{
"mcpServers": {
"utd-nebula": {
"args": [],
"command": "/absolute/path/to/utd-nebula-api-mcp-server/utd-mcp-server.exe"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Is it safe?
No known CVEs for @modelcontextprotocol/inspector. 2 previously resolved.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 82 days ago. 126,852 weekly downloads.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Context cost
2 tools. ~100 tokens (0.1% of 200K).
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y '@modelcontextprotocol/inspector' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
No open vulnerabilities. 2 fixed CVEs.
get_course_sectionsFetches official UTD course information including sections, course descriptions, schedules, and prerequisites from Nebula API
get_professor_reviewsRetrieves detailed professor metadata from RateMyProfessors including ratings, difficulty scores, 'Would Take Again' percentage, reviews, and tags
Course SearchSearch for courses by topic and semester
Professor ComparisonCompare professors teaching the same course by difficulty and ratings
Deep DiveGet detailed information about a professor's requirements and recent student reviews
Schedule PlanningFind courses that fit specific day and time requirements
This server is missing a description.If you've used it, help the community.
Add informationCVE-2025-58444FixedMCP Inspector is Vulnerable to Potential Command Execution via XSS When Connecting to an Untrusted MCP Server
An XSS flaw exists in the MCP Inspector local development tool when it renders a redirect URL returned by a remote MCP server. If the Inspector connects to an untrusted server, a crafted redirect can inject script into the Inspector context and, via the built-in proxy, be leveraged to trigger arbitrary command execution on the developer machine. Version 0.16.6 hardens URL handling/validation and prevents script execution. > Thank you to the following researchers for their reports and contributi
CVE-2025-49596FixedMCP Inspector proxy server lacks authentication between the Inspector client and proxy
Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities. Credit: Rémy Marot <bughunters@tenable.com>
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for Utd Courses Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A Model Context Protocol (MCP) server that bridges LLMs with University of Texas at Dallas course data and RateMyProfessors ratings.
This project implements an MCP Server designed to empower UTD students and faculty by connecting Large Language Models (LLMs) like Claude or ChatGPT to real-time university data.
Finding the right class and the right professor typically involves juggling multiple tabs: CourseBook for schedules, Nebula for details, and RateMyProfessors for reviews. This tool unifies that experience. You can simply ask your AI assistant:
"Who is the highest-rated professor teaching Artificial Intelligence next semester?" "Find me an easy 3000-level elective in the CS department."
This server follows the Model Context Protocol (MCP) standard.
get_course_sections and get_professor_reviews.# Clone the repository
git clone https://github.com/lalipop05/utd-nebula-api-mcp-server.git
cd utd-nebula-api-mcp-server
# Install dependencies
go mod download
# Build the binary
go build -o utd-mcp-server ./cmd/server/main.go
You can test the MCP server using the MCP Inspector:
npx @modelcontextprotocol/inspector go run ./cmd/server/main.go
Create a .env file in the root directory or set environment variables directly. Set PATH_TO_ENV in main.go to be the absolute path to your .env file
# Example .env configuration
NEBULA_API_KEY=your_nebula_api_key_here
For the most up to date information on how to connect this server to Claude Deskop, consult official MCP website
To use this with the Claude Desktop app, add the following to your claude_desktop_config.json:
{
"mcpServers": {
"utd-nebula": {
"command": "/absolute/path/to/utd-nebula-api-mcp-server/utd-mcp-server.exe",
"args": []
}
}
}
Run the server executable directly. It communicates over Stdio (Standard Input/Output) by default, fully compliant with the MCP specification.
Once connected, your LLM gains "knowledge" of UTD. You can ask:
cmd/: Entry point for the application.
internal/nebula/: Client and logic for interacting with UTD Nebula API.
internal/rmp/: Logic for RateMyProfessors GraphQL queries.
data/: GraphQL templates and constants.