DASUCCESS/Web3-Trust-Guard-MCP-Server
If you are the rightful owner of Web3-Trust-Guard-MCP-Server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
Web3 Trust Guard is an MCP server designed to enhance AI capabilities in detecting scams, verifying donations, and protecting users across blockchain networks.
Web3 Trust Guard MCP Server
Introducing Web3 Trust Guard An MCP Server with 8 tools that help AI detect scams, verify donations, and protect users across blockchains.
A fully functional Model Context Protocol (MCP) server that allows AI agents to verify Web3 data in real-time — including token security, wallet risk, NFT authenticity, URL phishing detection, Solana transaction simulation, and on-chain donation validation.
Hosted at: https://mcp.fundmesolana.com Swagger Docs: https://mcp.fundmesolana.com/swagger/
Built for the DeMCP Side Track challenge to empower AI x Crypto innovation.
What This MCP Server Does
This server exposes 8 powerful tools that AI agents can use to analyze data on Ethereum, BNB, and Solana blockchains:
Tool Name | Description |
---|---|
check_token | Scan EVM token contracts for honeypot or scam risks |
check_wallet | Detect if a wallet is malicious, blacklisted, or risky |
check_nft | Analyze NFT contract + token ID for authenticity and risk |
check_url | Check if a dApp or website is flagged as phishing |
simulate_sol_tx | Simulate a Solana transaction to detect hidden dangers |
check_sol_token | Inspect Solana SPL tokens for scam indicators |
verify_donation | Confirm if a tx hash represents a donation to a verified address |
list_verified_causes | Return all trusted donation addresses (on-chain proof) |
MCP Tool Manifest Endpoint
AI agent platforms that support the Model Context Protocol (MCP) standard can dynamically discover and invoke these tools in real-time.
GET https://mcp.fundmesolana.com/api/mcp.json
This manifest allows any MCP-compatible AI system to call this server using structured, schema-defined functions.
How to Use This MCP Server With an AI Agent
Use any AI agent platform that supports external tools built with the MCP standard (e.g., LangChain, Auto-GPT, OpenAgents, etc).
- Load the Manifest
GET https://mcp.fundmesolana.com/mcp.json
- Prompt Example:
“Check if token
0x880bce9321c79cac1d290de6d31dde722c606165
on BNB (chain_id 56) is a scam.”
- Agent Automatically Calls:
POST /check_token/
{
"address": "0x880bce9321c79cac1d290de6d31dde722c606165",
"chain_id": 56
}
- Receives Response:
{
"success": true,
"data": {
"scam_risk": "0",
"raw": {...}
}
}
- Agent Interprets the Response:
“This token appears safe based on the analysis.”
Supported Chains
- Ethereum Mainnet (chain_id:
1
) - BNB Smart Chain (chain_id:
56
) - Solana (native, no chain ID)
Example Test Payloads
1. check_token
{ "address": "0x880bce9321c79cac1d290de6d31dde722c606165", "chain_id": 56 }
- Token:
$FREE
{ "address": "0x64c37c3d6b5ff0fdea26eec0c8b6de487105291c", "chain_id": 56 }
- Token:
ITHEUM
2. check_nft
{
"contract": "0xee24b9872022c7770CCC828d856224416CBa005f",
"token_id": "1",
"chain_id": 56
}
- NFT: Tribalpunk Hero
3. check_wallet
{ "address": "0x7bd75b1b8f2cfce01bd97b3661c0a2b78a4c6ca0", "chain_id": 56 }
- Includes approval & threat indicators
Perfect — here is your updated Section 4: check_url
for your README.md
, now enhanced with the new logic and test examples, ready for copy-paste:
Absolutely — here's the final, updated version of Section 4: check_url
for your README.md
, with everything included:
- Your latest detection logic
- Live phishing test examples
- Clear warning that detection status may change
- Links to real-time threat feed repos, including the OpenPhish GitHub URL you provided
4. check_url
The check_url
endpoint uses a multi-layered phishing detection strategy to analyze whether a website or dApp is flagged as malicious. It checks across several real-time threat intelligence systems, and the result includes:
is_phishing
: whether the URL is dangeroussource
: the system that flagged it (e.g.,google
,openphish
, etc.)note
: human-readable explanation
Detection Sources
Source | Type | Real-Time Feed Link |
---|---|---|
GoPlus API | Blockchain-focused security checks | GoPlus Labs |
Google Safe Browsing | Web phishing & malware detection | API Docs |
OpenPhish | Real-time phishing URL feed | feed.txt |
URLHaus | Malware & malicious domains | text |
PhishTank | Community-powered phishing database | XML |
This layered detection strategy ensures reliability. If one system misses a phishing URL, others might catch it.
