74
grade C
2 days ago
glama

unphurl-mcp

URL intelligence for AI agents. One URL in, structured security and data quality signals out across 7 dimensions. 13 tools, risk score 0-100 with 23 configurable weights.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 1 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
⚠️
Tests do not pass
Either the test suite is broken or the code regressed. Either way the published behaviour can’t be verified by the publisher’s own tests.
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
Open source with a license and README
Anyone can audit the code, the license is declared, and the publisher documents what it does.
🔐
You'll be asked for 2 credentials: LINKCHECK_API_KEY, UNPHURL_API_KEY
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configAPI_PROJECT_ROOT
🔐 secretLINKCHECK_API_KEY
configLINKCHECK_API_URL
configTEST_BASE_URL
🔐 secretUNPHURL_API_KEY"": "uph_your_key_here"
configUNPHURL_API_URL
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 6 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/123ergo-unphurl-mcp-1au21q)](https://m8ven.ai/mcp/123ergo-unphurl-mcp-1au21q)
commit: 0d6e2a43ea9042391fab7523096b68785aeb338c
code hash: 326d0622dc2d23915074e52d13429f5f266063c731890c6a220021c9960ff2f9
verified: 4/18/2026, 6:17:28 PM
view raw JSON →