@trycleario/mcp-server
v0.2.0
Published
TryClear MCP server — exposes image threat analysis as tools for Claude Code and MCP-compatible agents
Maintainers
Readme
TryClear MCP Server
A picture is worth a thousand words. Attackers know that. Your security tools don't.
TryClear. Evaluate Images.
Setup
Create a free account at tryclear.io and grab your API key from Settings.
One command — installs Clear and stores your API key permanently:
claude mcp add tryclear --scope user --env TRYCLEAR_API_KEY=sk_live_your_key_here -- npx -y @trycleario/mcp-server- Drag and drop any image into Claude Code and say:
Evaluate this image with ClearThat's it. Clear is now available in every project, every session. You'll never have to configure it again.
Tools
| Tool | Input | What It Does | |------|-------|-------------| | tryclear_evaluate_image | Local file path | Reads image, submits for analysis, returns markdown narrative + structured JSON | | tryclear_evaluate_url | Image URL | Downloads remote image, submits, returns markdown narrative + structured JSON | | tryclear_get_report | Analysis ID | Fetches full 6-section forensic report |
Response Format
The eval tools (tryclear_evaluate_image and tryclear_evaluate_url) return two content blocks:
- Markdown narrative — human/agent-readable verdict with URL evidence, brand detection, and MITRE techniques
- Structured JSON — 14-field contract for scripts and integrations
See BREAKING_CHANGES.md for migration details from 0.1.x.
Example Prompts
- Drag and drop an image into Claude Code, then: "Evaluate this image with Clear"
- "Evaluate this image with Clear: ~/Downloads/screenshot.png"
- "Check this image with Clear: https://example.com/banner.png"
- "Get the full Clear report for ana_5a08c6lnqplj"
Supported Formats
PNG, JPG, JPEG, BMP, TIFF, SVG, WebP, HEIC/HEIF
Auth
The server resolves your API key in this order:
CLEAR_API_KEYenvironment variableTRYCLEAR_API_KEYenvironment variable~/.config/clear/config.json~/.config/tryclear/config.json
