phishclean-mcp
v1.1.0
Published
MCP server for PhishClean security analysis tools — check URLs, passwords, emails, headers, JWTs, and source code for security issues
Downloads
317
Maintainers
Readme
phishclean-mcp
MCP server for PhishClean security analysis tools. Works with Claude Desktop, Claude Code, Gemini CLI, and any MCP-compatible client.
Quick Start
npx phishclean-mcpClaude Desktop Setup
Add to your claude_desktop_config.json:
{
"mcpServers": {
"phishclean": {
"command": "npx",
"args": ["-y", "phishclean-mcp"]
}
}
}Config file location:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json - Windows:
%APPDATA%\Claude\claude_desktop_config.json
Tools
| Tool | Description |
|------|-------------|
| check_link | Check a URL for phishing signals (domain spoofing, suspicious TLDs, token leaks) |
| check_password | Analyze password strength (entropy, crack time, common patterns) |
| check_email | Detect phishing in email body text (urgency, threats, credential requests) |
| analyze_headers | Check email headers for SPF/DKIM/DMARC and spoofing |
| decode_jwt | Decode JWT and flag security issues (expired, alg:none, sensitive data) |
| scan_secrets | Scan code for leaked API keys (AWS, Stripe, GitHub, Google, etc.) |
| scan_page | Full page scan — 12 phishing signals on HTML source |
Examples
Once configured, ask Claude:
- "Check if this URL is safe: https://paypal-secure.xyz/login"
- "How strong is the password Summer2024!?"
- "Is this email phishing? Dear customer, verify your account..."
- "Scan this code for leaked secrets: const key = AKIA..."
- "Decode this JWT: eyJhbGci..."
API Key (Optional)
Free tier: 30 requests/hour (no key needed).
For higher limits, get an API key at phishclean.com/developers:
| Tier | Rate Limit | Price | |------|-----------|-------| | Free | 30 req/hr | $0 | | Pro | 2,000 req/hr | $19/mo | | Business | 25,000 req/hr | $49/mo | | Enterprise | Unlimited | $700/yr |
Set your API key via environment variable:
{
"mcpServers": {
"phishclean": {
"command": "npx",
"args": ["-y", "phishclean-mcp"],
"env": {
"PHISHCLEAN_API_KEY": "pk_live_your_key_here"
}
}
}
}Or via shell:
PHISHCLEAN_API_KEY=pk_live_your_key_here npx phishclean-mcpAPI
All tools call the PhishClean API at https://www.phishclean.com/api/v1/.
Override the base URL with:
PHISHCLEAN_API_URL=http://localhost:3000 npx phishclean-mcp