This MCP server provides email sending functionality using Protonmail's SMTP service. It allows both Claude Desktop and Cline VSCode extension to send emails on your behalf using your Protonmail credentials.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"protonmail-mcp": {
"args": [
"-y",
"npm"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
This MCP server provides email sending functionality using Protonmail's SMTP service. It allows both Claude Desktop and Cline VSCode extension to send emails on your behalf using your Protonmail credentials.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y 'npm' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
Packing does not respect root-level ignore files in workspaces
### Impact `npm pack` ignores root-level `.gitignore` & `.npmignore` file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` with workspaces, as of [v7.9.0](https://github.com/npm/cli/releases/tag/v7.9.0) & [v7.13.0](https://github.com/npm/cli/releases/tag/v7.13.0) respectively, may be affected and have published files into the npm registry they did not intend to include. ### Patch - Up
Incorrect Permission Assignment for Critical Resource in NPM
An issue was discovered in an npm 5.7.0 2018-02-21 pre-release (marked as "next: 5.7.0" and therefore automatically installed by an "npm upgrade -g npm" command, and also announced in the vendor's blog without mention of pre-release status). It might allow local users to bypass intended filesystem access restrictions because ownerships of /etc and /usr directories are being changed unexpectedly, related to a "correctMkdir" issue.
Local Privilege Escalation in npm
Affected versions of `npm` use predictable temporary file names during archive unpacking. If an attacker can create a symbolic link at the location of one of these temporary file names, the attacker can arbitrarily write to any file that the user which owns the `npm` process has permission to write to, potentially resulting in local privilege escalation. ## Recommendation Update to version 1.3.3 or later.
npm CLI exposing sensitive information through logs
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
npm Vulnerable to Global node_modules Binary Overwrite
Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This will not overwrite system binaries but only binaries put into the global node_modules directory. This b
Click any tool to inspect its schema.
This server is missing a description.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in communication / security
An MCP server that securely interfaces with your iMessage database via the Model Context Protocol (MCP), allowing LLMs to query and analyze iMessage conversations. It includes robust phone number validation, attachment processing, contact management, group chat handling, and full support for sending and receiving messages.
Asynchronous coordination layer for AI coding agents: identities, inboxes, searchable threads, and advisory file leases over FastMCP + Git + SQLite
An evil MCP server used for redteam testing
MCP server for Kaseya Autotask PSA — 39 tools for companies, tickets, projects, time entries, and more
MCP Security Weekly
Get CVE alerts and security updates for Protonmail Mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
This MCP server is provided by amotivv, inc., the creators of Memory Box.
This MCP server provides email sending functionality using Protonmail's SMTP service. It allows both Claude Desktop and Cline VSCode extension to send emails on your behalf using your Protonmail credentials.
This MCP server is compatible with:
The same implementation works across both platforms since they both use the Model Context Protocol (MCP) standard.
The server requires the following environment variables to be set in the MCP settings files for both Claude Desktop and Cline:
Located at: /Users/your-username/Library/Application Support/Claude/claude_desktop_config.json
Located at: /Users/your-username/Library/Application Support/Code/User/globalStorage/saoudrizwan.claude-dev/settings/cline_mcp_settings.json
Both configuration files require the following environment variables:
PROTONMAIL_USERNAME: Your Protonmail email addressPROTONMAIL_PASSWORD: Your Protonmail SMTP password (not your regular login password)PROTONMAIL_HOST: SMTP server hostname (default: smtp.protonmail.ch)PROTONMAIL_PORT: SMTP server port (default: 587 for STARTTLS, 465 for SSL/TLS)PROTONMAIL_SECURE: Whether to use a secure connection (default: "false" for port 587, "true" for port 465)DEBUG: Enable debug logging (set to "true" to see detailed logs, "false" to hide them)For detailed information about Protonmail's SMTP service, including how to get your SMTP password, please refer to the official Protonmail SMTP documentation.
Once configured, you can use the MCP server to send emails with the following tool:
Sends an email using your Protonmail SMTP account.
Parameters:
to: Recipient email address(es). Multiple addresses can be separated by commas.subject: Email subject linebody: Email body content (can be plain text or HTML)isHtml: (Optional) Whether the body contains HTML content (default: false)cc: (Optional) CC recipient(s), separated by commasbcc: (Optional) BCC recipient(s), separated by commasExample:
<use_mcp_tool>
<server_name>protonmail-mcp</server_name>
<tool_name>send_email</tool_name>
<arguments>
{
"to": "recipient@example.com",
"subject": "Test Email from Cline",
"body": "This is a test email sent via the Protonmail MCP server.",
"cc": "optional-cc@example.com"
}
</arguments>
</use_mcp_tool>
If you encounter issues with the MCP server, check the following:
To build the project:
cd protonmail-mcp
npm install
npm run build
To modify the server, edit the files in the src directory and rebui