Server data from the Official MCP Registry
Behavioral trust scoring: domains, GitHub repos, npm, PyPI packages.
Behavioral trust scoring: domains, GitHub repos, npm, PyPI packages.
Remote endpoints: streamable-http: https://poc-backend.amdal-dev.workers.dev/mcp
Valid MCP server (2 strong, 4 medium validity signals). 1 known CVE in dependencies Imported from the Official MCP Registry.
6 tools verified · Open access · 1 issue found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Remote Plugin
No local installation needed. Your AI client connects to the remote endpoint directly.
Add this to your MCP configuration to connect:
{
"mcpServers": {
"io-github-piiiico-proof-of-commitment": {
"url": "https://poc-backend.amdal-dev.workers.dev/mcp"
}
}
}From the project's GitHub README.
Stars lie. Behavioral signals don't.
An MCP server and web tool that scores npm packages, PyPI packages, Rust crates, Go modules, and GitHub repos on behavioral commitment — signals that are harder to fake than stars, READMEs, or download counts.
26 of the 91 npm packages with >10M weekly downloads have a single npm publisher. Together they account for over 3 billion downloads per week. npm audit doesn't surface this. Stars don't either.
Four packages in a typical Node.js project are CRITICAL right now:
They won't appear in your package.json either — but these are in almost every project:
Behavioral signals surface this. Stars and READMEs don't.
No login required. Add to any MCP-compatible AI tool and start querying supply chain risk.
Claude Desktop
Open ~/Library/Application Support/Claude/claude_desktop_config.json on macOS (config file reference) or %APPDATA%\Claude\claude_desktop_config.json on Windows, then add:
{
"mcpServers": {
"commit": {
"type": "streamable-http",
"url": "https://poc-backend.amdal-dev.workers.dev/mcp"
}
}
}
Restart Claude Desktop. A tool icon appears in the chat input — ask it to audit your package.json.
Cursor
Open ~/.cursor/mcp.json (Cursor MCP docs) and add:
{
"mcpServers": {
"commit": {
"type": "streamable-http",
"url": "https://poc-backend.amdal-dev.workers.dev/mcp"
}
}
}
Smithery (once indexed)
npx -y @smithery/cli install proof-of-commitment --client claude
Terminal (zero install):
# New in v1.8.0: zero-arg auto-detect — cd into any project, run once:
npx proof-of-commitment
# Picks the highest-coverage manifest in cwd (package-lock.json > yarn.lock >
# pnpm-lock.yaml > pnpm-workspace.yaml > package.json; requirements.txt;
# Cargo.toml; go.sum > go.mod). When multiple ecosystems are present, the
# file with the most recent mtime wins.
# Explicit package list still works:
npx proof-of-commitment axios zod chalk
# Or point at a specific file:
npx proof-of-commitment --file package.json
npx proof-of-commitment --file package-lock.json # npm (transitive)
npx proof-of-commitment --file yarn.lock # yarn
npx proof-of-commitment --file pnpm-lock.yaml # pnpm
npx proof-of-commitment --file pnpm-workspace.yaml # pnpm monorepo
npx proof-of-commitment --pypi litellm langchain requests
npx proof-of-commitment --cargo serde tokio reqwest
npx proof-of-commitment --golang github.com/gin-gonic/gin golang.org/x/net
npx proof-of-commitment --file go.mod
npx proof-of-commitment --file go.sum # full transitive Go set
# JSON output for downstream tools:
npx proof-of-commitment --file package-lock.json --json | jq '.criticalCount'
--fail-on=<level> turns the CLI into a one-line CI gate. No GitHub Action required.
# .github/workflows/supply-chain.yml
name: Supply Chain
on: [pull_request]
jobs:
audit:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions/setup-node@v4
with: { node-version: '20' }
- run: npx -y proof-of-commitment --fail-on=critical
Levels:
--fail-on | Exit 1 when… |
|---|---|
critical | any package is flagged CRITICAL (publish-access concentration) |
risky | any package is CRITICAL or HIGH (score < 40) |
none | never — report only |
Defaults: critical in CI (when CI=true is set, which every major CI runner does) and for --json output. Interactive (TTY, non-CI) keeps the v1.7 default of exit 0 — running locally won't break your shell habits.
The dedicated piiiico/commit-action@v1 is still the right choice when you want PR comments and step summaries; --fail-on is for minimal pipelines that just need a yes/no answer.
