71
grade C
11 days ago
glama

Chisel

Reduce context usage on file use. Send only unified diffs instead of full files (up to 20-100× fewer tokens), and read large files with targeted grep/sed instead of full reads (up to 500×). Kernel-enforced path confinement hard-locks the agent to a configured root: no accidental reads or writes outside scope. Standalone for your file access or embed in any MCP server (Rust, Node.js, Python via

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
🔐
You'll be asked for 1 credential: CHISEL_SECRET
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configCHISEL_ROOT
🔐 secretCHISEL_SECRET
configCHISEL_URL
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 4 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/ckanthony-chisel-w8e65r)](https://m8ven.ai/mcp/ckanthony-chisel-w8e65r)
commit: b2a7c90cbc1a9f27c546d6f70d7ca564d858930e
code hash: 8b728da275995448d1351a78b0cf174478fc70e143e8fc5b057a655b5bf675cb
verified: 4/11/2026, 2:55:04 PM
view raw JSON →