Stop Searching. Start Trusting.

The curated directory of MCP servers, vetted for security, efficiency, and quality.

Tired of the MCP "Marketplace" Chaos?

We built MCPScout.ai to solve the ecosystems biggest pain points.

No Insecure Dumps

We manually analyze every server for basic security flaws.

Easy Setup

Our gotcha notes warn you about complex setups.

Avoid "Token Hogs"

We estimate token costs for cost-effective agents.

Products, Not Demos

We filter out "Hello World" demos.

CATEGORIES:
SORT:

Vetted Servers(9120)

51
141
Low Cost
weibaohui icon

kom

by weibaohui

Sec4

Manages Kubernetes clusters and resources through an SDK-level wrapper and an MCP (Multi-Cluster Platform) server, offering features like CRUD, file operations, log fetching, and SQL-like querying.

Setup Requirements

  • ⚠️Requires a Kubernetes cluster for operation (either in-cluster or via kubeconfig).
  • ⚠️Requires `aws cli` installed and configured on the host machine for managing AWS EKS clusters.
  • ⚠️Requires secure management of Kubernetes and AWS credentials (e.g., environment variables, secret management systems), as examples show direct string assignment which is insecure for production.
  • ⚠️Authentication and authorization logic for the MCP server must be implemented externally or via provided hooks, as the default `authKey` mechanism is basic and not a complete security solution.
Review RequiredView Analysis
The project allows powerful Kubernetes operations, including creating privileged pods (`CreateNodeShell`, `CreateKubectlShell` functions in `kom/ctl_node.go`) with `privileged: true`, `hostNetwork: true`, `hostPID: true`, and broad tolerations. This constitutes a significant privilege escalation vector if access to the MCP server is not rigorously controlled. The basic HTTP header-based `authKey` mechanism in `main.go` is illustrative and implies that robust external authentication and authorization are required, but not built-in. Kubeconfig handling (loading from paths, strings, or generated from AWS credentials) is a critical component that can be exploited if sources are untrusted. AWS credentials, if hardcoded in examples and used verbatim by users, pose a severe risk. File operations within pods and SQL-like querying of Kubernetes resources introduce additional attack surfaces that need careful validation and authorization checks to prevent unintended data exposure or manipulation.
Updated: 2026-01-18GitHub
51
3
Low Cost
Sec8

A backend server component for processing and serving Markmap visualizations, likely converting Markdown content into interactive mind maps.

Setup Requirements

  • ⚠️Requires Docker for containerized deployment, or Node.js (v18+) and npm/yarn for local development.
  • ⚠️Specific Markmap processing and serving routes or configuration may be required based on the intended use case.
Verified SafeView Analysis
No obvious 'eval' or obfuscation. Project structure (TypeScript, eslint, tests) suggests modern development practices. Standard server risks (e.g., exposed ports, dependency vulnerabilities) apply, which can be mitigated by containerization via Docker.
Updated: 2025-11-18GitHub
51
52
Low Cost
Sec8

Provides AI assistants with semantic understanding of AL (Application Language) codebases and Business Central object relationships by parsing compiled AL symbol files.

Setup Requirements

  • ⚠️Requires .NET SDK 8.0+ for AL CLI (auto-installed, but manual intervention might be needed on some systems for PATH configuration or NuGet sources).
  • ⚠️Relies on compiled AL packages (.app files) being present in `.alpackages` directories or specified paths.
  • ⚠️Initial package loading (especially for large codebases like the Base Application) can take several seconds.
Verified SafeView Analysis
The server uses `child_process.spawn` to interact with external `AL` and `dotnet` CLI tools, which introduces a dependency on their security. File system operations for package discovery and symbol extraction include safeguards such as limiting recursion depth, blacklisting common system directories (e.g., node_modules, .git), and enforcing absolute paths for `rootPath` to mitigate arbitrary path traversal. Package content (i.e., `.app` files) is processed by extracting `SymbolReference.json` via ZIP or AL CLI; while the server's code itself appears free of obvious malicious patterns like `eval`, a vulnerability could exist if a crafted `.app` file exploits the underlying AL compiler or ZIP extraction process. Users should ensure they are processing trusted AL packages.
Updated: 2025-12-11GitHub
51
204
Medium Cost
iknowjason icon

AutomatedEmulation

by iknowjason

Sec6

Provisions an automated Breach and Attack Simulation (BAS) lab in AWS, integrating Caldera with an LLM-enabled MCP server, VECTR, and a Windows client with Red/Blue tools.

