A Model Context Protocol (MCP) server that enables AI assistants to search and analyze PubMed medical literature with advanced filtering, citations, and research tools.
{
"mcpServers": {
"pubmed-mcp": {
"args": [
"black"
],
"command": "uvx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
A Model Context Protocol (MCP) server that enables AI assistants to search and analyze PubMed medical literature with advanced filtering, citations, and research tools.
Is it safe?
No known CVEs for black. 2 previously resolved.
No authentication — any process on your machine can connect.
MIT. View license →
Is it maintained?
Last commit 295 days ago. 8 stars.
Will it work with my client?
Transport: stdio, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Context cost
7 tools. ~900 tokens (0.5% of 200K).
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
uvx 'black' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
No open vulnerabilities. 2 fixed CVEs.
search_pubmedSearch PubMed with advanced filtering options.
get_article_detailsGet detailed information for specific PMIDs.
search_by_authorSearch for articles by a specific author.
export_citationsExport citations in various formats.
find_related_articlesFind articles related to a specific PMID.
search_mesh_termsSearch using MeSH terms.
analyze_research_trendsAnalyze publication trends over time.
This server is missing a description.If you've used it, help the community.
Add informationCVE-2026-32274FixedBlack: Arbitrary file writes from unsanitized user input in cache file name
### Impact Black writes a cache file, the name of which is computed from various formatting options. The value of the `--python-cell-magics` option was placed in the filename without sanitization, which allowed an attacker who controls the value of this argument to write cache files to arbitrary file system locations. ### Patches Fixed in Black 26.3.1. ### Workarounds Do not allow untrusted user input into the value of the `--python-cell-magics` option.
CVE-2024-21503FixedPYSEC-2024-48
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Production ready MCP server with real-time search, extract, map & crawl.
Dynamic problem-solving through sequential thought chains
A Model Context Protocol server for searching and analyzing arXiv papers
Web and local search using Brave Search API
MCP Security Weekly
Get CVE alerts and security updates for Pubmed Mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.