Universal Language briefings, FusionGirl context JSONs, service catalog, agent info. x402-enabled.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"archangel-agency-mcp": {
"url": "https://archangel-agency-mcp.jordan-trana.workers.dev/mcp"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
MCP server for Archangel Agency — query ontological research, Universal Language briefings, Context JSON frameworks, and the A2A agent card.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y 'wrangler' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
Wrangler affected by OS Command Injection in `wrangler pages deploy`
**Summary** A command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. **Root cause** The `commitHash` variable, derived from user input via the `--commit-hash` CLI argument, is interpolated directl
Arbitrary remote code execution within `wrangler dev` Workers sandbox
### Impact The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. `wrangler dev` would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validate `Origin`/`Host` headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability
Arbitrary remote file read in Wrangler dev server
### Impact Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file. ### Patches This issue was fixed in `wrangler@3.19.0`. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle's source maps. ### Workarounds Configure Wr
Cloudflare Wrangler directory traversal vulnerability
### Impact The Wrangler command line tool (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server. ### Patches Wrangler2: Upgrade to v2.20.1 or higher. Wrangler3: Upgrade to v3
Click any tool to inspect its schema.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in ai-ml
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
An open-source AI agent that brings the power of Gemini directly into your terminal.
Workspace template + MCP server for Claude Code, Codex CLI, Cursor & Windsurf. Multi-agent knowledge engine (ag-refresh / ag-ask) that turns any codebase into a queryable AI assistant.
MCP Security Weekly
Get CVE alerts and security updates for io.github.Jthora/archangel-agency-mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
MCP server for Archangel Agency — query ontological research, Universal Language briefings, Context JSON frameworks, and the A2A agent card.
Live endpoint: https://archangel-agency-mcp.jordan-trana.workers.dev/mcp
| Tool | Description | Free |
|---|---|---|
get_service_catalog | Machine-readable service catalog (services, pricing, payment methods) | Yes |
get_universal_language_briefing | Universal Language research briefing (summary or full depth) | Summary: Yes, Full: Premium |
get_context_jsons | 8 ontological framework documents from the FusionGirl wiki | List: Yes, Specific: Premium |
get_agent_info | A2A agent card (skills, capabilities, payment, contact) | Yes |
Add to your MCP client config (Claude Desktop, Cursor, Windsurf, etc.):
{
"mcpServers": {
"archangel-agency-mcp": {
"url": "https://archangel-agency-mcp.jordan-trana.workers.dev/mcp"
}
}
}
No API key needed. No installation required. It's a remote HTTP server.
Clone and deploy to your own Cloudflare account:
git clone https://github.com/Jthora/archangel-agency-mcp.git
cd archangel-agency-mcp
npx wrangler deploy
Set the site URL variable in wrangler.toml to point to your own site if forking.
The get_context_jsons tool serves structured ontological frameworks from the FusionGirl wiki:
archangel_agency — Archangel Agency LLC contextfusiongirl_overview — FusionGirl game overviewsolar_cycle_25 — Plan context for Solar Cycle 25technofeudalism — TechnoFeudalism contextplan_2024 — 2024.5 Plan Summaryplan_supplement — 2024.5 Supplemental Support Planrequired_jsons — List of required JSONs for comprehensive planningplan_template — Plan templateCall with context="list" to get the full directory, or specify a key to fetch directly.
Premium tools are gated behind the x402 protocol for USDC micropayments on Base. Currently active.
0x833589fCD6eDb6E08f4c7C32D4f71b1566469c3d)To self-host with x402, set CDP_API_KEY_ID and CDP_API_KEY_SECRET as Wrangler secrets via npx wrangler secret put.
MIT