honeypot-detector-mcp

kukapay/honeypot-detector-mcp

3.2

If you are the rightful owner of honeypot-detector-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

The Honeypot Detector MCP is a server designed to identify potential honeypot tokens on Ethereum, BNB Smart Chain (BSC), and Base networks.

Tools
1
Resources
0
Prompts
0

Honeypot Detector MCP

An MCP server that detects potential honeypot tokens on Ethereum, BNB Smart Chain (BSC), and Base.

Honeypot is a type of fraudulent smart contract that allows users to buy tokens but prevents them from selling or makes selling extremely difficult.

GitHub License Python Version Status

Features

  • Honeypot Analysis: Check if a token address is a honeypot using the honeypot.is API.
  • Supported Chains: Analyzes tokens on Ethereum, Binance Smart Chain and Base.
  • Markdown Output: Returns detailed analysis in Markdown, including:
    • Token name
    • Address
    • Honeypot status
    • Risk level
    • Buy, sell, and transfer taxes
    • Contract code open-source status

Installation

Prerequisites

  • Python 3.10 or higher
  • uv (recommended package manager)

Steps

  1. Clone the Repository:

    git clone https://github.com/kukapay/honeypot-detector-mcp.git
    cd honeypot-detector-mcp
    
  2. Install Dependencies:

    uv sync
    
  3. Installing to Claude Desktop:

    Install the server as a Claude Desktop application:

    uv run mcp install main.py --name "Honeypot Detector"
    

    Configuration file as a reference:

    {
       "mcpServers": {
           "Honeypot Detector": {
               "command": "uv",
               "args": [ "--directory", "/path/to/honeypot-detector-mcp", "run", "main.py" ]
           }
       }
    }
    

    Replace /path/to/honeypot-detector-mcp with your actual installation path.

Tool

The check_honeypot tool takes a token address as input parameter.

Example Usage

Input Prompt:

Please check if the token at address 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48 is a honeypot.

Output Markdown:

# Honeypot Analysis for USDC
- **Address**: 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48
- **Is Honeypot**: False
- **Risk Level**: Low
- **Buy Tax**: 0%
- **Sell Tax**: 0%
- **Transfer Tax**: 0%
- **Contract Code Open Source**: True

License

This project is licensed under the MIT License. See the file for details.