Back to Home
JSONbored icon

claudepro-directory

Verified Safe

by JSONbored

Overview

A central directory and API gateway for discovering, searching, and managing various Claude configurations, including AI agents, MCP servers, rules, commands, and hooks. It provides content serving, search, and OAuth authorization for MCP clients.

Installation

Run Command
cd apps/edge && supabase functions serve

Environment Variables

  • NEXT_PUBLIC_SUPABASE_URL
  • NEXT_PUBLIC_SUPABASE_ANON_KEY
  • SUPABASE_SERVICE_ROLE_KEY
  • SUPABASE_PROJECT_REF
  • POSTGRES_URL_NON_POOLING
  • REVALIDATE_SECRET
  • INDEXNOW_API_KEY
  • INDEXNOW_TRIGGER_KEY
  • POLAR_ACCESS_TOKEN
  • POLAR_ENVIRONMENT
  • RESEND_API_KEY
  • RESEND_AUDIENCE_ID
  • RESEND_FROM_EMAIL
  • RESEND_WEBHOOK_SECRET
  • R2_ACCESS_KEY_ID
  • R2_SECRET_ACCESS_KEY
  • R2_ENDPOINT
  • R2_BUCKET_NAME
  • INNGEST_EVENT_KEY
  • INNGEST_SIGNING_KEY
  • INTERNAL_API_SECRET
  • GITHUB_TOKEN
  • GITHUB_REPO_OWNER
  • GITHUB_REPO_NAME
  • DISCORD_ERROR_WEBHOOK_URL
  • DISCORD_CHANGELOG_WEBHOOK_URL
  • DISCORD_ANNOUNCEMENTS_WEBHOOK_URL
  • DISCORD_SUBMISSIONS_WEBHOOK_URL
  • DISCORD_JOBS_WEBHOOK_URL
  • MCP_SERVER_URL

Security Notes

The project demonstrates a strong focus on security, employing environment variables for all secrets, using timing-safe comparisons for critical keys, validating webhook signatures (Svix, Supabase), and sanitizing user-provided content (URLs, HTML). It uses Supabase's RLS and client isolation (anon vs. admin clients with justification) and implements rate limiting and circuit breakers for API resilience and abuse prevention. PII redaction is configured for logging. No 'eval' or obvious obfuscation was detected in the provided code snippets. Extensive architectural ESLint rules enforce secure coding practices.

Similar Servers

Stats

Interest Score77
Security Score9
Cost ClassLow
Avg Tokens500
Stars166
Forks18
Last Update2026-01-18

Tags

claudeaimcpdirectoryapi-gatewaydiscoveryconfiguration-managementcontent-serving