69
grade C
11 days ago
glama

lu-mcp-server

Verify AI agent communication with session types and formal proofs. 4 tools: parse protocols, verify messages, check safety properties, browse 20 stdlib templates.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
8 tools verified — handlers match their declared behaviour
7 read-only tools verified — handlers contain no write/delete/exec
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
Open source with a license and README
Anyone can audit the code, the license is declared, and the publisher documents what it does.
🔐
You'll be asked for 4 credentials: ANTHROPIC_API_KEY, CERVELLASWARM_SECRET, STRIPE_SECRET_KEY, STRIPE_WEBHOOK_SECRET
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
🔐 secretANTHROPIC_API_KEY
configCERVELLASWARM_API_URL
🔐 secretCERVELLASWARM_SECRET
configCERVELLASWARM_SNCP_ROOT
configDATABASE_PATH
configFRONTEND_URL
configNO_UPDATE_NOTIFIER
configPORT
configSTRIPE_PRICE_PRO
configSTRIPE_PRICE_TEAM
🔐 secretSTRIPE_SECRET_KEY
🔐 secretSTRIPE_WEBHOOK_SECRET
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 5 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/rafapra3008-cervellaswarm-ab7eqw)](https://m8ven.ai/mcp/rafapra3008-cervellaswarm-ab7eqw)
commit: 74d822deab8a5390355c7971637b7e62831ddea7
code hash: 9eb5608312e62719e2f3330a9e900c1b9728e902958567e4c83afaeba55354bd
verified: 4/11/2026, 2:35:20 PM
view raw JSON →