mcp-services
Multi-tool MCP server for AI agents with 29 tools across web scraping, SEO analysis, screenshot and PDF generation, domain intelligence, content extraction, multi-chain EVM blockchain queries, and security toolkit. Free tier available with no auth required.
README
MCP Services
Multi-tool MCP server + REST API for AI agents. 29 tools across web scraping, SEO analysis, agent memory, screenshot/PDF generation, domain intelligence, content extraction, multi-chain EVM blockchain queries, and security toolkit.
Live: mcp.skills.ws | Docs: llms.txt | npm: npm install -g mcp-services
Quick Start
Use the hosted version (no setup)
Add to your MCP client config (Claude Desktop, Cursor, OpenClaw, etc.):
{
"mcpServers": {
"mcp-services": {
"url": "https://mcp.skills.ws/mcp/sse"
}
}
}
Free tier: 10 calls/day, no auth needed.
Self-host
npm install -g mcp-services
mcp-services
# -> running on http://localhost:3100
Tools (29)
Web Scraping
| Tool | Endpoint | Description |
|---|---|---|
scrape |
GET /api/scrape |
URL to clean Markdown with headings, lists, links, code blocks, tables |
crawl |
GET /api/crawl |
Crawl a site from starting URL, follow internal links (depth 1-3, max 20 pages) |
extract |
GET /api/extract |
Extract structured data: JSON-LD, Open Graph, meta tags, headings, links, images, tables |
SEO Toolkit
| Tool | Endpoint | Description |
|---|---|---|
serp |
GET /api/serp |
Google SERP scraping -- top 20 results, People Also Ask, featured snippets, related searches |
onpage_seo |
GET /api/onpage-seo |
Full on-page SEO audit with score (0-100) -- title, meta, headings, images, schema, Open Graph |
keywords_suggest |
GET /api/keywords |
Google Autocomplete keyword suggestions with A-Z expansion (100+ ideas) |
Agent Memory
| Tool | Endpoint | Description |
|---|---|---|
memory_store |
POST /api/memory |
Store a memory (key-value, namespace-scoped, with tags). Upserts on key conflict |
memory_get |
GET /api/memory |
Retrieve a memory by namespace + key |
memory_search |
GET /api/memory/search |
Full-text search across memories in a namespace |
memory_list |
GET /api/memory/list |
List all memories in a namespace with pagination |
memory_delete |
DELETE /api/memory |
Delete a memory by namespace + key |
Screenshot & PDF
| Tool | Endpoint | Description |
|---|---|---|
screenshot |
GET /api/screenshot |
PNG/JPEG screenshot of any URL |
pdf |
GET /api/pdf |
Generate PDF of any URL |
pdf2docx |
GET /api/pdf2docx |
Convert PDF (from URL) to Word/DOCX -- text extraction with heading detection |
Content Extraction
| Tool | Endpoint | Description |
|---|---|---|
html2md |
GET /api/html2md |
Fetch URL, strip nav/ads/scripts, convert to Markdown |
ocr |
GET /api/ocr |
Extract text from image URL via Tesseract.js OCR |
Domain Intelligence
| Tool | Endpoint | Description |
|---|---|---|
whois |
GET /api/whois |
WHOIS registrar, creation date, expiry, name servers |
dns |
GET /api/dns |
DNS records -- A, AAAA, MX, NS, TXT, CNAME, SOA, or ALL |
ssl |
GET /api/ssl |
SSL certificate issuer, validity dates, expiry countdown, fingerprint |
Blockchain (6 EVM chains)
| Tool | Endpoint | Description |
|---|---|---|
balance |
GET /api/chain/balance |
Native token balance for any address |
erc20_balance |
GET /api/chain/erc20 |
ERC20 token balance, symbol, decimals |
transaction |
GET /api/chain/tx |
Transaction details -- from, to, value, gas, status |
Supported chains: Ethereum, Base, Arbitrum, Optimism, Polygon, Celo
Security Toolkit
| Tool | Endpoint | Description |
|---|---|---|
url_scan |
GET /api/security/url-scan |
Phishing & malware detection -- VirusTotal + heuristics (typosquatting, homoglyphs, suspicious TLDs, free hosting) |
wallet_check |
GET /api/security/wallet-check |
Ethereum wallet risk assessment -- Etherscan verification, tx patterns, OFAC sanctions, address poisoning warnings |
contract_scan |
GET /api/security/contract-scan |
Smart contract honeypot & risk detection -- Honeypot.is + source code analysis (mint, blacklist, fee manipulation, proxy) |
email_headers |
GET /api/security/email-headers |
Email authentication check -- SPF, DKIM, DMARC, MX records via DNS |
threat_intel |
GET /api/security/threat-intel |
IOC lookup -- AbuseIPDB + VirusTotal + OTX AlienVault with weighted confidence scoring for IPs, domains, URLs, hashes |
header_audit |
GET /api/security/header-audit |
Security header score (0-100) -- HSTS, CSP, X-Content-Type-Options, X-Frame-Options, Referrer-Policy, Permissions-Policy, cookie flags |
vuln_headers |
GET /api/security/vuln-headers |
Information leakage detection -- Server version, X-Powered-By, debug headers, CORS misconfiguration |
Security tools degrade gracefully without API keys (heuristics-only mode). Optional keys: VT_API_KEY, ABUSEIPDB_API_KEY, ETHERSCAN_API_KEY.
