Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"email": {
"env": {
"EMAIL_DOMAIN": "company.com",
"DEFAULT_PROVIDER": "autonomous"
},
"args": [
"-y",
"emailmcp"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Your own email infrastructure. One MCP command provisions a cloud VPS, WireGuard tunnel, DKIM/SPF/DMARC, Let's Encrypt TLS, and authoritative DNS. No third-party email provider needed.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y 'cp' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
Checked cp against OSV.dev.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in communication / ai-ml
Persistent memory using a knowledge graph
An MCP server that securely interfaces with your iMessage database via the Model Context Protocol (MCP), allowing LLMs to query and analyze iMessage conversations. It includes robust phone number validation, attachment processing, contact management, group chat handling, and full support for sending and receiving messages.
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
An open-source AI agent that brings the power of Gemini directly into your terminal.
MCP Security Weekly
Get CVE alerts and security updates for io.setip/emailmcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Self-hosted SendGrid — powered by AI.
Your own email infrastructure. One MCP command provisions a cloud VPS, WireGuard tunnel, DKIM/SPF/DMARC, Let's Encrypt TLS, and authoritative DNS. No third-party email provider needed.
Or use it as a universal email client with 9 providers. Your choice.
Autonomous Mode • Provider Mode • Rules Engine • Install • API Docs
You: "Set up my email server"
AI: Creating OVH VPS in GRA11... done. IP: 51.38.x.x
WireGuard config saved. Run: sudo wg-quick up ~/.emailmcp/wg-email.conf
You: [connects WireGuard]
You: "Resume setup"
AI: Tunnel verified. Add these 2 DNS records at your registrar:
NS emailrelay.xyz → ns1.emailrelay.xyz
A ns1.emailrelay.xyz → 51.38.x.x
You: [adds DNS records]
You: "Resume setup"
AI: DNS propagated. TLS cert obtained. SMTP verified.
Your email server is live.
You: "Add company.com as a sending domain"
AI: DKIM keys generated. Add these 4 records to company.com:
MX company.com → mail.company-com.emailrelay.xyz
TXT company.com → v=spf1 include:company-com.emailrelay.xyz -all
CNAME emailmcp._domainkey.company.com → emailmcp._domainkey.company-com.emailrelay.xyz
TXT _dmarc.company.com → v=DMARC1; p=reject; adkim=s; aspf=s
You: "Send hello@company.com a welcome email"
AI: Sent. DKIM ✅ SPF ✅ DMARC ✅
What you get:
-all) — only your IP authorizedadkim=s; aspf=s)