Server data from the Official MCP Registry
AI agent payment security - spending limits, whitelists, and human approval.
AI agent payment security - spending limits, whitelists, and human approval.
Set these up before or after installing:
Environment variable: CLAWVAULT_API_KEY
Unverified package source
We couldn't verify that the installable package matches the reviewed source code. Proceed with caution.
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-andrewszk-clawvault-mcp-server": {
"env": {
"CLAWVAULT_API_KEY": "your-clawvault-api-key-here"
},
"args": [
"-y",
"clawvault-mcp-server"
],
"command": "npx"
}
}
}Well-structured MCP server with proper authentication and appropriate permissions for a financial payment service. The code demonstrates good security practices including environment variable usage for API keys, proper error handling, and input validation through Zod schemas. Package verification found 1 issue (1 critical, 0 high severity).
Scanned 3 files · 3 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!