Self-custodial crypto portfolio: read EVM DeFi, sign on Ledger via WalletConnect.
{
"mcpServers": {
"io-github-szhygulin-vaultpilot-mcp": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Self-custodial crypto portfolio: read EVM DeFi, sign on Ledger via WalletConnect.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Commit history unknown.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Self-custodial crypto portfolio and DeFi, managed by AI agents — signed on your Ledger hardware wallet.
VaultPilot MCP is a Model Context Protocol server that lets AI agents — Claude Code, Claude Desktop, Cursor, and any MCP-compatible client — read your on-chain positions across Ethereum, Arbitrum, Polygon, Base, and TRON and prepare EVM transactions that you sign on your Ledger device via WalletConnect. Your private keys never leave the hardware wallet, and every transaction is previewed in human-readable form before you approve it on the device.
Supported protocols: Aave V3, Compound V3 (Comet), Morpho Blue, Uniswap V3 LP, Lido (stETH/wstETH), EigenLayer, plus LiFi for swap/bridge aggregation and 1inch for optional intra-chain quote comparison.
Use it when you want to:
This is an agent-driven portfolio management tool, not a wallet replacement. The MCP never holds keys or broadcasts anything you haven't approved on your Ledger device.
bestSource hint and output-delta savingsThe signing pipeline crosses several independent trust boundaries, each of which can be compromised in isolation:
user-intent ──► agent ──► MCP server ──► WalletConnect / USB-HID ──► Ledger Live / host ──► Ledger device
The Ledger device is the only component whose display the user sees directly (not filtered through the agent) and which cannot be software-compromised at the host level. Everything else can fail. VaultPilot's defenses are layered so that most single-layer compromises are caught, single-layer compromises are caught by at least one cross-check, and coordinated multi-layer attacks are either caught or honestly called out as unprotected.
| Layer | Threat it catches | Honest limits |
|---|---|---|
Prepare↔send payloadFingerprint — |
No automated test available for this server. Check the GitHub README for setup instructions.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationNo known vulnerabilities.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Real-time financial market data: stocks, forex, crypto, commodities, and economic indicators
An MCP server for Massive.com Financial Market Data
MCP server for Financial Modeling Prep API with 250+ financial data tools
Non-custodial x402 payments for AI agents. Sign locally, spend limits, Base network.
MCP Security Weekly
Get CVE alerts and security updates for io.github.szhygulin/vaultpilot-mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.