Authentication
Three tiers -- use whichever fits:
| Tier | How | Limit | Cost |
|---|---|---|---|
| Free | No auth needed | 10 calls/day per IP | $0 |
| API Key | X-Api-Key header |
Unlimited | $9/mo |
| x402 | X-Payment header |
Pay per call | $0.005/call |
API Key
Subscribe via Stripe to get an unlimited API key:
For migration only, query-string API keys (?apikey=) can be temporarily re-enabled with ALLOW_APIKEY_QUERY=true. This mode is deprecated; prefer X-Api-Key.
# 1. Create checkout session
curl -X POST https://mcp.skills.ws/billing/checkout
# Returns: { "url": "https://checkout.stripe.com/..." }
# 2. Complete payment at the Stripe URL
# 3. You'll receive your API key on the success page (shown once only -- save it)
# 4. Use it
curl -H "X-Api-Key: mcp_your_key" "https://mcp.skills.ws/api/whois?domain=example.com"
x402 Pay-per-call
No account needed. Pay with USDC or USDT on Base or Celo. x402-compatible agents handle payment automatically.
curl -H "X-Payment: <base64-encoded-json>" "https://mcp.skills.ws/api/screenshot?url=https://example.com"
REST API
All tools are also available as REST endpoints:
# Web Scraping
curl "https://mcp.skills.ws/api/scrape?url=https://example.com"
curl "https://mcp.skills.ws/api/crawl?url=https://example.com&depth=2&maxPages=10"
curl "https://mcp.skills.ws/api/extract?url=https://example.com"
# SEO
curl "https://mcp.skills.ws/api/serp?keyword=mcp+server"
curl "https://mcp.skills.ws/api/onpage-seo?url=https://example.com"
curl "https://mcp.skills.ws/api/keywords?keyword=ai+agents"
# Memory
curl -X POST "https://mcp.skills.ws/api/memory" \
-H "Content-Type: application/json" \
-d '{"namespace":"my-agent","key":"greeting","value":"Hello world","tags":["demo"]}'
curl "https://mcp.skills.ws/api/memory?namespace=my-agent&key=greeting"
curl "https://mcp.skills.ws/api/memory/search?namespace=my-agent&query=hello"
# Domain Intelligence
curl "https://mcp.skills.ws/api/whois?domain=example.com"
curl "https://mcp.skills.ws/api/dns?domain=example.com&type=ALL"
curl "https://mcp.skills.ws/api/ssl?domain=example.com"
# Content
curl "https://mcp.skills.ws/api/screenshot?url=https://example.com&format=png"
curl "https://mcp.skills.ws/api/pdf?url=https://example.com"
curl "https://mcp.skills.ws/api/pdf2docx?url=https://example.com/document.pdf"
# Blockchain
curl "https://mcp.skills.ws/api/chain/balance?address=0x...&chain=ethereum"
curl "https://mcp.skills.ws/api/chain/erc20?address=0x...&token=0x...&chain=celo"
# Security
curl "https://mcp.skills.ws/api/security/url-scan?url=https://suspicious-site.com"
curl "https://mcp.skills.ws/api/security/wallet-check?address=0x...&chain=ethereum"
curl "https://mcp.skills.ws/api/security/contract-scan?address=0x...&chainId=1"
curl "https://mcp.skills.ws/api/security/email-headers?domain=example.com"
curl "https://mcp.skills.ws/api/security/threat-intel?ioc=8.8.8.8&type=ip"
curl "https://mcp.skills.ws/api/security/header-audit?url=https://example.com"
curl "https://mcp.skills.ws/api/security/vuln-headers?url=https://example.com"
Environment Variables
| Variable | Default | Description |
|---|---|---|