Setup Requirements

  • ⚠️Requires AWS IAM programmatic access keys with permissions to build AWS resources.
  • ⚠️Requires Terraform 1.5.7 (or compatible version) to be installed locally.
  • ⚠️If your public IP address changes or if `ifconfig.me` returns an IPv6 address, terraform apply must be re-run or manual firewall adjustments are needed.
Verified SafeView Analysis
The project deploys a complex security lab with default administrative credentials (for Caldera and VECTR) that should be immediately changed. The MLflow server for LLM tracing is explicitly stated to be publicly exposed by default, requiring careful configuration of EC2 security groups by the user. While the firewall rules initially whitelist the user's public IP, the option to open to 0.0.0.0/0 exists, posing a significant risk if misused. The core purpose is security emulation, which involves deploying agents and services, but diligent user management of credentials and network access is critical for a secure setup.
Updated: 2025-11-23GitHub
50
7
Medium Cost
chriskd icon

memex

by chriskd

Sec8

Personal knowledge base with hybrid search (keyword + semantic) and LLM-driven memory evolution, designed for agent workflows.

Setup Requirements

  • ⚠️Requires Python 3.11+
  • ⚠️LLM API Keys (Anthropic or OpenRouter) are required for semantic features (paid services)
  • ⚠️Semantic search requires additional dependencies ('chromadb', 'sentence-transformers') which involve a large download for the embedding model on first use.
  • ⚠️File watcher may use polling in Docker environments, potentially impacting performance.
Verified SafeView Analysis
The project uses environment variables for LLM API keys, which is a good practice. It performs extensive file system operations (read, write, delete, rmtree) which are inherent to a KB system, but should be handled carefully, especially with user-provided paths (validation is in place). Subprocess calls are primarily for git commands or generating configuration, posing low risk. External CDN links for static assets are present in the published site templates, a common web practice with inherent supply chain risk. No direct `eval()` or code obfuscation was detected.
Updated: 2026-01-19GitHub
50
95
Medium Cost
Sec2

The `awesome-oceanbase-mcp` project provides a collection of Model Context Protocol (MCP) servers designed to enable AI assistants to interact directly with OceanBase databases and its ecosystem components.

Setup Requirements

  • ⚠️Requires pre-existing OceanBase database instances and/or access to OceanBase Cloud Platform (OCP/OBCloud) with appropriate accounts.
  • ⚠️Requires specific CLI tools (`okctl`, `obshell`, `obdiag`, `kubectl`) installed and configured on the server machine.
  • ⚠️Requires careful configuration of numerous environment variables for database credentials and connection details across different server components (e.g., OB_HOST, OB_USER, OCP_ACCESS_KEY_ID, SYS_PASSWORD).
Review RequiredView Analysis
The `awesome-oceanbase-mcp` project contains multiple MCP servers, several of which exhibit critical security vulnerabilities: 1. **SQL Injection**: `okctl_mcp_server` (in `sql.py`), `obcloud_mcp_server` (in `functions/index.ts`), `seekdb_mcp_server` (in `server.py`, especially `_embed_mode_execute_sql`, `_server_model_execute_sql`, `full_text_search`, AI model functions, and CSV import), and `oceanbase_mcp_server` (in `server.py`, including `execute_sql`, ASH report, tenant/server queries, and specialized search tools like `oceanbase_text_search`, `oceanbase_vector_search`, `oceanbase_hybrid_search`) directly concatenate or format user-controlled input into SQL queries without proper parameterization, making them highly susceptible to SQL injection. 2. **Command Injection**: `obdiag_mcp_server` (in `server.py`, specifically `obdiag_display_run` and `obdiag_gather_log`) and `okctl_mcp_server` (in `install.py` for `bash -c download_output` and generally for other `okctl` commands if `validate_identifier` isn't fully comprehensive) construct shell commands using f-strings or direct string concatenation with user-provided arguments, posing a risk of arbitrary command execution. 3. **Arbitrary Method Execution (Code Execution)**: `obshell_mcp_server` (in `server.py`, specifically `call_obshell_sdk`) uses `getattr(client.v1, sdk_method)(**processed_args)`, allowing an attacker to call virtually any method available on the `obshell` client with arbitrary arguments. This is a critical remote code execution vector. 4. **Supply Chain Risk**: `okctl_mcp_server`'s `install_okctl` downloads and executes a shell script from a remote GitHub repository. A compromise of this remote script would lead to arbitrary code execution on the server running the MCP. 5. **Lack of Comprehensive Input Validation**: While some modules attempt basic identifier validation (e.g., `okctl_mcp_server/utils/security.py`), it is not consistently applied to all user-controlled inputs that are eventually passed to shell commands or SQL queries, exacerbating the injection risks. Secrets are generally managed through environment variables, which is a good practice. However, the severe injection and execution vulnerabilities make these servers unsafe for production environments without significant security hardening.
Updated: 2026-01-13GitHub
50
74
High Cost
dnnyngyen icon

