Squads MCP
A secure MCP implementation for Squads multisig management on the Solana blockchain.
Squads MCP: Secure Multisig Management for Solana
A secure Model Context Protocol (MCP) implementation for Squads multisig management on Solana blockchain. This toolkit prioritizes security at every step while enabling LLMs to safely interact with multisig accounts.
š Security-First Design
Squads MCP implements multiple security layers to protect your assets and multisig operations:
- Local Private Key Storage: Keys never leave your device, unlike web wallets or browser extensions
- Permission Separation: Distinct INITIATE, EXECUTE, and VOTE roles prevent single-point compromise
- Time Lock Support: Configure mandatory waiting periods before sensitive transactions execute
- Comprehensive Security Auditing: Built-in
AUDIT_MULTISIG_SECURITY
tool scores your configuration - Security-Focused Schemas: Every tool includes explicit security warnings and verification steps
- Threshold Recommendations: Smart defaults for different multisig types (Reserve, Operations, etc.)
- Secure Connection Management: Easily switch between networks for testing and production
š Features
Multisig Management
- Create new multisig accounts with customizable permissions
- Import existing multisig accounts
- Audit multisig security with detailed recommendations
- Configure thresholds, permissions, and time locks
Transaction Handling
- Create and manage proposals
- Vote on proposals (approve/reject)
- Execute approved transactions
- Cancel pending proposals
Asset Management
- View SOL and token balances in vaults
- Transfer SOL from vaults
- Fund vaults
š”ļø Security Best Practices
The implementation promotes Squads security best practices:
-
Separation of Duties:
- Keep INITIATE and EXECUTE roles separate
- Avoid giving ALL permissions to any member
-
Proper Thresholds:
- For Reserve multisigs: 6+ members, 4+ threshold
- For Program Upgrade multisigs: 6+ members, 4+ threshold
- For Operations multisigs: 3+ members, 2+ threshold
-
Time Locks:
- Reserve: 3600+ seconds (1 hour)
- Program Upgrade: 600+ seconds (10 minutes)
- Operations: 300+ seconds (5 minutes)
š§ How It Works
This project leverages the Model Context Protocol (MCP) to enable secure interaction between LLMs and Squads multisig functionality. MCP provides a standardized way for AI models to use external tools while maintaining security and context.
āāāāāāāāāāā āāāāāāāāāāāāāāāā āāāāāāāāāāāāāā āāāāāāāāāā
ā LLM ā<-->ā MCP Protocol ā<-->ā Squads MCP ā<-->ā Solana ā
āāāāāāāāāāā āāāāāāāāāāāāāāāā āāāāāāāāāāāāāā āāāāāāāāāā
š Getting Started
Prerequisites
- Node.js v16+
- Solana CLI tools (optional)
- A Solana wallet (preferably a hardware wallet for production use)
Installation
Option 1: From NPM (Recommended)
# Using npm
npm install squads-mcp
# Using yarn
yarn add squads-mcp
# Using pnpm
pnpm add squads-mcp
Option 2: From Source
git clone https://github.com/dorkydhruv/squads-mcp.git
cd squads-mcp
pnpm install
pnpm build
Configuration for claude_desktop_config.json
{
"mcpServers": {
"squads-mcp": {
"command": "node",
"args": [
"node_modules/squads-mcp/dist/index.js" // If installed from npm
// OR use "/ABSOLUTE/PATH/TO/YOUR/MCP/PROJECT/FILE" if built from source
]
}
}
}
š Available Tools
Configuration Tools
CONNECTION_UPDATE
: Set Solana connectionSHOW_CONFIG
: Display current configuration
Squads Multisig Tools
CREATE_SQUADS_MULTISIG
: Create a new multisigIMPORT_SQUADS_MULTISIG
: Import existing multisigGET_MULTISIG_ACCOUNT
: View multisig detailsAUDIT_MULTISIG_SECURITY
: Security audit with recommendations
Proposal Management
CREATE_PROPOSAL
: Create a new proposalAPPROVE_PROPOSAL
: Vote to approve a proposalREJECT_PROPOSAL
: Vote to reject a proposalCANCEL_PROPOSAL
: Cancel a pending proposalGET_PROPOSAL
: View a specific proposalGET_PROPOSALS
: List all proposals
Transaction Execution
EXECUTE_CONFIG_TRANSACTION
: Execute configuration changesEXECUTE_VAULT_TRANSACTION
: Execute vault transactions
Asset Management
GET_ASSETS
: View assets in a multisig vaultFUND_VAULT
: Send SOL to a vaultTRANSFER_SOL_FROM_VAULT
: Send SOL from a vault
š ļø Security Audit Tool: Technical Deep Dive
The AUDIT_MULTISIG_SECURITY
tool provides enterprise-grade security analysis of Squads multisig configurations:
Technical Implementation
- Quantitative Security Scoring: Implements a multi-dimensional security algorithm (0-100) evaluating 15+ risk factors including threshold ratios, permission structures, and time lock durations
- Automated Vulnerability Detection: Scans for common security misconfigurations including single-point failures, inadequate thresholds, and insufficient time locks
- Role-Based Access Control Analysis: Evaluates separation of duties across INITIATE, EXECUTE, and VOTE permissions, flagging cases where excessive permissions are concentrated
- Risk Assessment Matrix: Categorizes findings into Critical, High, Medium, and Low severity with color-coded outputs and remediation recommendations
Security Features
- Threshold Optimization Engine: Calculates optimal threshold settings based on multisig purpose, member count, and asset value exposure
- Time Lock Validation: Enforces minimum time lock periods calibrated to risk profiles (1+ hour for Reserve, 10+ minutes for Upgrades, etc.)
