Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"metricspot": {
"env": {
"MCP_API_KEY": "ms_live_xxx"
},
"args": [
"-y",
"@metricspot/mcp-server"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Model Context Protocol server for MetricSpot. Exposes 6 SEO + AI-readability audit tools to AI agents (Claude, ChatGPT, Gemini, Perplexity, Cursor, Zed, OpenClaw, custom bots).
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y '@metricspot/mcp-server' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
Checked @metricspot/mcp-server against OSV.dev.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in analytics / marketing
MCP Server for GCP environment for interacting with various Observability APIs.
DataForSEO API modelcontextprotocol server
MCP server for InsightSentry financial data API - market data, options, screeners, and more
MCP server for the PostFast API — schedule and manage social media posts via AI tools
MCP Security Weekly
Get CVE alerts and security updates for com.metricspot/seo-mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Model Context Protocol server for MetricSpot. Exposes 6 SEO + AI-readability audit tools to AI agents (Claude, ChatGPT, Gemini, Perplexity, Cursor, Zed, OpenClaw, custom bots).
https://mcp.metricspot.com/mcpnpx @metricspot/mcp-server| Tool | Auth | Description |
|---|---|---|
run_audit_anonymous | none | One-shot audit, 1/IP/24h, no Core Web Vitals |
run_audit | Bearer key | Full audit with PSI, returns audit_id |
get_audit | Bearer key | Fetch audit + findings by id |
list_audits | Bearer key | List the user's recent audits (max 100) |
get_audit_pdf | Bearer key | Signed URL for the branded PDF report |
get_organic_traffic | Bearer key | 28-day GA4 + GSC snapshot (if Google linked) |
Claude Code (~/.claude/mcp.json):
{
"mcpServers": {
"metricspot": {
"command": "npx",
"args": ["-y", "@metricspot/mcp-server"],
"env": {
"MCP_API_KEY": "ms_live_xxx"
}
}
}
}
Cursor (~/.cursor/mcp.json) and Zed use the same shape.
Omit MCP_API_KEY to only use run_audit_anonymous.
POST https://mcp.metricspot.com/mcp
Authorization: Bearer ms_live_xxx
Content-Type: application/json
{"jsonrpc":"2.0","id":1,"method":"tools/list"}
| Var | Default | Purpose |
|---|---|---|
PORT | 3000 | HTTP listen port |
APP_API_BASE_URL | https://app.metricspot.com (prod) / http://localhost:3000 (dev) | MetricSpot app API base |
APP_PUBLIC_BASE_URL | falls back to APP_API_BASE_URL | Used to build report_url |
MCP_INTERNAL_TOKEN | — | Service-to-service secret forwarded as X-MCP-Internal-Token |
MCP_API_KEY | — | (stdio only) User API key, sent as Authorization: Bearer to the HTTP layer |
bun install
bun run typecheck
bun test
bun run dev # Streamable HTTP on :3000
bun run dev:stdio # stdio loop (send JSON-RPC on stdin)
Multi-stage Dockerfile produces a Bun runtime image. Independent Dokku app on the same Hetzner droplet as app/ and web/.
MIT