QR codes active 90 days, claimable forever. Request an API key in chat to retarget and track scans.
Use this profile to copy client config, check auth requirements, review tools and resources, and compare related MCP servers before adding it to an AI client.
https://qrverloz.com/api/mcpHeaders: Authorization
Add this server entry to the mcpServers object in your Claude Desktop config, then restart the app.
{
"mcpServers": {
"io-github-neoshrek-qrverloz-mcp": {
"url": "https://qrverloz.com/api/mcp"
}
}
}~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNo remote HTTP endpoint is advertised. Use the package or stdio setup shown in Install.
Paste an API key, bearer token, or session value from the provider. It is used once to list inventory and discarded after the request.
Bearer token for authentication. Format: 'Bearer YOUR_API_KEY'. Request a free API key using the request_api_key tool directly in chat.
QrVerloz is an MCP server for QR codes active 90 days, claimable forever. Request an API key in chat to retarget and track scans.. It supports HTTP transport.
Use the generated config in Install. It points your client at the advertised remote endpoint shown on this page.
Choose the Claude Desktop tab in Install, copy the config, and add it to Claude Desktop's MCP server settings. Endpoint: https://qrverloz.com/api/mcp.
Choose the Claude Code tab in Install, copy the config, and add it to Claude Code's MCP server settings. Endpoint: https://qrverloz.com/api/mcp.
Choose the Codex tab in Install, copy the config, and add it to Codex's MCP server settings. Endpoint: https://qrverloz.com/api/mcp.
Choose the Cursor or VS Code tab in Install, copy the config, and add it to Cursor or VS Code's MCP server settings. Endpoint: https://qrverloz.com/api/mcp.
QrVerloz uses HTTP transport. Endpoint: https://qrverloz.com/api/mcp.
QrVerloz inventory is listed when the MCP endpoint exposes tools, resources, or prompts. Some servers require auth first.
QrVerloz is marked with Auth required by registry metadata auth. You may need provider login, an API key, a bearer token, or a session header.