PORT |
3100 |
Server port |
CHROMIUM_PATH |
/usr/bin/chromium-browser |
Path to Chromium |
MAX_BROWSERS |
3 |
Max concurrent browser instances |
MAX_SSE_SESSIONS |
50 |
Max MCP SSE sessions |
MAX_SSE_PER_IP |
5 |
Max concurrent SSE sessions per client IP |
SSE_CONNECT_MAX_PER_WINDOW |
30 |
Max SSE connection attempts per IP per window |
SSE_CONNECT_WINDOW_MS |
60000 |
SSE connect rate-limit window in ms |
SSE_ALLOWED_HOSTS |
-- | Comma-separated allowlist for Host header on /mcp/sse + /mcp/messages (e.g. mcp.example.com,localhost) |
SSE_ALLOWED_ORIGINS |
-- | Optional comma-separated allowlist for Origin header (full origins like https://app.example.com) |
FREE_DAILY_LIMIT |
10 |
Free tier request limit |
FREE_WINDOW_MS |
86400000 |
Free-tier rate-limit window in ms |
REDIS_URL |
-- | Optional Redis backend for shared/distributed rate-limits |
API_KEYS |
-- | Comma-separated valid API keys |
ALLOW_APIKEY_QUERY |
true in non-production, false in production |
Allow deprecated ?apikey= auth during migration |
ADMIN_SECRET |
-- | Secret for admin endpoints |
STRIPE_SK |
-- | Stripe API key for Pro subscriptions |
STRIPE_WEBHOOK_SECRET |
-- | Stripe webhook signing secret |
STRIPE_WEBHOOK_IP_ALLOWLIST |
-- | Optional CSV allowlist for webhook source IPs |
CHECKOUT_LIMIT_PER_HOUR |
5 |
Per-IP Stripe checkout creation limit |
X402_PRICE_USD |
0.005 |
x402 price per call |
X402_RECEIVER |
-- | x402 payment receiver address |
X402_MAX_TX_AGE_SECONDS |
86400 |
Maximum accepted payment tx age in seconds (stale txs are rejected) |
X402_TX_CACHE_FILE |
./data/x402-tx-cache.json |
Persistent replay-protection cache for used x402 tx hashes |
X402_TEST_MODE |
0 |
Set to 1 only for local/offline testing; ignored in production |
MEMORY_DB_PATH |
./data/memory.db |
SQLite memory database path |
VT_API_KEY |
-- | VirusTotal API key (free: 4/min, 500/day) |
ABUSEIPDB_API_KEY |
-- | AbuseIPDB API key (free: 1000/day) |
ETHERSCAN_API_KEY |
-- | Etherscan API key (free: 5/sec) |
TRUST_PROXY |
false |
Express trust proxy setting (false, true, hop count like 1, or subnet names/CIDRs like loopback/10.0.0.0/8) |
Reverse proxy & client IP configuration
mcp-services defaults to TRUST_PROXY=false, which means the app ignores X-Forwarded-For and uses the direct socket peer IP for rate limits and free-tier memory namespacing.
Enable TRUST_PROXY only when your deployment is actually behind a trusted reverse proxy/load balancer that rewrites forwarding headers. Common options:
TRUST_PROXY=1when exactly one trusted proxy sits in front of Node.jsTRUST_PROXY=loopbackfor local proxy setupsTRUST_PROXY=<cidr>(or comma-separated values) for explicit trusted proxy ranges
When trust proxy is enabled, Express derives req.ip from X-Forwarded-For according to that trust policy. Ensure your edge proxy:
- Appends/sets a valid
X-Forwarded-Forchain - Prevents direct untrusted clients from spoofing forwarding headers
- Forwards the real client address as the left-most IP in
X-Forwarded-For
If X-Forwarded-For is present while TRUST_PROXY=false, the server logs a defensive warning and ignores that header.
