43
grade D
13 days ago
glama

nworks

NAVER WORKS CLI + MCP server. 26 tools for messages, calendar, drive, mail, tasks, and boards. AI agents can manage NAVER WORKS directly.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Tool descriptions don’t match what handlers do
1 tool describes read intent but its handler mutates — nworks_drive_download (line 481: writeFile(outPath, result.buffer))
🚨
Known vulnerabilities in dependencies: 1 critical, 3 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
🔐
You'll be asked for 1 credential: NWORKS_CLIENT_SECRET
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configNWORKS_BOT_ID
configNWORKS_CLIENT_ID
🔐 secretNWORKS_CLIENT_SECRET"": "<Client Secret>",
configNWORKS_DOMAIN_ID
configNWORKS_PRIVATE_KEY_PATH"": "<Private Key file absolute path (for Service Account)>"
configNWORKS_SCOPEdefault: bot bot.read user.read
configNWORKS_SERVICE_ACCOUNT
configNWORKS_VERBOSE1 # debug logging
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 6 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/yjcho9317-nworks-1dbrfj)](https://m8ven.ai/mcp/yjcho9317-nworks-1dbrfj)
commit: 4e3c53ba43d41ba294a2204a317003e0e93bdc6a
code hash: 58100281a7bf7176ab887f80d0f9dc6b8865c2ba030f453fd5d6950b0b5073d9
verified: 4/11/2026, 2:36:05 PM
view raw JSON →