Discover and integrate MCP servers tagged with mcp
21 mcp MCP Servers Available
MCP server for browsing and interacting with OneNote web app using browser-use automation
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
FastAPI server implementing MCP protocol Browser automation via browser-use library.
A sample project testing Model Context Protocol (MCP) server and client interaction.
Laravel specific MCP server - better AI pair programming
A test repository created using the GitHub MCP server
A Model Context Protocol (MCP) server that provides Xcode-related tools for integration with AI assistants and other MCP clients.
MCP server providing code quality checks (pylint and pytest) with smart LLM-friendly prompts for analysis and fixes. Enables Claude and other AI assistants to analyze your code and suggest improvements.
Model Context Protocol server implementation for CosmosDB
This is an advanced MCP Server script I have developed and would like to share.
Interact with the Paddle API using AI assistants like Claude, or in AI-powered IDEs like Cursor. Manage product catalog, billing and subscriptions, and reports.
MCP (Model Context Protocol) is an open protocol that standardizes how applications provide context to LLMs. Think of MCP like a USB-C port for AI applications, providing a standardized way to connect AI models to different data sources and tools.
MCP Servers are lightweight programs that expose specific capabilities through the standardized Model Context Protocol. They act as bridges between LLMs like Claude and various data sources or services, allowing secure access to files, databases, APIs, and other resources.
MCP Servers follow a client-server architecture where a host application (like Claude Desktop) connects to multiple servers. Each server provides specific functionality through standardized endpoints and protocols, enabling Claude to access data and perform actions through the standardized protocol.
Yes, MCP Servers are designed with security in mind. They run locally with explicit configuration and permissions, require user approval for actions, and include built-in security features to prevent unauthorized access and ensure data privacy.