Back to Home
rohitsaraff33-bit icon

produckai-mcp-server

Verified Safe

by rohitsaraff33-bit

Overview

The ProduckAI MCP Server is a product feedback analysis integration designed for Claude Desktop, enabling product managers to centralize feedback from various sources (Slack, Google Drive, Zoom, JIRA, CSV uploads), process it using AI for clustering and VOC scoring, generate actionable insights, and automate the creation of Product Requirements Documents (PRDs).

Installation

Run Command
python -m produckai_mcp

Environment Variables

  • ANTHROPIC_API_KEY
  • PRODUCKAI_BACKEND__URL
  • PRODUCKAI_BACKEND__TIMEOUT
  • PRODUCKAI_BACKEND__API_KEY
  • PRODUCKAI_SERVER__NAME
  • PRODUCKAI_SERVER__VERSION
  • PRODUCKAI_SERVER__LOG_LEVEL
  • PRODUCKAI_SERVER__LOG_FILE
  • PRODUCKAI_AI__PROVIDER
  • PRODUCKAI_AI__MODEL
  • PRODUCKAI_AI__API_KEY_SOURCE
  • PRODUCKAI_AI__CLASSIFICATION__BATCH_SIZE
  • PRODUCKAI_AI__CLASSIFICATION__CONFIDENCE_THRESHOLD
  • PRODUCKAI_STATE__DATABASE
  • PRODUCKAI_STATE__BACKUP_ENABLED
  • PRODUCKAI_STATE__BACKUP_FREQUENCY
  • PRODUCKAI_INTEGRATIONS__SLACK__ENABLED
  • PRODUCKAI_INTEGRATIONS__SLACK__SYNC_CONFIG__INITIAL_DAYS
  • PRODUCKAI_INTEGRATIONS__SLACK__SYNC_CONFIG__DELTA_SYNC
  • PRODUCKAI_INTEGRATIONS__GDRIVE__ENABLED
  • PRODUCKAI_INTEGRATIONS__GDRIVE__SYNC_CONFIG__RECURSIVE
  • PRODUCKAI_INTEGRATIONS__JIRA__ENABLED
  • PRODUCKAI_INTEGRATIONS__JIRA__SYNC_CONFIG__LABEL
  • PRODUCKAI_INTEGRATIONS__JIRA__SYNC_CONFIG__SINCE_DAYS
  • PRODUCKAI_INTEGRATIONS__ZOOM__ENABLED
  • PRODUCKAI_INTEGRATIONS__ZOOM__SYNC_CONFIG__SINCE_DAYS

Security Notes

The server employs robust security practices by utilizing `keyring` for secure, system-level storage of sensitive API tokens (Slack, Google Drive, Zoom, JIRA) and relying on environment variables for the Anthropic API key, thereby preventing hardcoding of credentials. OAuth flows for integrations involve a temporary local `aiohttp` web server running on `localhost:8765` for callback handling, which isolates the process to the local machine. File system interactions for logs, database, and temporary CSV/VTT uploads are generally confined to user-owned directories, and user-provided file paths undergo basic validation. No `eval`, `exec`, or other immediately dangerous patterns are observed within the provided source code. However, dependency vulnerabilities or advanced file path manipulation could still pose risks.

Similar Servers

Stats

Interest Score0
Security Score9
Cost ClassHigh
Avg Tokens3000
Stars0
Forks0
Last Update2025-12-03

Tags

Product ManagementFeedback AnalysisAI/MLIntegrationsData ProcessingPRD GenerationVOC ScoringSaaSClaude Desktop