SafeDep
Real-time malicious package protection for AI coding agents
Documentation Index
Fetch the complete documentation index at: https://docs.safedep.io/llms.txt Use this file to discover all available pages before exploring further.
Model Context Protocol Server
SafeDep cloud hosted MCP server
SafeDep offers a cloud hosted Model Context Protocol (MCP) server for integrating malicious package feeds into AI Agents and IDEs. This integration enables AI Agents to continue working autonomously while protected against malicious open source packages.
Endpoints
| Endpoint | Description |
|---|---|
https://mcp.safedep.io/model-context-protocol/threats/v1/mcp | SafeDep MCP endpoint (HTTP) |
https://mcp.safedep.io/model-context-protocol/threats/v1/sse | Legacy SSE endpoint |
Authentication
The MCP server requires SafeDep API key based authentication. Following HTTP headers are required:
| Header | Description |
|---|---|
Authorization | <API Key> |
X-Tenant-ID | your-tenant-domain (e.g. default-team.your-domain.safedep.io) |
Quick Start
Navigate to [app.safedep.io](https://app.safedep.io/) and sign up Create an API key for use with the MCP server from your SafeDep Cloud [tenant settings](https://app.safedep.io/settings/api-keys) Configure the MCP server with your API key and tenant domain in your favorite IDE or AI Agent (see [Setup](#setup) for more details). Verify the setup by asking your coding agent to install a [test package](#testing). The agent should block it as malicious.Setup
Use `claude` CLI to add the MCP server to your user settings. This configuration will be available across all Claude Code projects.```bash theme={null}
claude mcp add -s user --transport http safedep \
https://mcp.safedep.io/model-context-protocol/threats/v1/mcp \
--header "Authorization: <API Key>" \
--header "X-Tenant-ID: <Tenant Domain>"
```
Add the SafeDep MCP server to your Cursor configuration. Create or edit `~/.cursor/mcp.json` in your home directory:
```json theme={null}
{
"mcpServers": {
"safedep": {
"url": "https://mcp.safedep.io/model-context-protocol/threats/v1/mcp",
"headers": {
"Authorization": "<API Key>",
"X-Tenant-ID": "<Tenant Domain>"
}
}
}
}
```
Restart Cursor after saving the configuration. You can verify the server connection in **Cursor Settings > MCP Servers**.
See the [Cursor MCP documentation](https://cursor.com/docs/context/mcp) for more details.
Add the SafeDep MCP server to your Codex configuration. Edit `~/.codex/config.toml` (or `.codex/config.toml` in your project root for project-scoped access):
```toml theme={null}
[mcp_servers.safedep]
url = "https://mcp.safedep.io/model-context-protocol/threats/v1/mcp"
[mcp_servers.safedep.env_http_headers]
"Authorization" = "SAFEDEP_API_KEY"
"X-Tenant-ID" = "SAFEDEP_TENANT_ID"
```
Set the environment variables with your credentials:
```bash theme={null}
export SAFEDEP_API_KEY="<API Key>"
export SAFEDEP_TENANT_ID="<Tenant Domain>"
```
See the [Codex MCP documentation](https://developers.openai.com/codex/mcp) for more details.
Add the SafeDep MCP server to your Gemini CLI configuration. Edit `~/.gemini/settings.json` in your home directory:
```json theme={null}
{
"mcpServers": {
"safedep": {
"httpUrl": "https://mcp.safedep.io/model-context-protocol/threats/v1/mcp",
"headers": {
"Authorization": "<API Key>",
"X-Tenant-ID": "<Tenant Domain>"
}
}
}
}
```
See the [Gemini CLI MCP documentation](https://geminicli.com/docs/tools/mcp-server/) for more details.
Add the SafeDep MCP server to your Windsurf configuration. Create or edit `~/.codeium/windsurf/mcp_config.json` in your home directory:
```json theme={null}
{
"mcpServers": {
"safedep": {
"url": "https://mcp.safedep.io/model-context-protocol/threats/v1/mcp",
"headers": {
"Authorization": "<API Key>",
"X-Tenant-ID": "<Tenant Domain>"
}
}
}
}
```
See the [Windsurf Cascade MCP documentation](https://docs.windsurf.com/windsurf/cascade/mcp) for more details.
Add the SafeDep MCP server to your Zed configuration. Create or edit `~/.config/zed/settings.json` in your home directory.
```json theme={null}
{
"context_servers": {
"safedep": {
"enabled": true,
"url": "https://mcp.safedep.io/model-context-protocol/threats/v1/mcp",
"headers": {
"Authorization": "<API Key>",
"X-Tenant-ID": "<Tenant Domain>"
}
}
}
}
```
See the [Zed MCP documentation](https://zed.dev/docs/ai/mcp) for more details.
Testing
After setting up the MCP server, you can verify the integration is working by asking your coding agent to install one of the following test packages:
| Package | Ecosystem |
|---|---|
safedep-test-pkg | npm |
safedep-test-pkg | PyPI |
These are harmless packages that are marked as malicious in the SafeDep database, specifically meant for testing. Your coding agent should block the installation and warn you about the package being flagged as malicious.
For example, try prompting your agent with:
Install the npm package safedep-test-pkg
If the MCP server is configured correctly, the agent will check the package against SafeDep's threat intelligence and refuse to install it.
Servidores relacionados
Wordle MCP - Go
Fetches daily Wordle solutions using the official Wordle API.
Upstox MCP server
A MCP server for integrating with the Upstox trading API by Upstox.
PiAPI
PiAPI MCP server makes user able to generate media content with Midjourney/Flux/Kling/Hunyuan/Udio/Trellis directly from Claude or any other MCP-compatible apps.
WattyEnergie MCP Server
Dutch energy comparison tools. Calculate costs, compare contracts, get dynamic EPEX prices.
CoinMarketCap MCP Server
Crypto prices, market caps, rankings, and token metadata via CoinMarketCap.
KnocksAndBans
Ask your AI assistant which players are injured or doubtful before this weekend's matches.
Etsy
A TypeScript-based MCP server for interacting with the Etsy API, featuring a simple notes system.
Trade Agent
Execute stock and crypto trades via Trade Agent
Draw-it MCP
An AI-powered drawing application for your browser. Draw, save, and get AI-powered insights.
Firebreak
Security MCP server that turns your AI into a penetration tester.