Intelligent token optimization achieving 95%+ reduction through caching, compression, and 80+ tools
{
"mcpServers": {
"io-github-ooples-token-optimizer-mcp": {
"args": [
"-y",
"semantic-release"
],
"command": "npx"
}
}
}Intelligent token optimization achieving 95%+ reduction through caching, compression, and 80+ tools
Is it safe?
No known CVEs for semantic-release. 2 previously resolved.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 5 days ago. 42 stars. 2,397,260 weekly downloads.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y 'semantic-release' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationNo open vulnerabilities. 2 fixed CVEs.
CVE-2022-31051FixedExposure of Sensitive Information to an Unauthorized Actor in semantic-release
### Impact _What kind of vulnerability is it? Who is impacted?_ Secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by [encodeURI](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI). Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject credentials. ##
CVE-2020-26226FixedSecret disclosure when containing characters that become URI encoded
### Impact Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. ### Patches Fixed in v17.2.3 ### Workarounds Secrets that do not contain characters that become encoded when included in a URL are already masked properly.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.