50
grade D
10 days ago
glama

ovice MCP Server

Integrates with the ovice Public API to manage virtual office workspaces, groups, and users. It enables Claude to send targeted notifications and retrieve organizational metadata such as space names and access URLs.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
🚨
Secret credentials may flow to a network call
1 flow detected: OVICE_CLIENT_SECRET. We can’t prove the destination matches the brand the credential belongs to.
⚠️
Known vulnerabilities in dependencies: 3 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
🔐
You'll be asked for 1 credential: OVICE_CLIENT_SECRET
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configOVICE_CLIENT_ID"": "your-client-id",
🔐 secretOVICE_CLIENT_SECRET"": "your-client-secret",
configOVICE_DOMAIN"": "api.ovice.com",
configOVICE_ORGANIZATION_ID"": "your-organization-id",
configOVICE_SERVICE_LOGO_URL"": "https://your-logo-url.com/logo.svg"
configOVICE_SERVICE_NAME"": "Your Service Name",
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 6 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/cti1650-ovice-mcp-server-1f2iu8)](https://m8ven.ai/mcp/cti1650-ovice-mcp-server-1f2iu8)
commit: 202281ae930486aaba710705499ea5cc56333633
code hash: d55d786626cd9c9b5040af7cd48622074d8ea6a427cc1b187c5e486cb9cc4059
verified: 4/11/2026, 3:27:33 PM
view raw JSON →