Web demo (no install): getcommit.dev/audit — paste your packages, see risk scores in seconds.
MCP server (zero install):
{
"mcpServers": {
"proof-of-commitment": {
"type": "streamable-http",
"url": "https://poc-backend.amdal-dev.workers.dev/mcp"
}
}
}
Add to Claude Desktop, Cursor, Windsurf, or any MCP-compatible AI tool. Then ask:
"Audit my package.json for supply chain risk" "Score axios, zod, chalk, lodash — which is highest risk?" "Is vercel/ai actively maintained?"
Add supply chain auditing to any CI pipeline in 30 seconds — auto-detects packages from package.json or requirements.txt, posts results as a PR comment, writes to GitHub Step Summary, and optionally fails on CRITICAL packages.
Use the dedicated action at piiiico/commit-action:
# .github/workflows/supply-chain.yml
name: Supply Chain Audit
on:
pull_request:
paths: ['package.json', 'package-lock.json', 'bun.lock']
jobs:
audit:
runs-on: ubuntu-latest
permissions:
pull-requests: write
steps:
- uses: actions/checkout@v4
- uses: piiiico/commit-action@v1
with:
fail-on-critical: true # blocks merges on CRITICAL packages
comment-on-pr: true # posts results as a PR comment
When comment-on-pr: true (default), the action automatically posts the audit table as a comment on the pull request — and updates the same comment on re-run, so you don't get comment spam. Reviewers see the risk table without leaving the PR.
Inputs:
| Input | Default | Description |
|---|---|---|
packages | (auto) | Comma-separated package names (auto-detected from package.json/requirements.txt if not set) |
packages-file | (auto) | Path to package.json or requirements.txt (default: auto-detect in workspace root) |
fail-on-critical | true | Fail the workflow if CRITICAL packages are found |
max-packages | 20 | Max packages to audit when auto-detecting |
include-dev-dependencies | false | Include devDependencies from package.json |
comment-on-pr | true | Post audit results as a PR comment (requires pull-requests: write permission) |
api-key | (none) | Commit Pro API key — enables batch requests and 10K requests/month |
api-url | (prod) | Override API endpoint (useful for self-hosting) |
Outputs: has-critical, critical-count, audit-summary (markdown table, also written to Step Summary).
Free vs Pro: Without an API key, packages are audited one at a time (with delays to respect rate limits). With a Pro API key, all packages are audited in a single batch request — faster and with higher monthly limits.
Example PR comment / Step Summary output:
| Package | Risk | Score | Publishers | Downloads/wk | Age |
|---------|-------------|-------|------------|--------------|-------|
| chalk | 🔴 CRITICAL | 75 | 1 | 380M | 12.7y |
| zod | 🔴 CRITICAL | 83 | 1 | 133M | 6.1y |
| axios | 🔴 CRITICAL | 89 | 1 | 93M | 11.6y |
Add a Commit Trust badge to any npm package you maintain or depend on:

Examples:
| Package | Badge URL |
|---|---|
| chalk |  |
| react |  |
| express |  |
| @babel/core |  |
Grades: 🟢 OK (75+) · 🟠 WARNING (40–74) · 🔴 CRITICAL (<40 or sole npm publisher with 10M+ weekly downloads)
Badges are cached 1 hour. No API key needed.
Also supports PyPI, Cargo, Go modules, and the full ecosystem-specific format:




No API key. No install.
curl https://poc-backend.amdal-dev.workers.dev/api/audit \
-X POST \
-H "Content-Type: application/json" \
-d '{"packages": ["axios", "zod", "chalk", "lodash", "express"]}'
{
"count": 5,
"results": [
{
"name": "chalk",
"ecosystem": "npm",
"score": 75,
"maintainers": 1,
"weeklyDownloads": 398397580,
"ageYears": 12.7,
"trend": "stable",
"riskFlags": ["CRITICAL"],
"scorecardScore": 3.6, // null if no GitHub repo
"hasDangerousWorkflow": false // null if no Scorecard data
},
...
