MCP Marketplace
BrowseHow It WorksFor CreatorsDocs
Sign inSign up
MCP Marketplace

The curated, security-first marketplace for AI tools.

Product

Browse ToolsSubmit a ToolDocumentationHow It WorksBlogFAQChangelog

Legal

Terms of ServicePrivacy PolicyCommunity Guidelines

Connect

support@mcp-marketplace.ioTwitter / XDiscord

MCP Marketplace © 2026. All rights reserved.

Back to Browse

Hive Mcp Sla Monitor MCP Server

by Srotzin
Developer ToolsLow Risk9.6MCP RegistryRemote
Free

Server data from the Official MCP Registry

Service level agreement monitoring for the Hive agent fleet

About

Service level agreement monitoring for the Hive agent fleet

Remote endpoints: streamable-http: https://hive-mcp-sla-monitor.onrender.com/mcp

Security Report

9.6
Low Risk9.6Low Risk

Valid MCP server (1 strong, 0 medium validity signals). 2 known CVEs in dependencies Imported from the Official MCP Registry.

4 tools verified · Open access · 2 issues found

Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.

Permissions Required

This plugin requests these system permissions. Most are normal for its category.

file_system

Check that this permission is expected for this type of plugin.

HTTP Network Access

Connects to external APIs or services over the internet.

env_vars

Check that this permission is expected for this type of plugin.

database

Check that this permission is expected for this type of plugin.

Shell Command Execution

Runs commands on your machine. Be cautious — only use if you trust this plugin.

How to Connect

Remote Plugin

No local installation needed. Your AI client connects to the remote endpoint directly.

Add this to your MCP configuration to connect:

{
  "mcpServers": {
    "io-github-srotzin-hive-mcp-sla-monitor": {
      "url": "https://hive-mcp-sla-monitor.onrender.com/mcp"
    }
  }
}

Documentation

View on GitHub

From the project's GitHub README.

hive-mcp-sla-monitor

SLA observation broker for the A2A network. Agents register a public health endpoint with target uptime and p95 latency; the shim probes it on a 60s schedule (read-only HTTP, 8s timeout) and records the result. When a rolling window misses the targets, a breach record is written. Reading breach records is paid. Inbound only. ENABLE=true by default.

Brand color: #C08D23 (Pantone 1245 C, Hive Civilization gold).

Observation only

Hive does not underwrite or settle SLA claims. This is observational data only. The shim does not hold custody, does not pay claims, and does not indemnify counterparties. The disclaimer rides every paid response and every breach record.

Surface

LayerEndpointDescription
MCPPOST /mcpJSON-RPC 2.0, Streamable-HTTP, protocol 2024-11-05.
DiscoveryGET /.well-known/mcp.jsonTool list and transport metadata.
RESTPOST /v1/sla/registerRegister an endpoint. 402 if no proof.
RESTGET /v1/sla/status/{id}Read observed uptime and p95. 402 if no proof.
RESTGET /v1/sla/breaches?monitor_id=…Read recent breach records. 402 if no proof.
RESTGET /v1/sla/todayUTC-day ledger snapshot. Free.
HealthGET /healthLiveness, pricing, recipient address.
RootGET /HTML for browsers, JSON for agents (Accept-header sniff).

Tools

NameTierCostDescription
sla_register1$0.01/probeRegister a public endpoint for probing.
sla_status1$0.01Read observed uptime and p95 over the rolling window.
sla_breach_history2$0.10Read recent breach records. Disclaimer rides every record.
sla_unregister0freeDeactivate a monitor.

Probe semantics

The scheduler scans active monitors every 60 seconds and issues a GET with an 8-second timeout. 2xx and 3xx count as up; 5xx and timeouts count as down. Probe rows are stored at /tmp/sla.db along with the monitor record and any breach records.

The breach evaluator runs after each probe. It looks at the rolling window (default 60 minutes), computes observed uptime and observed p95 latency, and records a breach if either target is missed. Repeated breaches inside half the window are de-bounced so a single bad window does not fan out.

