myssl -go
MySSL MCP Server
claude mcp add --transport stdio trustasia-com-myssl-mcp-server-go ./myssl-mcp-server \ --env AccessKey="your-access-key" \ --env SecretKey="your-secret-key"
How to use
The myssl MCP server provides domain and IP security checking via the MySSL API. It exposes tools that let your AI client query domain information and verify that the MySSL service is healthy, enabling secure integrations for tasks like domain validation and threat checks. After registering the MCP server with your AI client, you can invoke the domain_check tool to retrieve details about a domain or IP, and the health_check tool to confirm that the MySSL backend is responsive. The server is designed to work with compatible AI clients through the MCP protocol, allowing you to embed these capabilities into prompts and workflows.
How to install
Prerequisites:
- Go toolchain installed on your system
- MySSL API credentials (AccessKey and SecretKey)
- A server environment to run the binary (Linux/macOS/Windows as supported by the release)
Installation steps:
- Download the appropriate release for your platform from the Releases page of the project.
- Extract the package to your desired location.
- Set your MySSL API credentials as environment variables (replace with your actual keys):
{
"AccessKey": "your-access-key",
"SecretKey": "your-secret-key"
}
- Run the MCP server binary:
# Example for Unix-like systems
cd /path/to/extracted/package
chmod +x myssl-mcp-server
./myssl-mcp-server
- Register the server with your AI client (as per the client’s plugin/extension management interface), providing:
- Name: myssl-mcp-server
- Version: 1.0.0
- Command: Path to the executable (e.g., ./myssl-mcp-server)
- Working Directory: The directory where you extracted the files
Authorizations:
- Ensure your API credentials have the necessary permissions and are rotated as needed. The README mentions valid authorizations; set them in your environment or configuration as required by your deployment.
Additional notes
Tips and notes:
- Keep your AccessKey and SecretKey secure; consider using a secrets manager in production.
- The server exposes two main tools: domain_check for domain/IP information and health_check to verify the MySSL service status.
- If you change the credentials, restart the MCP server so it picks up the new values.
- Ensure network egress from the host to MySSL endpoints is allowed by your firewall.
- In case of authentication errors, verify that the environment variables are loaded by the process running the binary and that the keys have not expired or been rotated.
- The Health Check tool can be used to monitor uptime and establish baseline response times for alerting.
- If your AI client requires a specific plugin version, adjust the Version field accordingly during registration.
Related MCP Servers
trpc-agent-go
trpc-agent-go is a powerful Go framework for building intelligent agent systems using large language models (LLMs) and tools.
station
Station is our open-source runtime that lets teams deploy agents on their own infrastructure with full control.
tiger-cli
Tiger CLI is the command-line interface for Tiger Cloud. It includes an MCP server for helping coding agents write production-level Postgres code.
gopls
MCP server for golang projects development: Expand AI Code Agent ability boundary to have a semantic understanding and determinisic information for golang projects.
kubernetes
A Model Context Protocol (MCP) server for the Kubernetes API.
gcp-cost
💰 An MCP server that enables AI assistants to estimate Google Cloud costs, powered by Cloud Billing Catalog API and built with Genkit for Go