Discover Awesome MCP Servers
Extend your agent with 16,638 capabilities via MCP servers.
- All16,638
- Developer Tools3,867
- Search1,714
- Research & Data1,557
- AI Integration Systems229
- Cloud Platforms219
- Data & App Analysis181
- Database Interaction177
- Remote Shell Execution165
- Browser Automation147
- Databases145
- Communication137
- AI Content Generation127
- OS Automation120
- Programming Docs Access109
- Content Fetching108
- Note Taking97
- File Systems96
- Version Control93
- Finance91
- Knowledge & Memory90
- Monitoring79
- Security71
- Image & Video Processing69
- Digital Note Management66
- AI Memory Systems62
- Advanced AI Reasoning59
- Git Management Tools58
- Cloud Storage51
- Entertainment & Media43
- Virtualization42
- Location Services35
- Web Automation & Stealth32
- Media Content Processing32
- Calendar Management26
- Ecommerce & Retail18
- Speech Processing18
- Customer Data Platforms16
- Travel & Transportation14
- Education & Learning Tools13
- Home Automation & IoT13
- Web Search Integration12
- Health & Wellness10
- Customer Support10
- Marketing9
- Games & Gamification8
- Google Cloud Integrations7
- Art & Culture4
- Language Translation3
- Legal & Compliance2
edgar-sec-mcp
Một máy chủ MCP để lấy dữ liệu từ EDGAR
🚀 MCP Server for Document Processing
Máy chủ MCP này cho phép các trợ lý AI truy cập và tìm kiếm các tài liệu riêng tư, cơ sở mã và thông tin công nghệ mới nhất của bạn. Nó xử lý Markdown, văn bản và PDF thành một cơ sở dữ liệu có thể tìm kiếm, mở rộng kiến thức của AI vượt ra ngoài dữ liệu huấn luyện. Được xây dựng bằng Docker, hỗ trợ các trình nhúng (embeddings) miễn phí và trả phí, đồng thời giúp AI luôn được cập nhật với dữ liệu của bạn.
MCP Server Trello
Mirror of
MemGPT Sample
A simple, abridged MemGPT agent written in Spring Boot. Includes a running as a REST API or MCP server. Also includes a simple ChatBot App to interact with the agent.
OKX MCP Server
eSignatures NDA Tutorial
Okay, here's a tutorial on creating Non-Disclosure Agreements (NDAs) using eSignatures with an MCP (Message Content Protection) Server. This assumes you have a basic understanding of NDAs and how eSignatures work. This guide will focus on the *process* and *concepts* rather than specific code examples, as the implementation will vary depending on your chosen eSignature platform and MCP Server. **I. Understanding the Components** Before we begin, let's define the key components: * **NDA (Non-Disclosure Agreement):** A legally binding contract that establishes a confidential relationship. It outlines what information is considered confidential and restricts the recipient from disclosing it to others. * **eSignature (Electronic Signature):** A digital representation of a handwritten signature, used to authenticate and approve electronic documents. It provides legal validity and ensures the integrity of the document. * **MCP Server (Message Content Protection Server):** A server that provides security features for electronic documents, including encryption, access control, and audit trails. It helps ensure the confidentiality and integrity of the NDA. * **eSignature Platform:** The software or service you'll use to manage the eSignature process (e.g., DocuSign, Adobe Sign, HelloSign, etc.). This platform will handle the signing workflow, authentication, and storage of the signed document. **II. General Workflow** The typical workflow for creating and signing an NDA using eSignatures and an MCP Server is as follows: 1. **NDA Creation:** Draft the NDA document. 2. **Document Preparation:** Prepare the NDA for eSignature by adding signature fields and defining the signing order. 3. **MCP Integration:** Integrate the NDA with the MCP Server for encryption and access control. 4. **Sending for Signature:** Send the NDA to the designated signers through the eSignature platform. 5. **Signer Authentication:** Signers authenticate themselves through the eSignature platform. 6. **eSignature Application:** Signers apply their eSignatures to the document. 7. **MCP Server Processing:** The eSignature platform interacts with the MCP Server to finalize the document, encrypt it, and apply access controls. 8. **Storage and Audit:** The signed and encrypted NDA is stored securely, and an audit trail is maintained. 9. **Access Control:** Only authorized parties can access the signed NDA based on the MCP Server's access control policies. **III. Detailed Steps** Let's break down each step in more detail: **1. NDA Creation:** * **Drafting the NDA:** This is a legal process. Consult with legal counsel to ensure the NDA is comprehensive and enforceable in the relevant jurisdictions. Consider the following: * **Parties Involved:** Clearly identify all parties involved in the agreement. * **Definition of Confidential Information:** Specifically define what constitutes confidential information. * **Exclusions:** Specify any information that is *not* considered confidential. * **Obligations of the Recipient:** Outline the recipient's obligations regarding the confidential information. * **Term of the Agreement:** Specify the duration of the agreement. * **Governing Law:** Indicate the jurisdiction whose laws will govern the agreement. * **Document