AI-ready vendor incident status with public active incidents and plan-scoped history.
https://www.huntertech.io/api/v1/mcpHeaders: Authorization
Add this server entry to the mcpServers object in your Claude Desktop config, then restart the app.
{
"mcpServers": {
"io-huntertech-vendor-insights": {
"url": "https://www.huntertech.io/api/v1/mcp"
}
}
}~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNo remote HTTP endpoint is advertised. Use the package or stdio setup shown in Install.
Paste an API key, bearer token, or session value from the provider. It is used once to list inventory and discarded after the request.
Optional Supabase bearer access token for authenticated, plan-scoped historical incident access. Anonymous access returns public active ongoing and monitored incidents only.
Huntertech.io Vendor Insights is an MCP server for AI-ready vendor incident status with public active incidents and plan-scoped history.. It supports HTTP transport.
Use the generated config in Install. It points your client at the advertised remote endpoint shown on this page.
Choose the Claude Desktop tab in Install, copy the config, and add it to Claude Desktop's MCP server settings. Endpoint: https://www.huntertech.io/api/v1/mcp.
Choose the Claude Code tab in Install, copy the config, and add it to Claude Code's MCP server settings. Endpoint: https://www.huntertech.io/api/v1/mcp.
Choose the Codex tab in Install, copy the config, and add it to Codex's MCP server settings. Endpoint: https://www.huntertech.io/api/v1/mcp.
Choose the Cursor or VS Code tab in Install, copy the config, and add it to Cursor or VS Code's MCP server settings. Endpoint: https://www.huntertech.io/api/v1/mcp.
Huntertech.io Vendor Insights uses HTTP transport. Endpoint: https://www.huntertech.io/api/v1/mcp.
Huntertech.io Vendor Insights inventory is listed when the MCP endpoint exposes tools, resources, or prompts. Some servers require auth first.
Huntertech.io Vendor Insights is marked with Auth required by registry metadata auth. You may need provider login, an API key, a bearer token, or a session header.