Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"quantrisk": {
"env": {
"QUANTRISK_API_KEY": "qr_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
},
"command": "quantrisk-mcp"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Portfolio risk analytics as MCP tools — VaR, Monte Carlo, optimization, options Greeks, and stress testing — for AI assistants.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y 'wrangler' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
Wrangler affected by OS Command Injection in `wrangler pages deploy`
**Summary** A command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. **Root cause** The `commitHash` variable, derived from user input via the `--commit-hash` CLI argument, is interpolated directl
Arbitrary remote code execution within `wrangler dev` Workers sandbox
### Impact The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. `wrangler dev` would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validate `Origin`/`Host` headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability
Arbitrary remote file read in Wrangler dev server
### Impact Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file. ### Patches This issue was fixed in `wrangler@3.19.0`. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle's source maps. ### Workarounds Configure Wr
Cloudflare Wrangler directory traversal vulnerability
### Impact The Wrangler command line tool (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server. ### Patches Wrangler2: Upgrade to v2.20.1 or higher. Wrangler3: Upgrade to v3
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in finance
Real-time financial market data: stocks, forex, crypto, commodities, and economic indicators
A Model Context Protocol (MCP) server that provides AI assistants with direct access to the Spreedly payments API. Enables LLMs to manage gateways, process transactions, tokenize payment methods, and more, through structured, validated tool calls.
MCP server for InsightSentry financial data API - market data, options, screeners, and more
Model Context Protocol for Actual Budget API
MCP Security Weekly
Get CVE alerts and security updates for dev.quantrisk/mcp-server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Portfolio risk analytics as MCP tools — VaR, Monte Carlo, optimization, options Greeks, and stress testing — for AI assistants.
→ Project home: quantrisk.dev
There are thousands of MCP servers; very few do quantitative finance. QuantRisk lets your AI assistant answer questions like "what's my portfolio's VaR at 95%?" with a real number instead of a definition. It exposes ten institutional-grade analytics tools over MCP — they run server-side on Cloudflare Workers and return structured JSON the model can reason about.
npm install -g @quantrisk/mcp-server
Get a key at quantrisk.dev/upgrade (free tier available, no card required), then add to your client config.
~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"quantrisk": {
"command": "quantrisk-mcp",
"env": { "QUANTRISK_API_KEY": "qr_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" }
}
}
}
.cursor/mcp.json (project) or ~/.cursor/mcp.json (global):
{
"mcpServers": {
"quantrisk": {
"command": "quantrisk-mcp",
"env": { "QUANTRISK_API_KEY": "qr_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" }
}
}
}
If your client speaks Streamable HTTP, point it at the hosted endpoint:
{
"mcpServers": {
"quantrisk": {
"transport": "http",
"url": "https://quantrisk-mcp.quantrisk.workers.dev/mcp",
"headers": { "Authorization": "Bearer qr_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" }
}
}
}
| Tool | Purpose | Tier |
|---|---|---|
analyze_risk | VaR (historical / parametric / Cornish-Fisher), CVaR, volatility, beta, max drawdown | Free |
monte_carlo_simulation | Distribution of future returns across simulated paths | Free |
stress_test | P&L under GFC 2008, COVID 2020, dot-com bust, etc. | Free |
correlation_matrix | Pairwise correlations + eigenvalue decomposition | Free |
performance_attribution | Sharpe, Sortino, Treynor, Calmar, Information ratio | Free |
sector_exposure | GICS sector + market-cap concentration (HHI) | Free |
price_history | Historical OHLCV for one or more tickers | Free |
optimize_portfolio | Mean-variance optimization (max Sharpe / min variance / target return) | Pro |
compare_portfolios | Head-to-head risk/return comparison of 2–5 allocations | Pro |
calculate_greeks | Delta, gamma, theta, vega, rho for options portfolios | Pro |
| Free | Pro ($29/mo) | |
|---|---|---|
| Positions per call | 20 | 500 |
| Monte Carlo paths | 1,000 | 100,000 |
| Price history | 1 ticker × 1 yr | 20 tickers × 5 yr |
| Calls / day | 100 | 5,000 |
| Tools | 7 | 10 |
Subscribe at quantrisk.dev/upgrade — cancel any time.
Two pieces ship from this repo:
bin/quantrisk-mcp.js — a stdio ⇄ Streamable-HTTP bridge installed via npm install -g. It reads JSON-RPC from stdin, forwards each message to the hosted server with the user's API key, and writes responses back. This is what Claude Desktop / Cursor talk to.
src/ — the Cloudflare Worker that handles the actual MCP protocol, runs the analytics engine, and gates by tier. State lives in a Durable Object (UserState) per API key. Stripe handles billing; webhooks promote/demote tiers.
The math is in src/engine/ — pure TypeScript, no external dependencies, fully unit-tested.
You can run your own instance on Cloudflare Workers:
git clone https://github.com/QuantRisk/mcp-se
... [View full README on GitHub](https://github.com/78degrees/mcp-server#readme)