Format:** Save the NDA in a compatible format (e.g., PDF, DOCX). PDF is generally preferred for eSignatures due to its consistent formatting. **2. Document Preparation:** * **Upload to eSignature Platform:** Upload the NDA document to your chosen eSignature platform. * **Add Signature Fields:** Use the eSignature platform's tools to add signature fields for each signer. Specify the location, size, and other properties of the signature fields. * **Define Signing Order:** If multiple signers are involved, define the order in which they need to sign the document. * **Add Other Fields (Optional):** You can add other fields for signers to fill in, such as their name, title, or date. **3. MCP Integration:** * **API Integration:** This is the most technical step. You'll need to integrate your eSignature platform with the MCP Server using APIs (Application Programming Interfaces). This typically involves: * **Authentication:** Authenticating your eSignature platform with the MCP Server. * **Encryption Configuration:** Configuring the encryption settings for the NDA. This might involve specifying the encryption algorithm, key management, and access control policies. * **Access Control Policies:** Defining who has access to the signed NDA. This could be based on roles, groups, or individual users. * **MCP Server Configuration:** Configure the MCP Server to accept requests from your eSignature platform and to apply the appropriate security policies. * **Testing:** Thoroughly test the integration to ensure that the encryption and access control are working correctly. **4. Sending for Signature:** * **Add Recipients:** Add the email addresses of the signers to the eSignature platform. * **Customize Email Message:** Customize the email message that will be sent to the signers. Include clear instructions on how to sign the document. * **Send the NDA:** Send the NDA to the signers through the eSignature platform. **5. Signer Authentication:** * **Access the Document:** Signers receive an email with a link to access the NDA. * **Authentication Methods:** The eSignature platform will typically offer various authentication methods, such as: * **Email Verification:** Sending a verification code to the signer's email address. * **SMS Authentication:** Sending a verification code to the signer's mobile phone. * **Knowledge-Based Authentication (KBA):** Asking the signer questions based on their public records. * **Digital Certificates:** Using digital certificates to verify the signer's identity. * **Complete Authentication:** Signers must successfully complete the authentication process before they can access the document. **6. eSignature Application:** * **Review the NDA:** Signers carefully review the NDA before signing. * **Apply eSignature:** Signers use the eSignature platform's tools to apply their eSignature to the designated signature fields. This might involve: * **Typing their name:** Typing their name in a designated field. * **Drawing their signature:** Drawing their signature using a mouse or stylus. * **Uploading an image of their signature:** Uploading an image of their handwritten signature. * **Complete Signing:** Signers complete the signing process by clicking a "Sign" or "Submit" button. **7. MCP Server Processing:** * **Encryption:** The eSignature platform interacts with the MCP Server to encrypt the signed NDA. * **Access Control Enforcement:** The MCP Server enforces the access control policies that were configured earlier. * **Digital Signature Validation:** The MCP server may also validate the digital signatures applied by the eSignature platform to ensure their integrity and authenticity. **8. Storage and Audit:** * **Secure Storage:** The signed and encrypted NDA is stored securely, typically on the MCP Server or in a secure storage location managed by the eSignature platform. * **Audit Trail:** The eSignature platform and MCP Server maintain an audit trail of all actions related to the NDA, including: * **Document Creation:** When the NDA was created. * **Sending for Signature:** When the NDA was sent to the signers. * **Signer Authentication:** When each signer authenticated themselves. * **eSignature Application:** When each signer applied their eSignature. * **Access Attempts:** All attempts to access the signed NDA. **9. Access Control:** * **Authorized Access:** Only authorized parties can access the signed NDA based on the MCP Server's access control policies. * **Access Logging:** All access attempts are logged for auditing purposes. **IV. Considerations and Best Practices** * **Legal Compliance:** Ensure that your eSignature process complies with all relevant laws and regulations, such as the ESIGN Act in the United States and eIDAS in the European Union. * **Security:** Implement strong security measures to protect the confidentiality and integrity of the NDA. This includes using strong encryption algorithms, implementing robust access control policies, and regularly auditing your security practices. * **User Experience:** Make the eSignature process as easy and intuitive as possible for signers. Provide clear instructions and support to help them through the process. * **Integration Testing:** Thoroughly test the integration between