60
grade C
10 days ago
glama

cws-mcp

MCP server for Chrome Web Store — upload, publish, status, metadata & Playwright-based UI automation

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 3 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
Open source with a license and README
Anyone can audit the code, the license is declared, and the publisher documents what it does.
🔐
You'll be asked for 2 credentials: CWS_CLIENT_SECRET, CWS_REFRESH_TOKEN
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configCWS_CLIENT_ID"": "xxxxx.apps.googleusercontent.com",
🔐 secretCWS_CLIENT_SECRET"": "GOCSPX-xxxxx",
configCWS_DASHBOARD_PROFILE_DIRNo Browser profile path for UI automation (default: ~/.cws-mcp-profile)
configCWS_ITEM_ID"": "your-extension-id"
configCWS_PUBLISHER_IDNo Publisher ID (default: me)
🔐 secretCWS_REFRESH_TOKEN"": "1//xxxxx",
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 4 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/mikusnuz-cws-mcp-1ebi7e)](https://m8ven.ai/mcp/mikusnuz-cws-mcp-1ebi7e)
commit: 5292130508c6380f3036215f9fb4e9a5dd5b5915
code hash: 1939abd1a0761800aa65e3df50b8345bacbf421e8b92dd9fb233c515d1b1e96d
verified: 4/11/2026, 2:33:05 PM
view raw JSON →