Interact with your HackMD notes and teams seamlessly. Manage your notes, view reading history, and…
{
"mcpServers": {
"ai-smithery-yuna0x0-hackmd-mcp": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Interact with your HackMD notes and teams seamlessly. Manage your notes, view reading history, and…
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 131 days ago. 55 stars.
Will it work with my client?
Transport: . Compatibility not confirmed.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Model Context Protocol (MCP) Server to connect your AI with any MediaWiki
MCP server for Apple Developer Documentation - Search iOS/macOS/SwiftUI/UIKit docs, WWDC videos, Swift/Objective-C APIs & code examples in Claude, Cursor & AI assistants
MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public.
This is an MCP server that allows you to directly download transcripts of YouTube videos.
MCP Security Weekly
Get CVE alerts and security updates for ai.smithery/yuna0x0-hackmd-mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A Model Context Protocol (MCP) server that interfaces with the HackMD API, allowing LLM clients to access and interact with HackMD notes, teams, user profiles, and history data.
mcp.json / claude_desktop_config.json:{
"mcpServers": {
"hackmd": {
"command": "npx",
"args": ["-y", "hackmd-mcp"],
"env": {
"HACKMD_API_TOKEN": "your_api_token"
}
}
}
}
You may also optionally set the HACKMD_API_URL environment variable if you need to use a different HackMD API endpoint.
Follow the Local Development instructions to set up the project locally, then run:
pnpm run start:http
This will start the server on port 8081 by default. You can change the port by setting the PORT environment variable.
You can deploy this MCP server to any cloud platform that supports Node.js server applications.
You can also deploy via MCP platforms like Smithery.
When using the STDIO transport or hosting the HTTP transport server, you can pass configuration via environment variables:
HACKMD_API_TOKEN: HackMD API Token (Required for all operations)HACKMD_API_URL: (Optional) HackMD API URL (Defaults to https://api.hackmd.io/v1)Environment variables applied only for the HTTP transport server:
ALLOWED_HACKMD_API_URLS: (Optional) A comma-separated list of allowed HackMD API URLs. The server will reject requests if the provide HackMD API URL is not in this list. If not set, only the default URL (https://api.hackmd.io/v1) is allowed.[!CAUTION] If you are hosting the HTTP transport server with token pre-configured, you should protect your endpoint and implement authentication before allowing users to access it. Otherwise, anyone can access your MCP server while using your HackMD token.
When using the HTTP transport, user can pass configuration via HTTP headers:
Hackmd-Api-Token: HackMD API Token (Required for all operations)Hackmd-Api-Url: (Optional) HackMD API URL (Defaults to https://api.hackmd.io/v1)If the user provides the token in the header, while the server also has HACKMD_API_TOKEN set, the header value will take precedence.
To get an API token, follow these steps:
.env file or environment variables.