Server data from the Official MCP Registry
Polymarket + Hyperliquid (perps + HIP-4) for AI agents. 24 tools, signals & arb. Free tier.
Polymarket + Hyperliquid (perps + HIP-4) for AI agents. 24 tools, signals & arb. Free tier.
Remote endpoints: streamable-http: https://predmcp.com/mcp
PredMCP is a well-documented, open-source MCP server for prediction market and perpetual futures data. The code shows good security discipline around authentication (API key per IP via HMAC hashing), privacy (no logging of tool arguments or user data), and permission scope (network-only access to public APIs). However, there are several code quality and security concerns that prevent a higher score: mixed authentication patterns between `/mcp` (header-based) and `/admin/*` (Bearer token), missing input validation on some tool parameters, and the reliance on environment-based secrets without clear rotation guidance. Supply chain analysis found 8 known vulnerabilities in dependencies (1 critical, 5 high severity).
6 files analyzed · 15 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Available as Local & Remote
This plugin can run on your machine or connect to a hosted endpoint. during install.
From the project's GitHub README.
Real-time prediction-market + Hyperliquid perps intelligence, plugged directly into any MCP-compatible client (Claude Desktop, Cursor, Windsurf, …) or any LLM that calls tools.
PredMCP is an MCP server that gives any MCP-compatible LLM live data from Polymarket and Hyperliquid (perpetuals + HIP-4 on-chain markets). Use it to ask one question and pull cross-venue context in a single answer — funding rates, orderbook depth, volume spikes, whale positions, prediction-market odds.
https://predmcp.com/mcp — free tier, 100 calls/day, one key per IP.npm install, set a few env vars, run.Get a free key at predmcp.com (email + click "Get key").
Add it to claude_desktop_config.json:
{
"mcpServers": {
"predmcp": {
"type": "http",
"url": "https://predmcp.com/mcp",
"headers": { "x-api-key": "your-key" }
}
}
}
Restart Claude Desktop. Ask things like:
These are the data-layer tools — direct, thin wrappers over Polymarket and Hyperliquid APIs, plus single-venue aggregations. The code is the spec.
Polymarket
get_markets — live markets, sorted by volumeget_odds — YES/NO price for any tokenget_orderbook — full bid/ask depth for a marketsearch_markets — full-text search across PM + HIP-4get_whale_positions — largest position holders in a marketget_movers — top 24h volume spikes and biggest price swingsget_markets_near_resolution — resolving soon with high probabilityget_volume_spikes — abnormal 24h volume vs 7-day baselineget_late_game_sports — sports markets closing soon with high-certainty leaderHyperliquid (perps + HIP-4)
get_funding_rates — current funding for one or all perpsget_open_interest — OI in USD and contractsget_whale_trades — recent large trades above a notional thresholdget_top_funding_rates — top perps by absolute funding rateget_oi_near_cap — perps at the OI cap (entry blacklist)get_orderbook_depth — bid/ask depth + slippage estimate for any perp or HIP-4 marketAccount
create_api_key — programmatic signup (one email, one IP, 100 calls/day)This repo contains the open-source half: the MCP framework, the basic Polymarket and Hyperliquid fetchers, the auth/stats layer, the landing page. It's fully functional on its own — you can run a complete PredMCP instance from this code.
A second set of tools — eight proprietary tools (cross-venue signals + funding outlier and liquidation-cluster analytics) (divergence detection, whale convergence, HIP-4 ↔ Polymarket arb, etc.) — lives in a private folder (src/tools/private/) that is gitignored. The hosted server at predmcp.com loads them on startup; clones of this repo simply don't see them (the loader catches the import error silently). You'll see 16 tools in tools/list when running OSS. The hosted server has 24.
The closed tools are kept closed because that's where the meaningful logic sits, and that's what funds the project. The open half is real, complete, and auditable — not a stub. If a closed tool is critical to your use case, run against the hosted endpoint; if you only need data tools, run your own.
This section describes exactly what the hosted predmcp.com server records. The code that does the recording is in this repo; you can read it in 30 seconds.
api_keys, see src/core/auth/keys.ts)| Column | What it is | Why |
|---|---|---|
key | the 32-byte random key | identifier |
tier | free or pro | plan |
email | the email you provided at signup | recovery / billing |
calls_today | counter of API calls in the current UTC day | rate limit |
day_bucket | the YYYY-MM-DD that counter belongs to | reset logic |
created_at | ms timestamp of issuance | analytics |
last_seen_at | ms timestamp of the most recent call | "active users" metric |
creator_ip | HMAC-SHA-256(IP, server pepper) | one-key-per-IP enforcement |
The raw IP is never persisted. We hash it with a server-side secret (HMAC pepper) at request time and compare hashes for the uniqueness check. Plain SHA-256(IPv4) would be reversible via rainbow tables; the HMAC pepper makes that infeasible.
coin, query, token_id, condition_id, etc.)The default log level is info. Tool-call arguments are logged at debug only, and the log.debug calls in src/sources/* have been written to drop arguments entirely (see commits). Operators who set LOG_LEVEL=debug for local development get function names only, no payloads.
If you sign up on predmcp.com today, the only personally-identifying thing we hold tomorrow is:
Pro tier (when launched via Polar.sh): the daily counter still increments for billing. Nothing else changes.
The schema has a tamper-evident audit_log table (chained SHA-256 hashes). It is not currently written to in the OSS code — it exists for future compliance use. You can grep for audit( to confirm it has no live callers.
git clone https://github.com/RavioleLabs/predmcp.git
cd predmcp
npm install
npm run build
# Required env vars
export ADMIN_SECRET="$(openssl rand -hex 32)"
export IP_HASH_PEPPER="$(openssl rand -hex 32)"
export TRUST_PROXY="loopback" # if running behind nginx on the same host
node dist/index.js
The server listens on port 3000 by default. SQLite database lives at ~/.predmcp/predmcp.db. The first signup creates the schema.
Available env vars:
ADMIN_SECRET (required, ≥ 32 chars) — used for Authorization: Bearer … on /admin/*IP_HASH_PEPPER (required, ≥ 32 chars) — used as the HMAC key for IP hashingTRUST_PROXY — true, loopback, or a comma-separated CIDR list (default: don't trust any proxy)LOG_LEVEL — debug / info / warn / error (default info)If anything in this repo contradicts the above, that is a bug. Open an issue or a PR.
MIT, see LICENSE. Pull requests welcome on the open parts.
io.github.RavioleLabs/predmcpBe the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Modelcontextprotocol · Developer Tools
Web content fetching and conversion for efficient LLM usage
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.