Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"agon-gateway": {
"env": {
"AGON_SIGNER_COMMAND": "npx -y @agonx402/agent-wallet authorize",
"AGON_WALLET_PROFILE": "default",
"AGON_GATEWAY_BASE_URL": "https://gateway.agonx402.com"
},
"args": [
"-y",
"@agonx402/gateway-mcp"
],
"command": "npx"
},
"agon-protocol": {
"args": [
"-y",
"@agonx402/protocol-mcp"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
MCP server for Agon Protocol state reads and prepare-only payment-channel actions.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y '@agonx402/agentic' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
Checked @agonx402/agentic against OSV.dev.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in finance
Real-time financial market data: stocks, forex, crypto, commodities, and economic indicators
A Model Context Protocol (MCP) server that provides AI assistants with direct access to the Spreedly payments API. Enables LLMs to manage gateways, process transactions, tokenize payment methods, and more, through structured, validated tool calls.
MCP server for InsightSentry financial data API - market data, options, screeners, and more
Model Context Protocol for Actual Budget API
MCP Security Weekly
Get CVE alerts and security updates for io.github.Agonx402/agon-protocol and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Agent-facing tools for discovering, authenticating, and calling Ryvo Gateway routes.
setup --target all is the one command that installs everything Ryvo agents need:
~/.agents/skills, ~/.codex/skills, ~/.claude/skills.~/.ryvo/wallets/default.json.Ryvo, ryvo-gateway, ryvo-wallet, ryvo-protocol (via npm install -g @ryvonetwork/gateway-cli @ryvonetwork/agent-wallet @ryvonetwork/protocol-cli).~/.ryvo/llm.txt.npx -y @ryvonetwork/agentic@latest setup --target all
After it finishes, restart your agent client and the agent can call Ryvo directly via:
ryvo_token_quote, ryvo_token_resolve, ryvo_token_chart, ryvo_token_search, ryvo_token_batch_quote, ryvo_gateway_call, ryvo_gateway_auth_call, ...).ryvo -p bitcoin, ryvo quote bitcoin solana usdt, ryvo-gateway auth call GET ..., etc.Opt-out flags:
--skip-global-cli — do not run npm install -g. Bare CLI bins will not be on PATH; use npx -y @ryvonetwork/gateway-cli ... instead.--skip-wallet-setup — only valid for install-skills when another signer wallet is already configured.Supported setup targets:
npx -y @ryvonetwork/agentic setup --target codex # ~/.codex/config.toml
npx -y @ryvonetwork/agentic setup --target claude-desktop # standalone Claude Desktop GUI app config
npx -y @ryvonetwork/agentic setup --target claude-code # ~/.claude.json (Claude Code CLI agent)
npx -y @ryvonetwork/agentic setup --target cursor # ~/.cursor/mcp.json
npx -y @ryvonetwork/agentic setup --target windsurf
npx -y @ryvonetwork/agentic setup --target generic # ~/.ryvo/mcp.json
npx -y @ryvonetwork/agentic setup --target all --dry-run
--target all writes to every adapter listed above. Claude Desktop (the standalone macOS/Windows GUI app) and Claude Code (the terminal CLI agent) read MCP servers from different files; --target all registers in both. After setup, restart your agent client so it re-reads the MCP server list.
Setup creates ~/.ryvo/wallets/default.json. @ryvonetwork/agent-wallet only signs Tokens API SIWX challenges (sign-in-with-x). For Gateway routes that require x402 exact payment or other auth, set RYVO_SIGNER_COMMAND to a signer that returns PAYMENT-SIGNATURE / X-PAYMENT.
RYVO_SIGNER_COMMAND runsryvo_gateway_auth_call and the gateway responds with HTTP 402. The MCP spawns RYVO_SIGNER_COMMAND once, piping the normalized auth-request JSON to stdin (same shape as ryvo_gateway_prepare_auth). The process must exit 0 and print JSON to stdout: auth headers, or SIWX fallback (address, signature, optional signatureEncoding).gateway-cli: ryvo-gateway auth call and batch reuse the same requestGateway path: after any 402 from the Gateway, RYVO_SIGNER_COMMAND (or --auth-driver) runs if set. auth prepare / doctor never spawn the signer.On Windows, when the signer command begins with npx/npm/pnpm/yarn, Node may run it via cmd shell. Treat RYVO_SIGNER_COMMAND as equivalent to trusting a shell snippet if an attacker controls it.
Install all Ryvo skills into every supported agent skill directory (~/.agents/skills, ~/.codex/skills, ~/.claude/skills), and create the default convenience wallet used for SIWX/auth calls:
npx -y @ryvonetwork/agentic install-skills
Other install targets:
npx -y @ryvonetwork/agentic install-skills --target agents
npx -y @ryvonetwork/agentic install-skills --target codex
npx -y @ryvone
... [View full README on GitHub](https://github.com/agonx402/agon-gateway-agentic#readme)