]
}
| Tool | Description |
|---|---|
audit_dependencies | Batch risk audit for up to 20 npm/PyPI/Cargo/Go packages |
lookup_npm_package | Single npm package behavioral profile |
lookup_pypi_package | Single PyPI package behavioral profile |
lookup_cargo_crate | Single Rust crate behavioral profile (crates.io) |
lookup_go_module | Single Go module behavioral profile (proxy.golang.org + GitHub) |
lookup_github_repo | GitHub repo commitment score (longevity, commit frequency, contributor depth) |
lookup_business | Norwegian business register — operating years, employees, financials |
lookup_business_by_org | Same, by org number |
query_commitment | Browser extension behavioral data (unique verified visitors, repeat rate) |
Each package is scored 0–100 across:
Both axios (8.1/10 Scorecard) and chalk (3.6/10 Scorecard) score CRITICAL on behavioral signals. They measure different attack surfaces — Scorecard catches process gaps, behavioral signals catch publisher concentration.
Risk flags:
CRITICAL — single npm publisher + >10M weekly downloads (exact LiteLLM/axios attack profile)HIGH — package <1yr old + rapid adoptionWARN — no release in 12+ months# packages you know about:
chalk — score 75, 1 publisher, 413M/week ⚑ CRITICAL
zod — score 86, 1 publisher, 163M/week ⚑ CRITICAL (30+ GitHub contributors)
lodash — score 81, 1 publisher, 145M/week ⚑ CRITICAL
axios — score 86, 1 publisher, 99M/week ⚑ CRITICAL (attacked Mar 30 2026)
express — score 90, 5 publishers, 95M/week
# packages probably not in your package.json, definitely in your lock file:
minimatch — score 78, 1 publisher, 562M/week ⚑ CRITICAL
glob — score 80, 1 publisher, 333M/week ⚑ CRITICAL
cross-spawn — score 72, 1 publisher, 190M/week ⚑ CRITICAL
# post-attack:
litellm — score 74, 1 publisher ⚑ CRITICAL (supply chain attack Mar 2026)
# Rust crates (new in v1.3.0):
serde — score 78, 1 owner, 13M/week ⚑ CRITICAL (dtolnay sole owner)
tokio — score 89, 2 owners, 10M/week
reqwest — score 85, 1 owner, 8M/week ⚑ HIGH
The LiteLLM attack (March 2026) and axios attack (March 30, 2026) followed the same pattern: stolen credentials → malicious package pushed → 97M+ machines exposed. Both packages scored CRITICAL by these metrics before the attacks.
Declarative signals (stars, README quality, CI badges) don't capture this risk. Behavioral commitment does.
| Layer | Technology |
|---|---|
| Backend | Cloudflare Workers + D1 |
| MCP | Model Context Protocol SDK |
| Data | npm registry, PyPI, crates.io, proxy.golang.org, deps.dev, GitHub API, Brønnøysund (NO) |
| Landing | Astro + Cloudflare Pages |
Planned, not promised. The project is early-stage — contributions welcome on any of these.
| Feature | Status | Notes |
|---|---|---|
| Cargo (Rust) registry support | ✅ Live | MCP tool, REST API, badge endpoint — ecosystem: "cargo" |
| Go modules support | ✅ Live | proxy.golang.org + deps.dev + GitHub-primary scoring — ecosystem: "golang" |
| Score breakdown visualization | Planned | Chart component for the 5 dimensions on getcommit.dev/audit |
--json flag for CLI | ✅ Live | npx proof-of-commitment --file package-lock.json --json | jq '.criticalCount' |
| pnpm workspace monorepo support | ✅ Live | --file pnpm-workspace.yaml or auto-detected from pnpm-lock.yaml |
| Historical score tracking | Planned | Trend charts — was this package getting riskier over time? |
| Org-level dashboards | Planned | Aggregate risk view across all repos in a GitHub org |
See open issues for things you can help with today.
Supply chain auditing is the first tool. The underlying primitive is a commitment graph — behavioral signals that replace content-based trust across any domain.
When content is free to fake (reviews, stars, READMEs), commitment becomes the signal. A publisher who has shipped 847 releases over 12 years is a different kind of commitment than one who published once in 2023.
The same logic applies to websites, businesses, and AI agents. Two card networks have independently named this gap: Mastercard Verifiable Intent §9.2 explicitly lists behavioral trust as "not covered." Visa TAP identifies agents without answering whether to trust them.
Proof of Commitment is the trust layer they're pointing at.
bun install
bun run dev:backend # local server with SQLite
bun run test:e2e # E2E test with mock World ID
Deploy:
bun run deploy # deploys to Cloudflare Workers
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Web content fetching and conversion for efficient LLM usage
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.