ironmanus-mcp

by dnnyngyen

Sec9

Orchestrates AI workflows with an 8-phase control flow and specialized tools, serving as a Model Context Protocol (MCP) server.

Setup Requirements

  • ⚠️Requires Claude (or a compatible MCP client) to function as intended.
  • ⚠️Relies heavily on external APIs; `ALLOWED_HOSTS` and specific API keys/authentication headers may need configuration.
  • ⚠️Node.js 20+ and TypeScript 5.0 are required for local development and execution.
Verified SafeView Analysis
The project demonstrates strong, explicit, and multi-layered security measures. SSRF protection (`ssrfGuard`, `validateAndSanitizeURL`) is consistently applied to network requests and session IDs. Python execution is sandboxed (`validatePythonCode` blocks dangerous functions) and `pip install` uses an allowlist (`ALLOWED_LIBRARIES`). Path traversal is prevented for file system operations via `isValidSessionId`. An active runtime protection system (`startLegacyFileProtection`) removes legacy JSON files. Configuration validation (`validateConfig`) checks critical security settings in production. No obvious hardcoded secrets were found. The primary remaining risk is the inherent trust boundary of `subprocess.check_call` for `pip install` even with an allowlist, as a malicious package could potentially bypass checks if it made it into a mirror.
Updated: 2026-01-19GitHub
50
44
Medium Cost
veelenga icon

claude-mermaid

by veelenga

Sec9

Provides an MCP server for rendering Mermaid diagrams in Claude Code with live reload, multiple save formats, and interactive previews.

Setup Requirements

  • ⚠️Requires Node.js and npm to be installed.
  • ⚠️The `@mermaid-js/mermaid-cli` dependency relies on Puppeteer, which may download a large Chromium binary during installation, consuming significant disk space and bandwidth.
  • ⚠️Requires a compatible MCP client (e.g., Claude Code, Codex, Cursor, VSCode Cline, Windsurf, Gemini CLI) for integration.
Verified SafeView Analysis
The server implements strong security practices including Content Security Policy (CSP) headers for web previews and robust path validation (`validateSavePath`, `validatePreviewId`) to prevent path traversal attacks when saving or accessing diagrams. `execFile` is used for rendering diagrams via `mermaid-cli`, which is generally safer than `exec`. Input parameters for `mermaid-cli` are sanitized or enum-restricted, mitigating command injection risks. No hardcoded secrets or obvious malicious patterns were found. The primary attack surface is through the `mermaid-cli` itself and the interpretation of diagram code, which is an inherent risk when rendering user-provided code, but not directly attributable to server vulnerabilities.
Updated: 2026-01-19GitHub
50
89
High Cost
narumiruna icon

yfinance-mcp

by narumiruna

Sec9

Fetches real-time and historical stock data, news, and financial charts from Yahoo Finance.

