Universal Language briefings, FusionGirl context JSONs, service catalog, agent info. x402-enabled.
Universal Language briefings, FusionGirl context JSONs, service catalog, agent info. x402-enabled.
Is it safe?
No known CVEs for wrangler. 4 previously resolved.
No authentication — any process on your machine can connect to this server.
License not specified.
Last scanned 0 days ago.
Is it maintained?
Last commit 20 days ago. 5,713,964 weekly downloads.
Will it work with my client?
Transport: stdio, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
How much context will it use?
4 tools. Estimated ~300 tokens of your context window (0.2% of 200K).
What if it doesn't work?
Common issues: JSON syntax errors in config, wrong Node.js version, npx cache, network or firewall blocking. covers troubleshooting.
{
"mcpServers": {
"archangel-agency-mcp": {
"url": "https://archangel-agency-mcp.jordan-trana.workers.dev/mcp"
}
}
}Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y wrangler 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
get_service_catalogMachine-readable service catalog (services, pricing, payment methods)
get_universal_language_briefingUniversal Language research briefing (summary or full depth)
get_context_jsons8 ontological framework documents from the FusionGirl wiki. Call with context='list' to get directory or specify a key to fetch directly.
get_agent_infoA2A agent card (skills, capabilities, payment, contact)
Last scanned 3h ago
No open vulnerabilities. 4 fixed CVEs.
CVE-2026-0933FixedWrangler affected by OS Command Injection in `wrangler pages deploy`
**Summary** A command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. **Root cause** The `commitHash` variable, derived from user input via the `--commit-hash` CLI argument, is interpolated directl
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
CVE-2023-7080FixedArbitrary remote code execution within `wrangler dev` Workers sandbox
### Impact The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. `wrangler dev` would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validate `Origin`/`Host` headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability
CVE-2023-7079FixedArbitrary remote file read in Wrangler dev server
### Impact Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file. ### Patches This issue was fixed in `wrangler@3.19.0`. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle's source maps. ### Workarounds Configure Wr
CVE-2023-3348FixedCloudflare Wrangler directory traversal vulnerability
### Impact The Wrangler command line tool (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server. ### Patches Wrangler2: Upgrade to v2.20.1 or higher. Wrangler3: Upgrade to v3