Example Request
{ "url": "http://live-chat-binance.com/" }
Example Responses
Case 1: Flagged by Google Safe Browsing
{
"success": true,
"data": {
"is_phishing": true,
"source": "google",
"note": "Flagged as phishing by Google Safe Browsing"
}
}
Case 2: Flagged by Community Feeds
{
"success": true,
"data": {
"is_phishing": true,
"source": "openphish",
"note": "Flagged by phishing feed data (OpenPhish, URLhaus, or PhishTank)."
}
}
Case 3: Clean URL (No source flagged it)
{
"success": true,
"data": {
"is_phishing": false,
"source": "none-detected",
"note": "No phishing flags from GoPlus, Google, or feeds."
}
}
URLs You Can Use for Testing
URL | Likely Result |
---|---|
http://live-chat-binance.com/ | Flagged by OpenPhish |
http://testsafebrowsing.appspot.com/s/phishing.html | Flagged by Google Safe Browsing |
https://fundmesolana.com | Clean (expected false ) |
Important Note
The status of phishing URLs can change over time. If a phishing site is removed, cleaned, or re-hosted, it may no longer appear in threat feeds, and
check_url
will returnis_phishing: false
.
To manually verify if a domain is currently listed, you can check:
Donation Verification Protocol
We support real-time verification of donations made on-chain to verified causes, across multiple platforms.
To standardize participation, we have established a format external platforms must follow to integrate with this MCP server.
Accepted External Standard
Platforms wishing to integrate must expose a public endpoint like:
GET /api/verified-causes/
And return:
{
"count": 100,
"next": null,
"previous": null,
"results": [
{
"name": "Ali Surgery",
"address": "Gh9Z...",
"chain": "solana",
"chain_id": null,
"type": "emergency"
},
{
"name": "Flood Aid",
"address": "0x123...",
"chain": "evm",
"chain_id": 1,
"type": "emergency"
}
]
}
Current Accepted Platform for Donation
- FundMeSolana: https://fundmesolana.com
Our server automatically fetches and indexes donation addresses from approved sources like the one above.
Currently working on the MCP Tools plugin that can connect to ChatGpt
- Web3 Trust Guard MCP Server GPT Plugin: https://chatgpt.com/g/g-6824df145b30819185f9c12f16959d4a-web3-trust-guard-mcp-server
Still under testing and iterating.
External APIs Used
This MCP Server integrates multiple real-time security and blockchain APIs:
Provider | Purpose |
---|---|
GoPlus Labs | Scam token, wallet, NFT, and Solana checks |
Google Safe Browsing | Detect phishing, malware, and social threats |
OpenPhish | Community-driven phishing URL database |
URLHaus | Malware distribution URL detection |
PhishTank | Public phishing site feed |
Covalent API | EVM transaction and contract decoding |
Solana JSON-RPC | Transaction simulation and confirmation |
FundMeSolana | Verified donation addresses (Solana) |
How to Run Locally
git clone https://github.com/yourname/web3-mcp-server.git
cd web3-mcp-server
python -m venv env
source env/bin/activate # or env\Scripts\activate on Windows
pip install -r requirements.txt
Create .env
file:
GOPLUS_BASE=https://api.gopluslabs.io
COVALENT_KEY=your_covalent_api_key
VERIFIED_CAUSE_SOURCES=https://fundmesolana.com/api/emergency/verified_causes
Then run:
python manage.py migrate
python manage.py runserver
Access Swagger API Docs:
http://127.0.0.1:8000/swagger/
How to run the Web3 Trust Guard GUI Locally
I provided a GUI that supports tool selection, payload generation, Groq integration, and real-time output.
Requirements
Create your API Key here on GROQ CLOUD
pip install -r requirements.txt
Create .env
:
MCP_URL=https://mcp.fundmesolana.com/mcp.json
API_BASE=https://mcp.fundmesolana.com
GROQ_API_KEY=your_groq_api_key
GROQ_MODEL=mixtral-8x7b-32768
Run the GUI
python web3trustguard.py
If you don't Want to Run from Source?
You can download and install the app using our ready-made installer from the repo:
This will install the GUI directly to your computer with a shortcut.
References & Protocol Sources
MCP Protocol & Examples
API Providers
- GoPlus Labs API
- Covalent API
- Solana JSON-RPC
- Google Safe Browsing API
- OpenPhish Public Feed
- URLHaus Malware Feed
- PhishTank XML Feed
- FundMeSolana Verified Causes JSON
- https://console.groq.com/keys
Built With ❤️ by Bolaji M.L
Building public-good AI agents that trust on-chain data.
Follow: @DeMCP_AI, @Fundmesolana
Website: https://demcp.ai, https://fundmesolana.com
License: MIT