{
"mcpServers": {
"YingDao RPA MCP Server": {
"env": {
"RPA_MODEL": "openApi",
"ACCESS_KEY_ID": "{your_access_key_id}",
"ACCESS_KEY_SECRET": "{your_access_key_secret}"
},
"args": [
"-y",
"yingdao-mcp-server"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
影刀RPA MCP Server
Is it safe?
No known CVEs for npm. 8 previously resolved.
No authentication — any process on your machine can connect.
MIT. View license →
Is it maintained?
Last commit 346 days ago. 74 stars. 12,125,497 weekly downloads.
Will it work with my client?
Transport: stdio, sse. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y 'npm' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationNo open vulnerabilities. 8 fixed CVEs.
CVE-2022-29244FixedPacking does not respect root-level ignore files in workspaces
### Impact `npm pack` ignores root-level `.gitignore` & `.npmignore` file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` with workspaces, as of [v7.9.0](https://github.com/npm/cli/releases/tag/v7.9.0) & [v7.13.0](https://github.com/npm/cli/releases/tag/v7.13.0) respectively, may be affected and have published files into the npm registry they did not intend to include. ### Patch - Up
CVE-2018-7408FixedIncorrect Permission Assignment for Critical Resource in NPM
An issue was discovered in an npm 5.7.0 2018-02-21 pre-release (marked as "next: 5.7.0" and therefore automatically installed by an "npm upgrade -g npm" command, and also announced in the vendor's blog without mention of pre-release status). It might allow local users to bypass intended filesystem access restrictions because ownerships of /etc and /usr directories are being changed unexpectedly, related to a "correctMkdir" issue.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for Yingdao_mcp_server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
CVE-2013-4116FixedLocal Privilege Escalation in npm
Affected versions of `npm` use predictable temporary file names during archive unpacking. If an attacker can create a symbolic link at the location of one of these temporary file names, the attacker can arbitrarily write to any file that the user which owns the `npm` process has permission to write to, potentially resulting in local privilege escalation. ## Recommendation Update to version 1.3.3 or later.
CVE-2020-15095Fixednpm CLI exposing sensitive information through logs
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
CVE-2019-16777Fixednpm Vulnerable to Global node_modules Binary Overwrite
Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This will not overwrite system binaries but only binaries put into the global node_modules directory. This b
CVE-2019-16776Fixednpm symlink reference outside of node_modules
Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user’s system when the package is installed. Only files accessible by the user running the `npm install` are affected.
CVE-2019-16775FixedArbitrary File Write in npm
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk
CVE-2016-3956Fixednpm Token Leak in npm
Affected versions of the `npm` package include the bearer token of the logged in user in every request made by the CLI, even if the request is not directed towards the user's active registry. An attacker could create an HTTP server to collect tokens, and by various means including but not limited to install scripts, cause the npm CLI to make a request to that server, which would compromise the user's token. This compromised token could be used to do anything that the user could do, including
影刀RPA:一个RPA低代码平台,一款人人可用的RPA自动化产品,能够将人从重复的劳动中解放出来。
影刀AI Power:一个AI低代码平台,能够快速创建AI智能体、AI工作流,帮助用户把AI用起来。
影刀 RPA MCP Server 基于 Model Context Protocol (MCP) 实现,为影刀AI Power及其他可作为MCP Host的工具(如 Claude Desktop、Cursor 等)提供调用RPA的能力。
同时支持SSE Server与Stdio Server两种模式。
支持两种方式来运行影刀RPA
设置环境变量 注意:本地模式下,智能获取并运行“我获取的应用”并已经被至少执行过一次的应用
RPA_MODEL=local
SHADOWBOT_PATH={your_shadowbot_path} //影刀rpa的exe路径
USER_FOLDER={your_user_folder} //影刀rpa的用户文件夹路径
Windows 注意:windows下在AI Power客户端中,路径要使用双斜杠
D://Program Files//{安装目录}//ShadowBot.exe
Mac
/Applications/影刀.app
在影刀RPA的设置中,找用户文件夹选项

设置环境变量
RPA_MODEL=openApi
ACCESS_KEY_ID={your_access_key_id}
ACCESS_KEY_SECRET={your_access_key_secret}
企业管理员登录影刀RPA控制台获取,请参考影刀RPA帮助文档-鉴权
在客户端中配置
{
"mcpServers": {
"YingDao RPA MCP Server": {
"command": "npx",
"args": ["-y", "yingdao-mcp-server"],
"env":{
"RPA_MODEL":"openApi",
"ACCESS_KEY_ID":"{your_access_key_id}",
"ACCESS_KEY_SECRET":"{your_access_key_secret}"
}
}
}
}
Clone the repository and build:
git clone https://github.com/ying-dao/yingdao_mcp_server.git
cd yingdao_mcp_server
npm install
npm run build
添加.env文件,配置项参考以上描述
npm run start:server
AI Power 客户端配置
{
"mcpServers": {
"YingDao RPA MCP Server": {
"url": "http://localhost:3000/sse",
"description": "影刀 MCP Server"
}
}
}
默认端口为3000
MIT