MCP ExplorerExplorer

Web3 Trust Guard Mcp Server

@DASUCCESSon a month ago
1 MIT
FreeCommunity
AI Systems
Introducing Web3 Trust Guard An MCP Server with 8 tools that help AI detect scams, verify donations, and protect users across blockchains.

Overview

What is Web3 Trust Guard Mcp Server

Web3-Trust-Guard-MCP-Server is a Model Context Protocol (MCP) server designed to assist AI in detecting scams, verifying donations, and protecting users across various blockchains, including Ethereum, BNB, and Solana.

Use cases

Use cases include: 1) Detecting fraudulent tokens before investment, 2) Ensuring wallet safety for users, 3) Authenticating NFTs for collectors, 4) Protecting users from phishing attacks, 5) Validating donations to ensure they reach verified causes.

How to use

To use the Web3-Trust-Guard-MCP-Server, AI agents can access its tools via the provided API endpoints. Each tool is designed for specific tasks such as checking token security or verifying donations in real-time.

Key features

Key features include: 1) Token risk assessment, 2) Wallet risk detection, 3) NFT authenticity verification, 4) Phishing URL detection, 5) Solana transaction simulation, 6) Scam detection for Solana tokens, 7) Donation verification, and 8) Listing of verified donation addresses.

Where to use

The Web3-Trust-Guard-MCP-Server can be used in sectors such as cryptocurrency exchanges, blockchain-based donation platforms, NFT marketplaces, and any application requiring real-time verification of blockchain data.

Content

Web3 Trust Guard MCP Server

Introducing Web3 Trust Guard An MCP Server with 8 tools that help AI detect scams, verify donations, and protect users across blockchains.

A fully functional Model Context Protocol (MCP) server that allows AI agents to verify Web3 data in real-time — including token security, wallet risk, NFT authenticity, URL phishing detection, Solana transaction simulation, and on-chain donation validation.

Hosted at: https://mcp.fundmesolana.com
Swagger Docs: https://mcp.fundmesolana.com/swagger/

Built for the DeMCP Side Track challenge to empower AI x Crypto innovation.


What This MCP Server Does

This server exposes 8 powerful tools that AI agents can use to analyze data on Ethereum, BNB, and Solana blockchains:

Tool Name Description
check_token Scan EVM token contracts for honeypot or scam risks
check_wallet Detect if a wallet is malicious, blacklisted, or risky
check_nft Analyze NFT contract + token ID for authenticity and risk
check_url Check if a dApp or website is flagged as phishing
simulate_sol_tx Simulate a Solana transaction to detect hidden dangers
check_sol_token Inspect Solana SPL tokens for scam indicators
verify_donation Confirm if a tx hash represents a donation to a verified address
list_verified_causes Return all trusted donation addresses (on-chain proof)

MCP Tool Manifest Endpoint

AI agent platforms that support the Model Context Protocol (MCP) standard can dynamically discover and invoke these tools in real-time.

GET https://mcp.fundmesolana.com/api/mcp.json

This manifest allows any MCP-compatible AI system to call this server using structured, schema-defined functions.


How to Use This MCP Server With an AI Agent

Use any AI agent platform that supports external tools built with the MCP standard (e.g., LangChain, Auto-GPT, OpenAgents, etc).

  1. Load the Manifest
GET https://mcp.fundmesolana.com/mcp.json
  1. Prompt Example:

“Check if token 0x880bce9321c79cac1d290de6d31dde722c606165 on BNB (chain_id 56) is a scam.”

  1. Agent Automatically Calls:
POST /check_token/
{
  "address": "0x880bce9321c79cac1d290de6d31dde722c606165",
  "chain_id": 56
}
  1. Receives Response:
  1. Agent Interprets the Response:

“This token appears safe based on the analysis.”


Supported Chains

  • Ethereum Mainnet (chain_id: 1)
  • BNB Smart Chain (chain_id: 56)
  • Solana (native, no chain ID)

Example Test Payloads

1. check_token

{
  "address": "0x880bce9321c79cac1d290de6d31dde722c606165",
  "chain_id": 56
}
  • Token: $FREE
{
  "address": "0x64c37c3d6b5ff0fdea26eec0c8b6de487105291c",
  "chain_id": 56
}
  • Token: ITHEUM

2. check_nft

{
  "contract": "0xee24b9872022c7770CCC828d856224416CBa005f",
  "token_id": "1",
  "chain_id": 56
}
  • NFT: Tribalpunk Hero

3. check_wallet

{
  "address": "0x7bd75b1b8f2cfce01bd97b3661c0a2b78a4c6ca0",
  "chain_id": 56
}
  • Includes approval & threat indicators

Perfect — here is your updated Section 4: check_url for your README.md, now enhanced with the new logic and test examples, ready for copy-paste:


Absolutely — here’s the final, updated version of Section 4: check_url for your README.md, with everything included:

  • Your latest detection logic
  • Live phishing test examples
  • Clear warning that detection status may change
  • Links to real-time threat feed repos, including the OpenPhish GitHub URL you provided

4. check_url

The check_url endpoint uses a multi-layered phishing detection strategy to analyze whether a website or dApp is flagged as malicious. It checks across several real-time threat intelligence systems, and the result includes:

  • is_phishing: whether the URL is dangerous
  • source: the system that flagged it (e.g., google, openphish, etc.)
  • note: human-readable explanation

Detection Sources

Source Type Real-Time Feed Link
GoPlus API Blockchain-focused security checks GoPlus Labs
Google Safe Browsing Web phishing & malware detection API Docs
OpenPhish Real-time phishing URL feed feed.txt
URLHaus Malware & malicious domains text
PhishTank Community-powered phishing database XML

This layered detection strategy ensures reliability. If one system misses a phishing URL, others might catch it.


