68
grade C
11 days ago
glama

Axcess

Paid MCP server that evaluates typography accessibility beyond what axe and Lighthouse catch. $0.05 USDC per evaluation via x402 on Base mainnet.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 2 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
3 tools verified — handlers match their declared behaviour
3 read-only tools verified — handlers contain no write/delete/exec
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
🔐
You'll be asked for 1 credential: EVM_PRIVATE_KEY
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configCDP_API_KEY_IDfly secrets set =...
🔐 secretEVM_PRIVATE_KEYconst account = privateKeyToAccount(process.env. as 0x${string});
configMCP_SERVER_URL
configPAYMENT_ADDRESSfly secrets set =0x...
configPORT
configTRANSPORT
configX402_FACILITATOR_URL
configX402_NETWORKfly secrets set =eip155:8453
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 5 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/sicxz-axcess-mcp-server-ktrhx3)](https://m8ven.ai/mcp/sicxz-axcess-mcp-server-ktrhx3)
commit: c006e95f8af0d8d5726ca4ff79c0dc11925045de
code hash: f48a1e1d1dceff718bf4bd7d891abfef73c887ee28612f0a18b49c853a6a70b9
verified: 4/11/2026, 2:28:10 PM
view raw JSON →