The service caps active monitors at 100 (SLA_MAX_MONITORS) to keep probe fan-out deterministic.

x402 envelope

Every paid endpoint returns a 402 envelope on first hit:

{
  "error": "payment_required",
  "x402_version": 1,
  "disclaimer": "Hive does not underwrite or settle SLA claims. This is observational data only.",
  "payment": {
    "nonce": "…",
    "amount_usd": 0.01,
    "accept_min_usd": 0.007,
    "accepts": [{
      "chain": "base",
      "asset": "USDC",
      "contract": "0x833589fcd6edb6e08f4c7c32d4f71b54bda02913",
      "decimals": 6,
      "recipient": "0x15184bf50b3d3f52b60434f8942b7d52f2eb436e",
      "scheme": "exact"
    }],
    "tier": 1,
    "product": "sla_register",
    "floor_pct": 0.7
  }
}

Submit the proof inline via X-Payment header on the retry, or POST it to mint an access token used in X-Hive-Access.

Pricing inherits the hivemorph barter floor pattern: the envelope advertises both amount_usd (asking) and accept_min_usd (floor). A client may submit a proof whose on-chain paid amount is anywhere in [floor, asking] and the shim accepts it.

Settlement

USDC on Base L2 (0x833589fcd6edb6e08f4c7c32d4f71b54bda02913) to the recipient address above. Verification reads Transfer logs on the receipt against the configured Base RPC. Real chain reads, no mocks. A single tx_hash may only be redeemed once.

Environment

VariableDefaultNotes
PORT3000HTTP port.
ENABLEtrueWhen false, only /health and / respond.
WALLET_ADDRESS0x1518…436eUSDC recipient.
SLA_REGISTER_PRICE_USDC0.01Per registration.
SLA_BREACH_PRICE_USDC0.10Per breach-history read.
SLA_STATUS_PRICE_USDC0.01Per status read.
SLA_PROBE_INTERVAL_MS60000Probe loop interval.
SLA_PROBE_TIMEOUT_MS8000Per-probe HTTP timeout.
SLA_MAX_MONITORS100Active monitor cap.
BASE_RPC_URLhttps://mainnet.base.orgBase L2 JSON-RPC.
SLA_DB_PATH/tmp/sla.dbSQLite path.

Run

npm install
npm start
# → http://localhost:3000/health

License

MIT. Author: Steve Rotzin steve@thehiveryiq.com.

Reviews

No reviews yet

Be the first to review this server!

0

installs

New

no ratings yet

Is this your server?

Claim ownership to manage your listing, respond to reviews, and track installs from your dashboard.

Claim with GitHub

Sign up with the GitHub account that owns this repo

Links

Source CodeDocumentationRemote Endpoint

Details

Published April 29, 2026
Version 1.0.0
0 installs
Remote Plugin

More Developer Tools MCP Servers

Git

Free

by Modelcontextprotocol · Developer Tools

Read, search, and manipulate Git repositories programmatically

80.0K
Stars
4
Installs
6.5
Security
No ratings yet
Local

Toleno

Free

by Toleno · Developer Tools

Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.

114
Stars
412
Installs
8.0
Security
4.8
Local

mcp-creator-python

Free

by mcp-marketplace · Developer Tools

Create, build, and publish Python MCP servers to PyPI — conversationally.

-
Stars
58
Installs
10.0
Security
5.0
Local

MarkItDown

Free

by Microsoft · Content & Media

Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption

116.1K
Stars
16
Installs
6.0
Security
5.0
Local

mcp-creator-typescript

Free

by mcp-marketplace · Developer Tools

Scaffold, build, and publish TypeScript MCP servers to npm — conversationally

-
Stars
14
Installs
10.0
Security
5.0
Local

Google Workspace MCP

Free

by Taylorwilsdon · Productivity

Control Gmail, Calendar, Docs, Sheets, Drive, and more from your AI

1.6K
Stars
13
Installs
7.0
Security
No ratings yet
Local