Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"ryvo-gateway": {
"env": {
"RYVO_SIGNER_COMMAND": "npx -y @ryvonetwork/agent-wallet authorize",
"RYVO_WALLET_PROFILE": "default",
"RYVO_GATEWAY_BASE_URL": "https://gateway.ryvo.network"
},
"args": [
"-y",
"@ryvonetwork/gateway-mcp"
],
"command": "npx"
},
"ryvo-protocol": {
"args": [
"-y",
"@ryvonetwork/protocol-mcp"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Agent-facing tools for discovering, authenticating, and calling Ryvo Gateway routes.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y '@ryvonetwork/agentic' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
Checked @ryvonetwork/agentic against OSV.dev.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in other
MCP server for Spanning Cloud Backup — M365/GWS/Salesforce backups, restores, audit.
AI agent control of 3D printers — 432 tools for OctoPrint, Moonraker, Bambu, Prusa, Elegoo
MCP server for Kaseya Autotask PSA — companies, tickets, projects, time entries, and more.
On-chain provenance lookup for AnchorRegistry. Resolve AR-IDs, hashes, and full trees. Authless.
MCP Security Weekly
Get CVE alerts and security updates for io.github.Agonx402/agon-gateway and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Agent-facing tools for discovering, authenticating, and calling Ryvo Gateway routes.
setup --target all is the one command that installs everything Ryvo agents need:
~/.agents/skills, ~/.codex/skills, ~/.claude/skills.~/.ryvo/wallets/default.json.Ryvo, ryvo-gateway, ryvo-wallet, ryvo-protocol (via npm install -g @ryvonetwork/gateway-cli @ryvonetwork/agent-wallet @ryvonetwork/protocol-cli).~/.ryvo/llm.txt.npx -y @ryvonetwork/agentic@latest setup --target all
After it finishes, restart your agent client and the agent can call Ryvo directly via:
ryvo_token_quote, ryvo_token_resolve, ryvo_token_chart, ryvo_token_search, ryvo_token_batch_quote, ryvo_gateway_call, ryvo_gateway_auth_call, ...).ryvo -p bitcoin, ryvo quote bitcoin solana usdt, ryvo-gateway auth call GET ..., etc.Opt-out flags:
--skip-global-cli — do not run npm install -g. Bare CLI bins will not be on PATH; use npx -y @ryvonetwork/gateway-cli ... instead.--skip-wallet-setup — only valid for install-skills when another signer wallet is already configured.Supported setup targets:
npx -y @ryvonetwork/agentic setup --target codex # ~/.codex/config.toml
npx -y @ryvonetwork/agentic setup --target claude-desktop # standalone Claude Desktop GUI app config
npx -y @ryvonetwork/agentic setup --target claude-code # ~/.claude.json (Claude Code CLI agent)
npx -y @ryvonetwork/agentic setup --target cursor # ~/.cursor/mcp.json
npx -y @ryvonetwork/agentic setup --target windsurf
npx -y @ryvonetwork/agentic setup --target generic # ~/.ryvo/mcp.json
npx -y @ryvonetwork/agentic setup --target all --dry-run
--target all writes to every adapter listed above. Claude Desktop (the standalone macOS/Windows GUI app) and Claude Code (the terminal CLI agent) read MCP servers from different files; --target all registers in both. After setup, restart your agent client so it re-reads the MCP server list.
Setup creates ~/.ryvo/wallets/default.json. @ryvonetwork/agent-wallet only signs Tokens API SIWX challenges (sign-in-with-x). For Gateway routes that require x402 exact payment or other auth, set RYVO_SIGNER_COMMAND to a signer that returns PAYMENT-SIGNATURE / X-PAYMENT.
RYVO_SIGNER_COMMAND runsryvo_gateway_auth_call and the gateway responds with HTTP 402. The MCP spawns RYVO_SIGNER_COMMAND once, piping the normalized auth-request JSON to stdin (same shape as ryvo_gateway_prepare_auth). The process must exit 0 and print JSON to stdout: auth headers, or SIWX fallback (address, signature, optional signatureEncoding).gateway-cli: ryvo-gateway auth call and batch reuse the same requestGateway path: after any 402 from the Gateway, RYVO_SIGNER_COMMAND (or --auth-driver) runs if set. auth prepare / doctor never spawn the signer.On Windows, when the signer command begins with npx/npm/pnpm/yarn, Node may run it via cmd shell. Treat RYVO_SIGNER_COMMAND as equivalent to trusting a shell snippet if an attacker controls it.
Install all Ryvo skills into every supported agent skill directory (~/.agents/skills, ~/.codex/skills, ~/.claude/skills), and create the default convenience wallet used for SIWX/auth calls:
npx -y @ryvonetwork/agentic install-skills
Other install targets:
npx -y @ryvonetwork/agentic install-skills --target agents
npx -y @ryvonetwork/agentic install-skills --target codex
npx -y @ryvone
... [View full README on GitHub](https://github.com/Agonx402/agon-gateway-agentic#readme)