing. No obvious hardcoded secrets or 'eval' of untrusted strings are found in the truncated Go source, but the direct execution of external compilers/interpreters on arbitrary project files is a critical vulnerability.
Updated: 2026-01-19GitHub
38
12
Low Cost

This server acts as a template for building Model Context Protocol (MCP) servers in Python, specifically demonstrating how to expose weather-related tools (get_alerts, get_forecast) by integrating with an external API (National Weather Service) to provide context and actions for AI models.

Setup Requirements

  • ⚠️Requires Python 3.12 or higher.
  • ⚠️Dependencies (httpx, mcp, starlette, uvicorn) must be installed; 'uv' is recommended for dependency management.
  • ⚠️External API calls to 'api.weather.gov' are subject to external service availability, rate limits, and network connectivity issues.
  • ⚠️To integrate with Claude Desktop, specific configuration in 'claude_desktop_config.json' is needed, including absolute paths to the server script.
Verified SafeView Analysis
The server interacts with an external API (api.weather.gov). While 'httpx' is generally safe for making HTTP calls, any external interaction always carries inherent risks (e.g., API compromise, data integrity). The input parameters for tools (state, latitude, longitude) are expected to be validated by the FastMCP framework's type hinting, mitigating basic injection risks. There are no 'eval' or direct 'subprocess.run' calls without sanitization. No hardcoded sensitive API keys are present for this specific weather API (which is public). The use of 'request._send' in 'create_starlette_app' is a private API access in Starlette, which is not a security vulnerability but can lead to fragility.
Updated: 2025-12-15GitHub
38
1
Low Cost
GitHub30 icon

whois-mcp-server

by GitHub30

Sec9

Provides WHOIS lookup capabilities for IP addresses and domain names via a Model Context Protocol (MCP) server.

Verified SafeView Analysis
The code directly wraps standard Python WHOIS libraries (ipwhois, whoisit). There are no 'eval' or similar dangerous functions. No hardcoded secrets are visible. The inherent nature of a WHOIS server involves making external network requests, which these libraries handle. The risk is primarily tied to the security of the underlying WHOIS libraries and the data they retrieve, rather than malicious code within this server itself.
Updated: 2025-11-28GitHub
38
9
Medium Cost
Sec9

Enables AI models to interact with Cisco RADKit-managed network devices via MCP tools for inventory, command execution, and SNMP operations.

Setup Requirements

  • ⚠️Requires Python 3.10+.
  • ⚠️Requires an active Cisco RADKit service and at least one onboarded user with appropriate privileges.
  • ⚠️Requires pre-configuration of RADKit credentials either as local certificate files or base64-encoded environment variables (assisted by provided onboarding scripts).
Verified SafeView Analysis
The server handles sensitive credentials (certificates, private keys, passwords) via environment variables or local files, with explicit cleanup of temporary files. Command execution is passed to the RADKit service, which is expected to handle RBAC. There are no obvious 'eval' or malicious code patterns. The default binding to '0.0.0.0' for network transports (SSE/HTTPS) is common but requires careful firewall configuration in production environments.
Updated: 2026-01-12GitHub
38
2
Medium Cost
scalalang2 icon

upbit-mcp-server

by scalalang2

Sec9

This server acts as an API gateway for the Upbit cryptocurrency exchange, allowing users to manage accounts, fetch market data, and perform technical analysis.

Setup Requirements

  • ⚠️Requires Upbit API Access Key and Secret Key.
  • ⚠️Requires Go runtime environment to build and run the executable.
Verified SafeView Analysis
The server reads Upbit API keys from environment variables (UPBIT_ACCESS_KEY, UPBIT_SECRET_KEY), which is a good security practice. JWT tokens are generated using standard HMAC SHA256 and SHA512 hashing for API authentication. There are no apparent uses of `eval`, obfuscation, or direct command injection vulnerabilities in the provided source code. Network requests are handled through a standard HTTP client. Overall, the implementation appears robust, with safety relying heavily on the user's secure handling of their API keys.
Updated: 2025-12-13GitHub
38
10
Medium Cost
Sec9

A production-ready Cloud Run service that executes Claude Code tasks in isolated jobs, enabling AI-driven code analysis, development, and automation with secure credential handling and post-execution actions.

Setup Requirements

  • ⚠️Requires a Google Cloud Project with billing enabled and the `gcloud` CLI installed/configured.
  • ⚠️Demands extensive Google Cloud resource setup including a GCS bucket, Cloud KMS Key Ring and Key, and a Cloud Run Job. This involves specific IAM role grants for both the API service and the job worker.
  • ⚠️Requires obtaining an Anthropic API Key or OAuth Token, which must be passed in each request's JSON payload (not as environment variables for the service itself).
Verified SafeView Analysis
The server exhibits strong security practices by offloading all task execution to isolated Cloud Run Jobs. It employs Google Cloud KMS for envelope encryption of sensitive task payloads (API keys, SSH keys, environment variables) at rest in GCS. A local proxy intercepts Claude API calls, injecting real credentials only at the outbound request, preventing the Claude CLI subprocess from direct access to sensitive tokens. Ephemeral workspaces with strict file permissions are created per request and automatically cleaned up. Webhook callbacks are secured with HMAC-SHA256 signatures. The use of `execSync` for `preExecutionCommands` is a powerful primitive, but it operates within the Cloud Run Job's sandbox, and the server itself does not use `eval` or similar patterns directly on user input. The overall design prioritizes credential isolation and secure execution.
Updated: 2026-01-19GitHub
38
13
Medium Cost
SNYCFIRE-CORE icon

letta-mcp-server

by SNYCFIRE-CORE

Sec9

Universal MCP server to bridge any AI client (e.g., Claude, GitHub Copilot, Cursor) with Letta.ai's powerful stateful agents, enabling seamless interaction and tool orchestration.

Setup Requirements

  • ⚠️Requires a Letta API Key (typically associated with a paid service) for interaction with Letta Cloud.
  • ⚠️Requires Python 3.10 or newer.
  • ⚠️Full integration and performance testing often requires network connectivity to api.letta.com and access to a pre-configured AXLE agent.
Verified SafeView Analysis
API keys are handled securely via environment variables or explicitly fetched from them when loaded from YAML, preventing hardcoding. Input validation (e.g., for agent IDs) and error formatting are in place to prevent common vulnerabilities and avoid leaking sensitive internal details. The project uses `httpx` with retry logic for robust and secure API communication. No `eval` or obvious obfuscation patterns were found, and a `SECURITY.md` outlines reporting procedures and best practices.
Updated: 2026-01-19GitHub
38
12
Low Cost

laravel-mcp

by jsonallen

Sec7

Provides a collection of Laravel helper tools for integration with Cursor IDE, enhancing development workflow and debugging capabilities.

Setup Requirements

  • ⚠️Requires PHP 8.1+ and Laravel 10.0+
  • ⚠️Specific dependency on Cursor IDE
  • ⚠️Requires UV for Python package management
Verified SafeView Analysis
The `run_artisan_command` tool allows execution of arbitrary Laravel Artisan commands, which, if not carefully used or if the underlying `server.py` implementation lacks robust input validation and sandboxing, could pose a risk. However, it's designed for a local developer environment. The project is officially deprecated, meaning no further security updates or maintenance are expected.
Updated: 2025-11-17GitHub
PreviousPage 113 of 760Next