58
grade D
2 days ago
mcp_so

NCCI Claims Validation — CPT Code Pair Edits + MUE Limits

Validate CPT/HCPCS code pairs against NCCI edits. Check if codes can be billed together, what modifiers are needed, and MUE unit limits. Prevents claim denials. No public API like this exists.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 3 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
🔐
You'll be asked for 3 credentials: ADMIN_SECRET, STRIPE_SECRET_KEY, STRIPE_WEBHOOK_SECRET
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
🔐 secretADMIN_SECRETPORT=3000 =your_secret node src/index.js
configPORTSet env var to run as an HTTP server:
🔐 secretSTRIPE_SECRET_KEY
🔐 secretSTRIPE_WEBHOOK_SECRET
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 5 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/easysolutions906-ncci-api-v70lmg)](https://m8ven.ai/mcp/easysolutions906-ncci-api-v70lmg)
commit: ffc4da04bb1958a9dcf70b0533c3ff67c3b32994
code hash: 8e9eb4e2a5106cd928ed5c7b1ea391327ce4b5e8ee91d0abf95ea8ae5f6d4382
verified: 4/18/2026, 7:17:22 PM
view raw JSON →