8 CIPHER tools — Solana scan, breach check, Jito, FRED, Drift, repo health, more. x402-paid on Base.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"io-github-cryptomotifs-cipher-x402-mcp": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
8 CIPHER tools — Solana scan, breach check, Jito, FRED, Drift, repo health, more. x402-paid on Base.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in other
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Hash-verified file editing MCP server with token efficiency hook. 11 tools for AI coding agents.
MCP Security Weekly
Get CVE alerts and security updates for io.github.cryptomotifs/cipher-x402-mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
An MCP server that exposes 8 Solana / crypto / macro tools to any MCP-aware client (Claude Desktop, Cursor, Cline, Continue, etc.). Seven of the tools are gated behind the x402 payment protocol — agents auto-pay in USDC on Base, $0.005 – $0.25 per tool call. One tool is free (educational).
The server is a forward-only relay: when an agent calls a paid tool without an
X-PAYMENTheader, we surface the upstreamHTTP 402+ accept-list verbatim so the agent's own wallet signs the payment. We never custody caller funds.
Free + MIT-licensed. Fork it, ship your own, no strings.
Prefer not to self-host? A managed listing is live on MCPize with gateway proxying, rate limiting, API-key auth, and consolidated billing:
mcpize.com/mcp/cipher-x402-mcp
| Plan | Price | Requests / mo | Rate limit | Includes |
|---|---|---|---|---|
| Free | $0 | 100 | 10 / min | Free tools + solana_wallet_scan |
| Starter | $9 | 1,000 | 60 / min | 4 read-only tools (scan, HIBP, repo health, FRED) |
| Pro (recommended) | $29 | 5,000 | 120 / min | All 8 tools, priority GitHub support |
| Team | $99 | 25,000 | 600 / min | All 8 tools + custom upstream override, 24h response SLA |
Pay-as-you-go via MCPize's gateway. Self-host is still free (this repo, MIT).
| Tool | Price (USDC, Base) | Upstream |
|---|---|---|
solana_wallet_scan(address) | $0.01 | cipher-scan-three.vercel.app |
check_password_breach(sha1_prefix) | $0.005 | cipher-pwned.vercel.app |
jito_tip_calculator(pool_depth, expected_profit, slot_prob) | $0.01 | cipher-jito-tip.vercel.app |
github_repo_health(owner, repo) | $0.02 | cipher-repo-health.vercel.app |
fred_macro_series(series_id) | $0.005 | cipher-fred.vercel.app |
check_drift_exposure(wallet) | $0.01 | cipher-drift-exposure.vercel.app |
solana_wallet_security_audit_rules() | free | local (v1.1.0 ruleset) |
get_premium_cipher_chapter(slug) | $0.25 | cipher-x402.vercel.app |
Base network, USDC asset 0x833589fCD6eDb6E08f4c7C32D4f71b54bdA02913. The
current x402 payout recipient is exposed via the root / JSON manifest at
runtime — agents discover it automatically, you don't configure it by hand.
Add this to ~/Library/Application Support/Claude/claude_desktop_config.json
(macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
{
"mcpServers": {
"cipher-x402": {
"command": "npx",
"args": ["-y", "cipher-x402-mcp"]
}
}
}
Restart Claude Desktop. The 8 tools show up in the tool tray.
Any MCP-over-stdio client works the same way — the launcher is
npx -y cipher-x402-mcp.
npx -y @smithery/cli install cipher-x402-mcp --client claude
Deployed at https://cipher-x402-mcp.vercel.app/mcp (streamable HTTP). Probe the manifest at the root URL.
solana_wallet_scan({ "address": "..." }) without
a payment.HTTP 402 Payment Required — upstream returned an x402 accept-list.
followed by the JSON accept-list (price, network, payTo, asset, etc.).