Example Request

{
  "url": "http://live-chat-binance.com/"
}

Example Responses

Case 1: Flagged by Google Safe Browsing

{
  "success": true,
  "data": {
    "is_phishing": true,
    "source": "google",
    "note": "Flagged as phishing by Google Safe Browsing"
  }
}

Case 2: Flagged by Community Feeds

{
  "success": true,
  "data": {
    "is_phishing": true,
    "source": "openphish",
    "note": "Flagged by phishing feed data (OpenPhish, URLhaus, or PhishTank)."
  }
}

Case 3: Clean URL (No source flagged it)

{
  "success": true,
  "data": {
    "is_phishing": false,
    "source": "none-detected",
    "note": "No phishing flags from GoPlus, Google, or feeds."
  }
}

URLs You Can Use for Testing

URL Likely Result
http://live-chat-binance.com/ Flagged by OpenPhish
http://testsafebrowsing.appspot.com/s/phishing.html Flagged by Google Safe Browsing
https://fundmesolana.com Clean (expected false)

Important Note

The status of phishing URLs can change over time.
If a phishing site is removed, cleaned, or re-hosted, it may no longer appear in threat feeds, and check_url will return is_phishing: false.

To manually verify if a domain is currently listed, you can check:


Donation Verification Protocol

We support real-time verification of donations made on-chain to verified causes, across multiple platforms.

To standardize participation, we have established a format external platforms must follow to integrate with this MCP server.

Accepted External Standard

Platforms wishing to integrate must expose a public endpoint like:

GET /api/verified-causes/

And return:

{
  "count": 100,
  "next": null,
  "previous": null,
  "results": [
    {
      "name": "Ali Surgery",
      "address": "Gh9Z...",
      "chain": "solana",
      "chain_id": null,
      "type": "emergency"
    },
    {
      "name": "Flood Aid",
      "address": "0x123...",
      "chain": "evm",
      "chain_id": 1,
      "type": "emergency"
    }
  ]
}

Current Accepted Platform for Donation

Our server automatically fetches and indexes donation addresses from approved sources like the one above.


Currently working on the MCP Tools plugin that can connect to ChatGpt

Still under testing and iterating.


External APIs Used

This MCP Server integrates multiple real-time security and blockchain APIs:

Provider Purpose
GoPlus Labs Scam token, wallet, NFT, and Solana checks
Google Safe Browsing Detect phishing, malware, and social threats
OpenPhish Community-driven phishing URL database
URLHaus Malware distribution URL detection
PhishTank Public phishing site feed
Covalent API EVM transaction and contract decoding
Solana JSON-RPC Transaction simulation and confirmation
FundMeSolana Verified donation addresses (Solana)

How to Run Locally

git clone https://github.com/yourname/web3-mcp-server.git
cd web3-mcp-server
python -m venv env
source env/bin/activate  # or env\Scripts\activate on Windows
pip install -r requirements.txt

Create .env file:

GOPLUS_BASE=https://api.gopluslabs.io
COVALENT_KEY=your_covalent_api_key
VERIFIED_CAUSE_SOURCES=https://fundmesolana.com/api/emergency/verified_causes

Then run:

python manage.py migrate
python manage.py runserver

Access Swagger API Docs:

http://127.0.0.1:8000/swagger/

How to run the Web3 Trust Guard GUI Locally

I provided a GUI that supports tool selection, payload generation, Groq integration, and real-time output.

Requirements

Create your API Key here on GROQ CLOUD

pip install -r requirements.txt

Create .env:

MCP_URL=https://mcp.fundmesolana.com/mcp.json
API_BASE=https://mcp.fundmesolana.com
GROQ_API_KEY=your_groq_api_key
GROQ_MODEL=mixtral-8x7b-32768

Run the GUI

python web3trustguard.py

If you don’t Want to Run from Source?

You can download and install the app using our ready-made installer from the repo:

Web3TrustGuardInstaller.exe

This will install the GUI directly to your computer with a shortcut.


References & Protocol Sources

MCP Protocol & Examples

API Providers


Built With ❤️ by Bolaji M.L

Building public-good AI agents that trust on-chain data.

Follow: @DeMCP_AI,
@Fundmesolana

Website: https://demcp.ai,
https://fundmesolana.com

License: MIT

Tools

No tools

Comments

Recommend MCP Servers

View All MCP Servers