Server data from the Official MCP Registry
Sanctions screening and PEP checks via OpenSanctions API for AI agents
Sanctions screening and PEP checks via OpenSanctions API for AI agents
Set these up before or after installing:
Environment variable: OPENSANCTIONS_API_KEY
Environment variable: OPENSANCTIONS_API_URL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-scka-de-opensanctions-mcp": {
"env": {
"OPENSANCTIONS_API_KEY": "your-opensanctions-api-key-here",
"OPENSANCTIONS_API_URL": "your-opensanctions-api-url-here"
},
"args": [
"-y",
"opensanctions-mcp"
],
"command": "npx"
}
}
}Well-structured sanctions screening MCP server with proper authentication, secure credential handling, and appropriate permissions. Minor code quality issues include broad error handling and non-production logging patterns, but no significant security concerns. Supply chain analysis found 3 known vulnerabilities in dependencies (0 critical, 3 high severity). Package verification found 1 issue.
Scanned 7 files · 7 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!