Breach detection, SIM swap, domain lookalikes, OAuth watchlist, URL scanning. Subscription or PAYG.
Use this profile to copy client config, check auth requirements, review tools and resources, and compare related MCP servers before adding it to an AI client.
uvx relayshield-mcp{
"RELAYSHIELD_API_URL": "YOUR_VALUE_HERE",
"RELAYSHIELD_API_KEY": "YOUR_SECRET_VALUE",
"RELAYSHIELD_X_PAYMENT": "YOUR_SECRET_VALUE"
}Add this server entry to the mcpServers object in your Claude Desktop config, then restart the app.
{
"mcpServers": {
"io-github-nzdsf2-gif-relayshield-mcp": {
"command": "uvx",
"args": [
"relayshield-mcp"
],
"env": {
"RELAYSHIELD_API_URL": "YOUR_VALUE_HERE",
"RELAYSHIELD_API_KEY": "YOUR_SECRET_VALUE",
"RELAYSHIELD_X_PAYMENT": "YOUR_SECRET_VALUE"
}
}
}
}~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNo remote HTTP endpoint is advertised. Use the package or stdio setup shown in Install.
RelayShield Security Intelligence is an MCP server for Breach detection, SIM swap, domain lookalikes, OAuth watchlist, URL scanning. Subscription or PAYG.. It supports STDIO transport.
Use the generated config in Install. This server runs with uvx relayshield-mcp; add any required environment variables before starting your client.
Choose the Claude Desktop tab in Install and copy the config for uvx relayshield-mcp. Add required environment variables before starting Claude Desktop.
Choose the Claude Code tab in Install and copy the config for uvx relayshield-mcp. Add required environment variables before starting Claude Code.
Choose the Codex tab in Install and copy the config for uvx relayshield-mcp. Add required environment variables before starting Codex.
Choose the Cursor or VS Code tab in Install and copy the config for uvx relayshield-mcp. Add required environment variables before starting Cursor or VS Code.
RelayShield Security Intelligence uses STDIO transport. Use the package or command config in Install.
RelayShield Security Intelligence inventory is listed when the MCP endpoint exposes tools, resources, or prompts. Some servers require auth first.
RelayShield Security Intelligence is marked with Auth required by registry metadata auth. You may need provider login, an API key, a bearer token, or a session header.
| Package | Registry | Version | Inputs |
|---|---|---|---|
relayshield-mcpstdio | pypi | 0.2.3 | Env: RELAYSHIELD_API_URL required Env: RELAYSHIELD_API_KEY secret Env: RELAYSHIELD_X_PAYMENT secret |