Server data from the Official MCP Registry
Trustless escrow for AI agent-to-agent transactions on Base L2 with ERC-8004 identity and USDC.
Trustless escrow for AI agent-to-agent transactions on Base L2 with ERC-8004 identity and USDC.
Set these up before or after installing:
Environment variable: AEGIS_CHAIN
Environment variable: AEGIS_RPC_URL
Environment variable: AEGIS_PRIVATE_KEY
Environment variable: AEGIS_API_URL
Unverified package source
We couldn't verify that the installable package matches the reviewed source code. Proceed with caution.
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-im-sham-aegis-protocol": {
"env": {
"AEGIS_CHAIN": "your-aegis-chain-here",
"AEGIS_API_URL": "your-aegis-api-url-here",
"AEGIS_RPC_URL": "your-aegis-rpc-url-here",
"AEGIS_PRIVATE_KEY": "your-aegis-private-key-here"
},
"args": [
"-y",
"@aegis-protocol/api"
],
"command": "npx"
}
}
}The AEGIS Protocol MCP server provides secure blockchain escrow functionality with proper authentication through private keys and environment variables. The server appropriately uses network access and file system permissions for its blockchain and caching purposes, with no identified security vulnerabilities. Supply chain analysis found 7 known vulnerabilities in dependencies (1 critical, 0 high severity). Package verification found 1 issue (1 critical, 0 high severity).
Scanned 5 files · 11 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!