your eSignature platform and the MCP Server to ensure that everything is working correctly. * **Key Management:** Implement a secure key management system to protect the encryption keys used by the MCP Server. * **Regular Audits:** Conduct regular audits of your eSignature process to identify and address any potential security vulnerabilities. * **Vendor Selection:** Carefully select your eSignature platform and MCP Server vendors. Choose vendors with a proven track record of security and reliability. * **Documentation:** Maintain comprehensive documentation of your eSignature process, including the integration between your eSignature platform and the MCP Server. **V. Example Scenario (Conceptual)** Let's say you're using DocuSign as your eSignature platform and have an MCP Server from a company called "SecureDocs." 1. You draft an NDA in Microsoft Word. 2. You upload the NDA to DocuSign. 3. You add signature fields for yourself and the other party. 4. You use DocuSign's API to connect to the SecureDocs MCP Server. You configure the MCP Server to encrypt the NDA using AES-256 encryption and to grant access only to you and the other party. 5. You send the NDA to the other party through DocuSign. 6. The other party receives an email from DocuSign and authenticates themselves using SMS authentication. 7. The other party reviews the NDA and applies their eSignature. 8. DocuSign sends the signed NDA to the SecureDocs MCP Server. 9. The SecureDocs MCP Server encrypts the NDA and stores it securely. 10. Only you and the other party can access the signed and encrypted NDA through the SecureDocs MCP Server. Any attempt to access the NDA by an unauthorized party will be blocked. **VI. Vietnamese Translation of Key Terms** Here are the Vietnamese translations of some key terms: * **NDA (Non-Disclosure Agreement):** Thỏa thuận bảo mật thông tin / Hợp đồng bảo mật * **eSignature (Electronic Signature):** Chữ ký điện tử * **MCP Server (Message Content Protection Server):** Máy chủ bảo vệ nội dung tin nhắn / Máy chủ MCP * **Encryption:** Mã hóa * **Access Control:** Kiểm soát truy cập * **Audit Trail:** Nhật ký kiểm toán / Dấu vết kiểm toán * **Signer:** Người ký * **Confidential Information:** Thông tin bảo mật * **API (Application Programming Interface):** Giao diện lập trình ứng dụng **VII. Conclusion** Creating NDAs using eSignatures and an MCP Server provides a secure and efficient way to manage confidential agreements. By following the steps outlined in this tutorial and considering the best practices, you can ensure that your NDAs are legally binding, secure, and easily accessible to authorized parties. Remember to consult with legal counsel to ensure that your NDAs are compliant with all relevant laws and regulations. Good luck!
Fetch MCP Server
Máy chủ MCP để lấy thông tin từ internet dựa trên URL.
UseScraper MCP Server
Mirror of
Remote MCP Server on Cloudflare
Jason's MCP Servers
Collection of MCP servers and installation scripts
Bazel MCP Server
Gương của
Boilerplate MCP Server
TypeScript Model Context Protocol (MCP) server boilerplate providing IP lookup tools/resources. Includes CLI support and extensible structure for connecting AI systems (LLMs) to external data sources like ip-api.com. Ideal template for creating new MCP integrations via Node.js.
Peeper MCP Server
Model Control Panel server for Peeper application
Weather MCP Server
Máy chủ MCP để lấy thời tiết thành phố Hoa Kỳ
🤖 Deno Model Context Protocol (MCP) Agent Template Repository
A template Model Context Protocol server in Deno
mcp-servers
Awesome MCP Servers
Một danh sách chọn lọc các máy chủ Model Context Protocol (MCP) tuyệt vời.
Cursor Azure DevOps MCP Server
Azure DevOps Cursor IDE MCP server plugin
Model Context Protocal (MCP) Implementation
Đây là một Framework Máy chủ MCP đơn giản cho phép dữ liệu được truyền qua một giao thức nhắn tin có cấu trúc, cho phép giao tiếp liền mạch giữa máy khách và máy chủ. Nó hỗ trợ trao đổi dữ liệu hiệu quả, xử lý thời gian thực và các tiện ích mở rộng tùy chỉnh cho các ứng dụng khác nhau, đảm bảo khả năng mở rộng và độ tin cậy trong các môi trường đa dạng.
Databricks Permissions MCP Server
MCP server for managing Databricks permissions and credentials
mcp-server-deepseek
Máy chủ MCP cung cấp quyền truy cập vào khả năng suy luận của DeepSeek-R1 cho các LLM (Mô hình ngôn ngữ lớn).
Claude Custom Prompts Server
Claude Custom Prompts MCP Server - Create and use custom prompt templates with Claude AI
mcp-server-opensearch MCP server
Workflows MCP Server
Một máy chủ cung cấp tích hợp thông qua cả các điểm cuối REST trực tiếp và tích hợp Giao thức Ngữ cảnh Mô hình (MCP) với một công cụ quy trình làm việc.
MCP Server template for better AI Coding
This template provides a streamlined foundation for building Model Context Protocol (MCP) servers in Python. It's designed to make AI-assisted development of MCP tools easier and more efficient.
OpenAI Web Search MCP Server
A server for handling OpenAI web search using MCP (Multi-Config Protocol)
hackernew-mcp
AI Friendly MCP Server for Hacker News
Shopify MCP Server
Mirror of
Todoist MCP Server
Mirror of
Compound Interest CalculatorCompound Interest Calculator
Kho lưu trữ để kiểm tra chức năng của máy chủ MCP