- Configuration Hardening: Generates specific security-hardening recommendations with implementation instructions
- Compliance Verification: Checks configurations against industry best practices for Solana multisig management
- JSON Export: Provides machine-readable output for integration with security monitoring systems
The tool was developed using TypeScript with specialized cryptographic validation routines and a proprietary scoring algorithm based on blockchain security research.
š Security Recommendations
- Always verify addresses: Double-check multisig addresses before operations
- Follow the two-minute rule: Wait at least 2 minutes after approvals before executing critical transactions
- Run regular security audits: Use
AUDIT_MULTISIG_SECURITY
after any configuration changes - Implement proper access control: Separate proposal creation from execution roles
- Use secure devices: Perform sensitive operations on dedicated, secure devices
- Consider transaction simulation: Test critical transactions in a safe environment first
š§© Protocol Overview: Model Context Protocol (MCP)
This project is built on the Model Context Protocol (MCP), an open protocol for secure, context-aware automation and agent workflows. MCP enables tools and agents (including LLMs) to interact with user data and actions in a controlled, auditable, and privacy-preserving way. By leveraging MCP, Squads MCP ensures that all tool invocations are contextually validated and logged, reducing the risk of unauthorized or unintended actions.
š„ Live Demos
MCP in Claude Desktop App
MCP in GitHub Copilot
š”ļø Additional Security Considerations
- No Third-Party Custody: All private keys are managed and stored locally. There is no cloud sync, remote backup, or third-party custody, minimizing the risk of remote compromise.
- Direct Solana RPC Usage: All blockchain interactions are performed directly from your environment, with no intermediaries or delegated signing. Only the locally stored private key is used for signing transactions, and only with explicit user action.
- Transparency and Auditability: Tools like
SHOW_CONFIG
,GET_MULTISIG_ACCOUNT
, andGET_PROPOSALS
provide full visibility into your configuration, multisig state, and proposal history, supporting transparency and review. - Explicit Security Warnings: Tool schemas and prompts include explicit warnings and verification steps (e.g., "Double-check this address").
- Operational Security Guidance: The built-in audit tool provides actionable recommendations, such as using hardware wallets, segmenting treasuries, and rotating keys. Time lock checks enforce best practices for critical accounts.
- No Implicit Actions: All actions require explicit invocation and confirmation, reducing the risk of accidental or automated misuse.
- Minimal Attack Surface: The codebase is designed to minimize dependencies and avoid unnecessary network exposure. Only essential ports and endpoints are enabled.
š§āš» Developer Notes
- All tools are registered in index.ts and exposed via the MCP server.
- The codebase is modular, making it easy to extend with new tools or adapt to future MCP or Squads protocol updates.
- Security is a process: regularly review, audit, and update your configuration and dependencies.
š Additional Resources
Related Servers
Manim MCP Server
Executes Manim Python scripts to generate and return rendered video animations.
QGIS
connects QGIS Desktop to Claude AI through the MCP. This integration enables prompt-assisted project creation, layer loading, code execution, and more.
MCP Hot-Reload
A Hot Module Replacement (HMR) proxy server for MCP servers that automatically restarts on file changes, buffers messages, and manages connections.
Context 7
Up-to-date Docs For Any Cursor Prompt
Debugg AI
Enable your code gen agents to create & run 0-config end-to-end tests against new code changes in remote browsers via the Debugg AI testing platform.
Node.js Sandbox MCP Server
Run arbitrary JavaScript in an isolated Docker container with on-the-fly npm dependency installation.
MCPfinder
A Node.js server for AI agents to discover, install, and manage new capabilities on demand via the MCP protocol.
ShellAgent
An MCP server for executing shell commands, requiring Node.js 18 or newer.
MCP Time Server
Provides tools for getting the current time and date, and formatting timestamps in various formats and timezones.
s&box MCP Server
Enables AI assistants to interact with s&box game objects and components via WebSocket communication.