Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"io-github-plagtech-spraay-solana-gateway": {
"args": [
"-y",
"@modelcontextprotocol/sdk"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
x402-powered batch payment infrastructure for AI agents on Solana.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y '@modelcontextprotocol/sdk' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
@modelcontextprotocol/sdk has cross-client data leak via shared server/transport instance reuse
### Summary Cross-client data leak via two distinct issues: (1) reusing a single `StreamableHTTPServerTransport` across multiple client requests, and (2) reusing a single `McpServer`/`Server` instance across multiple transports. Both are most common in stateless deployments. ### Impact This advisory covers two related but distinct vulnerabilities. A deployment may be affected by one or both. #### Issue 1: Transport re-use **What happens:** When a single `StreamableHTTPServerTransport` insta
Anthropic's MCP TypeScript SDK has a ReDoS vulnerability
### Impact A ReDoS vulnerability in the `UriTemplate` class allows attackers to cause denial of service. The `partToRegExp()` function generates a regex pattern with nested quantifiers (`([^/]+(?:,[^/]+)*)`) for exploded template variables (e.g., `{/id*}`, `{?tags*}`), causing catastrophic backtracking on malicious input. **Who is affected:** MCP servers that register resource templates with exploded array patterns and accept requests from untrusted clients. **Attack result:** An attacker sen
Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default
The Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with `StreamableHTTPServerTransport` or `SSEServerTransport` and has not enabled `enableDnsRebindingProtection`, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access re
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in finance
Real-time financial market data: stocks, forex, crypto, commodities, and economic indicators
A Model Context Protocol (MCP) server that provides AI assistants with direct access to the Spreedly payments API. Enables LLMs to manage gateways, process transactions, tokenize payment methods, and more, through structured, validated tool calls.
MCP server for InsightSentry financial data API - market data, options, screeners, and more
AI agents get on-chain identity, credentials, reputation, escrow, and persistent memory on XRPL.
MCP Security Weekly
Get CVE alerts and security updates for Spraay Solana Gateway MCP Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
x402-powered batch payment infrastructure for AI agents on Solana.
Any AI agent can batch send SOL, USDC, BONK, or any SPL token to 1,000+ wallets via the x402 payment protocol. No API keys. No accounts. Pay per request.
AI Agent (any framework)
│
├── HTTP Request
│
▼
┌──────────────────────────────────────────┐
│ Spraay Solana Gateway │
│ gateway-solana.spraay.app │
│ │
│ @x402/express + @x402/svm │
│ ┌─────────────┐ ┌──────────────┐ │
│ │ x402 Payment│ │ Solana Batch │ │
│ │ Middleware │ │ Engine │ │
│ └──────┬──────┘ └──────┬───────┘ │
│ │ │ │
│ ▼ ▼ │
│ USDC payment Execute batch │
│ verified via SOL/SPL transfers │
│ facilitator │
└──────────────────────────────────────────┘
│
▼
Solana Network
| Endpoint | Method | Price | Description |
|---|---|---|---|
/solana/batch-send-sol | POST | $0.01 | Batch send SOL to multiple wallets |
/solana/batch-send-token | POST | $0.01 | Batch send any SPL token |
/solana/quote | GET | $0.001 | Get cost estimate |
/solana/status/:txid | GET | $0.001 | Check transaction status |
/health | GET | Free | Health check |
/.well-known/x402 | GET | Free | x402 discovery manifest |
git clone https://github.com/plagtech/spraay-solana-gateway.git
cd spraay-solana-gateway
npm install
cp .env.example .env
# Edit .env with your treasury wallet and private key
npm run dev # development (auto-reload)
npm start # production
curl -X POST https://gateway-solana.spraay.app/solana/batch-send-sol \
-H "Content-Type: application/json" \
-H "X-PAYMENT: <base64 payment proof>" \
-d '{
"recipients": [
{ "address": "9WzDXwBbmkg8ZTbNMqUxvQRAyrZzDsGYdLVL9zYtAWWM", "amount": 0.01 },
{ "address": "7S3P4HxJpyyigGzodYwHtCxZyUQe9JiBMHyLWP9SfKFJ", "amount": 0.02 }
]
}'
curl -X POST https://gateway-solana.spraay.app/solana/batch-send-token \
-H "Content-Type: application/json" \
-H "X-PAYMENT: <base64 payment proof>" \
-d '{
"mint": "DezXAZ8z7PnrnRJjz3wXBoRgixCa6xjnB7YaB1pPB263",
"recipients": [
{ "address": "9WzDXwBbmkg8ZTbNMqUxvQRAyrZzDsGYdLVL9zYtAWWM", "amount": 1000 },
{ "address": "7S3P4HxJpyyigGzodYwHtCxZyUQe9JiBMHyLWP9SfKFJ", "amount": 500 }
]
}'
curl "https://gateway-solana.spraay.app/solana/quote?recipients=100&token=BONK"
402 Payment Required with Solana USDC payment instructionsX-PAYMENT headerSupported facilitators:
https://x402.org/facilitatorhttps://facilitator.payai.network (PayAI — free tx fees)The gateway includes an MCP server for AI agent framework integration:
# Install MCP SDK
npm install @modelcontextprotocol/sdk
# Run MCP server
node mcp/spraay-solana-mcp.js
Tools available:
spraay_solana_batch_send_sol — Batch send SOLspraay_solana_batch_send_token — Batch send SPL tokensspraay_solana_quote — Cost estimationspraay_solana_tx_status — Transaction lookupplagtech/spraay-solana-gateway