home / mcp / spamshieldpro mcp server
Provides an MCP interface to check form content via the Spamshieldpro API using a stdio-based server.
Configuration
View docs{
"mcpServers": {
"bach-ai-tools-bachai-spamshieldpro": {
"command": "uvx",
"args": [
"--from",
"bach-spamshieldpro",
"bach_spamshieldpro"
],
"env": {
"API_KEY": "YOUR_API_KEY_HERE"
}
}
}
}You deploy and run the Spamshieldpro MCP Server to access the Spamshieldpro API from your applications. It runs via stdio and is configured through environment variables and MCP client configurations, letting you securely authenticate and perform the check_for_spam operation from your codebase.
You connect to this MCP server using an MCP client that supports stdio. Ensure you have your API key ready and a client that can start the MCP server process with the correct environment. You can run the server locally and point your MCP client to it, then call the available endpoint to verify form content for spam checks.
Key usage patterns include starting the MCP server with your API key and then invoking the check_for_spam tool via the MCP client. The server exposes a single endpoint for checking form content, which you can call from your application to validate user input before submission.
# Prerequisites
# - Python 3.x
# - pip
# Option A: Install from PyPI
pip install bach-spamshieldpro
# Option B: Install from source (editable)
pip install -e .
# After installation, you can start using the MCP command via uvx or direct Python entryRun the MCP server using one of the provided methods. Choose the method that fits your workflow.
API authentication is required. Set your API key in the environment before starting the server.
Environment variables you will use: - API_KEY: Your Spamshieldpro API key (required)
Example MCP client configuration snippets show how to start the server with the required environment variable. Use the same approach in your own MCP client to reliably pass the API key to the server.
Cursor and Claude Desktop configurations are provided to integrate the MCP server into common tooling environments. They should reference the uvx runtime with the appropriate arguments and the API_KEY env var.
Keep your API_KEY secret. Do not embed it in client-side code or publicly shared configuration. Use secure storage for credentials and rotate keys periodically as part of your security hygiene.
If you encounter authentication errors, recheck that API_KEY is correctly exported in the environment where the MCP server is running. Verify that the MCP client is configured to pass the same key to the server.
Endpoint for checking form content via a POST request to the root endpoint.