For production, set SSE_ALLOWED_HOSTS and SSE_ALLOWED_ORIGINS to strict, explicit values (only your public MCP domain and trusted app origins). Avoid wildcards or broad internal host lists.
Deployment hardening checklist (recommended)
- Set
NODE_ENV=production - Keep
ALLOW_APIKEY_QUERY=false(header auth only) - Configure
TRUST_PROXYcorrectly for your network path (do not blindly settrue) - Set strict
SSE_ALLOWED_HOSTSandSSE_ALLOWED_ORIGINS - Use
REDIS_URLfor shared rate-limits in multi-instance deployments - Rotate
ADMIN_SECRETand Stripe keys periodically - Keep
X402_TEST_MODE=0in production (enforced by server) - Persist
KEYS_FILE,MEMORY_DB_PATH, andX402_TX_CACHE_FILEon durable storage - Run
npm auditin CI and fail builds on high/critical vulnerabilities
Production env quickstart
cp .env.production.example .env
# then edit .env values for your domain, proxy topology, redis and secrets
Stripe webhook edge allowlist auto-sync (nginx)
# Generate CIDR allowlist include from Stripe source and reload nginx
scripts/sync-stripe-webhook-ips.sh \
--out /etc/nginx/snippets/stripe-webhook-allowlist.conf \
--reload "systemctl reload nginx"
See deploy/nginx/stripe-webhook.conf.example for the webhook location block.
Security
- SSRF protection: URL validation + DNS pre-resolution + private IP blocking + Puppeteer request interception
- Domain validation: regex allowlist prevents command injection
- Input sanitization: format validation per IOC type, address format checks, chain allowlists
- Memory namespace isolation per auth tier (API key hash, IP, or x402)
- Rate limiting on free tier
- Resource limits: max concurrent browsers, SSE sessions, PDF size cap, 5MB response body limit
- Response size limits on external API fetches
Architecture
+------------------------------------+
| Express Server |
| |
| +---------+ +--------------+ |
MCP SSE -------> | MCP SDK | | Auth Layer | |
| | (SSE) | | free/key/x402 | |
| +---------+ +--------------+ |
| |
REST API ------> +--------------------------------+ |
| | 29 Tool Handlers | |
| | scrape | crawl | extract | |
| | serp | onpage_seo | keywords | |
| | memory (5) | screenshot | pdf | |
| | html2md | ocr | whois | dns | |
| | ssl | balance | erc20 | tx | |
| | url_scan | wallet_check | |
| | contract_scan | email_headers | |
| | threat_intel | header_audit | |
| | vuln_headers | |
| +--------------------------------+ |
| | | |
| +-----+----+ +-----+----------+ |
| | Puppeteer| | viem (6 RPCs) | |
| | Chromium | | whois-json | |
| | | | dns/promises | |
| | | | security.js | |
| +----------+ +-----------------+ |
| |
Stripe --------> +--------------------------------+ |
Webhooks | | Billing (stripe.js) | |
| | checkout -> key provisioning | |
| +--------------------------------+ |
+------------------------------------+
Stack
- Runtime: Node.js 22 + Express
- Browser: Puppeteer (Chromium) -- screenshots, PDF, OCR, html2md
- Blockchain: viem -- 6 EVM chains via public RPCs
- Security: VirusTotal, AbuseIPDB, Etherscan, Honeypot.is, OTX AlienVault + heuristics
- Payments: Stripe (subscriptions), x402 protocol (stablecoins on Base/Celo)
- MCP:
@modelcontextprotocol/sdkwith SSE transport - Hosting: Aleph Cloud (decentralized compute)
License
MIT -- Commit Media SARL
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
Audiense Insights MCP Server
Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.
VeyraX MCP
Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.
graphlit-mcp-server
The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.
Kagi MCP Server
An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.
E2B
Using MCP to run code via e2b.
Neon Database
MCP server for interacting with Neon Management API and databases
Exa Search
A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.
Qdrant Server
This repository is an example of how to create a MCP server for Qdrant, a vector search engine.