dchu3/base-mcp-honeypot
3.1
If you are the rightful owner of base-mcp-honeypot and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
Base honeypot MCP server is designed to simulate vulnerable services to attract and analyze malicious activities.
base-mcp-honeypot
Base honeypot MCP server that wraps the Honeypot.is API.
Configuration
-
Copy
.env.exampleto.envand fill in the values documented in docs.honeypot.is. Important keys:HONEYPOT_ENABLE_API_KEY— set totrueonly when you actually need to send an API key. When enabled, provideHONEYPOT_API_KEYand, if required, changeHONEYPOT_API_KEY_HEADER(defaults toAuthorization, but you can switch toX-API-KEY). LeavingHONEYPOT_ENABLE_API_KEY=falsemakes every request unauthenticated, mirroringcurl -G https://api.honeypot.is/v2/IsHoneypot -d address=….HONEYPOT_SIMULATE_LIQUIDITY/HONEYPOT_FORCE_SIMULATE— defaults for thesimulateLiquidityandforceSimulateLiquidityquery parameters described under/v2/IsHoneypot.HONEYPOT_MAX_RETRIESandHONEYPOT_RETRY_DELAY_MS— control simple client-side retries for transient DNS/network errors (e.g.,EAI_AGAIN).
-
Install dependencies with
npm install(Node.js 20 LTS). -
Build and run the server for Codex CLI integrations with:
npm run build
node dist/server.js stdio
Avoid running the MCP server via npm run dev -- stdio inside Codex CLI — the npm banner writes to stdout before the MCP handshake and will cause initialize to fail.