Setup Requirements

  • ⚠️Requires Python 3.12+
  • ⚠️Chart generation (image output) can lead to high token usage due to base64 encoding
  • ⚠️Relies on the `uv` package installer for easy setup and execution
Verified SafeView Analysis
The server code generally follows good practices, wrapping blocking I/O (yfinance calls) with `asyncio.to_thread` and using structured error responses. There are no obvious hardcoded credentials, direct shell injections, or `eval` usage. The primary security consideration would be the underlying `yfinance` library's interaction with the Yahoo Finance API, which is outside the scope of this server's direct code.
Updated: 2026-01-11GitHub
50
25
Medium Cost
sagemcp icon

SageMCP

by sagemcp

Sec7

A scalable platform for hosting MCP servers with multi-tenant support, OAuth integration, and connector plugins for various services, deployed on Kubernetes.

Setup Requirements

  • ⚠️Requires Kubernetes 1.21+ and Helm 3.8+ for deployment.
  • ⚠️Requires Persistent Volume (PV) provisioner support in the underlying infrastructure for PostgreSQL and Redis persistence.
  • ⚠️Requires OAuth client IDs and secrets (e.g., GITHUB_CLIENT_ID, GITHUB_CLIENT_SECRET) to be configured as environment variables for specific connectors to function.
Verified SafeView Analysis
The platform dynamically builds Docker images and installs packages (NPM, PyPI) from remote sources (GitHub, NPM registry) for external MCP servers. This introduces a supply chain risk if a malicious MCP server is registered and installed. Commands for external MCP servers are executed via `subprocess_exec`. While runtime commands are likely admin-controlled, the integrity of external code sources is critical. The `SECRET_KEY` is auto-generated if not provided, ensuring it's always set. OAuth redirect URIs are handled with checks for localhost or `X-Forwarded-Host` headers. CORS `allow_origins` is set to `*` in development but should be restricted in production.
Updated: 2025-12-01GitHub
50
6
Medium Cost
S-FM icon

faim-mcp

by S-FM

Sec9

Integrates FAIM time series forecasting SDK with any Model Context Protocol (MCP)-compatible AI assistant, enabling AI-powered forecasting capabilities for models like Chronos2 and TiRex.

Setup Requirements

  • ⚠️Requires a FAIM API Key, which needs to be registered at https://faim.it.com/ (potentially a paid service).
  • ⚠️Requires Node.js 20+ and npm 10+ to run locally or for `npx` usage.
  • ⚠️Dependent on the availability and performance of the external FAIM API.
Verified SafeView Analysis
The server correctly retrieves the FAIM API key from environment variables, preventing hardcoding. It uses JSON.parse which is generally safe for deserializing JSON strings. There are no direct uses of `eval` or obvious code obfuscation. Network communication is with the FAIM API, which implies reliance on the security of that external service. All errors are handled gracefully and transformed, preventing internal details from leaking.
Updated: 2025-11-28GitHub
50
96
Medium Cost
webflow icon

mcp-server

by webflow

Sec6

A Node.js server implementing Model Context Protocol (MCP) for Webflow, enabling AI agents to interact with Webflow Data and Designer APIs.

Setup Requirements

  • ⚠️Requires a Webflow API token (`WEBFLOW_TOKEN`) set as an environment variable.
  • ⚠️Requires Node.js 22.3.0 or higher.
  • ⚠️For local installation, requires creating, publishing, and launching a 'Webflow MCP Bridge App' in a Webflow workspace with Admin permissions.
  • ⚠️The server's Designer App Bridge needs an available local port between 1338 and 1638.
Verified SafeView Analysis
The server uses `cors({ origin: '*' })` for both its Express app and Socket.IO server, which allows connections from any origin. While this configuration is often used for ease of development in local environments, it poses a network risk if the server is exposed beyond the local machine or if other untrusted local processes are able to connect. The `WEBFLOW_TOKEN` is correctly handled as an environment variable, preventing hardcoded secrets. No 'eval' or obvious malicious patterns were found.
Updated: 2026-01-16GitHub
PreviousPage 55 of 760Next