60
grade C
10 days ago
glama

opensanctions-mcp

MCP server for sanctions screening and PEP checks via OpenSanctions API. Search entities, match against 320+ sanctions lists, and run compound compliance investigations with AI agents.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 3 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
Open source with a license and README
Anyone can audit the code, the license is declared, and the publisher documents what it does.
🔐
You'll be asked for 1 credential: OPENSANCTIONS_API_KEY
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
🔐 secretOPENSANCTIONS_API_KEY"": "your-key-here"
configOPENSANCTIONS_API_URLNo https://api.opensanctions.org API URL. Set to your self-hosted yente instance.
configOPENSANCTIONS_DATASETNo default Dataset to screen against. default includes all 320+ sources.
configOPENSANCTIONS_MAX_RETRIESNo 3 Max retries for failed API calls.
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 4 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/scka-de-opensanctions-mcp-14yhbv)](https://m8ven.ai/mcp/scka-de-opensanctions-mcp-14yhbv)
commit: 99b5ebc81654518059ebb18813fe5bc516f9be19
code hash: 50da884d75e8309984fd87015378b8cce50dc7de6dfe4faa7e62c0416e02137b
verified: 4/11/2026, 2:27:33 PM
view raw JSON →