Xpersona Agent
Crawled github.com 380c573d
8000 Configure the allowed host and origin using your ngrok URL: export BLOCKSCOUT_MCP_ALLOWED_HOSTS= " your-tunnel-id.ngrok-free.app " export BLOCKSCOUT_MCP_ALLOWED_ORIGINS= " https://your-tunnel-id.ngrok-free.app "... 8000 Configure the allowed host and origin using your ngrok URL: export BLOCKSCOUT_MCP_ALLOWED_HOSTS= " your-tunnel-id.ngrok-free.app " export BLOCKSCOUT_MCP_ALLOWED_ORIGINS= " https://your-tunnel-id.ngrok-free.app " python -m blockscout_mcp_server --http Note: These settings are primarily for development use. When these variables are not set, DNS rebinding protection is automatically determined by the server's bind
Overall rank
#75
Adoption
No public adoption signal
Trust
Unknown
Freshness
Apr 15, 2026
Freshness
Last checked Apr 15, 2026
Best For
Crawled github.com 380c573d is best for general automation workflows where documented compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, MCP Registry, runtime-metrics, public facts pack
Overview
Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.
Verifiededitorial-content
Overview
Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.
Overview
Executive Summary
8000 Configure the allowed host and origin using your ngrok URL: export BLOCKSCOUT_MCP_ALLOWED_HOSTS= " your-tunnel-id.ngrok-free.app " export BLOCKSCOUT_MCP_ALLOWED_ORIGINS= " https://your-tunnel-id.ngrok-free.app "... 8000 Configure the allowed host and origin using your ngrok URL: export BLOCKSCOUT_MCP_ALLOWED_HOSTS= " your-tunnel-id.ngrok-free.app " export BLOCKSCOUT_MCP_ALLOWED_ORIGINS= " https://your-tunnel-id.ngrok-free.app " python -m blockscout_mcp_server --http Note: These settings are primarily for development use. When these variables are not set, DNS rebinding protection is automatically determined by the server's bind Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
Profile only
Freshness
Apr 15, 2026
Vendor
Blockscout
Artifacts
0
Benchmarks
0
Last release
Unpublished
Install & run
Setup Snapshot
- 1
Setup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.
- 2
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Evidence & Timeline
Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.
Verifiededitorial-content
Evidence & Timeline
Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.
Public facts
Evidence Ledger
Vendor (1)
Vendor
Blockscout
Security (1)
Handshake status
UNKNOWN
Integration (1)
Crawlable docs
6 indexed pages on the official domain
Artifacts & Docs
Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.
Self-declaredMCP Registry
Artifacts & Docs
Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.
Captured outputs
Artifacts Archive
Extracted files
0
Examples
0
Snippets
0
Languages
Unknown
Editorial read
Docs & README
Docs source
MCP Registry
Editorial quality
ready
8000 Configure the allowed host and origin using your ngrok URL: export BLOCKSCOUT_MCP_ALLOWED_HOSTS= " your-tunnel-id.ngrok-free.app " export BLOCKSCOUT_MCP_ALLOWED_ORIGINS= " https://your-tunnel-id.ngrok-free.app "... 8000 Configure the allowed host and origin using your ngrok URL: export BLOCKSCOUT_MCP_ALLOWED_HOSTS= " your-tunnel-id.ngrok-free.app " export BLOCKSCOUT_MCP_ALLOWED_ORIGINS= " https://your-tunnel-id.ngrok-free.app " python -m blockscout_mcp_server --http Note: These settings are primarily for development use. When these variables are not set, DNS rebinding protection is automatically determined by the server's bind
Full README
8000 Configure the allowed host and origin using your ngrok URL: export BLOCKSCOUT_MCP_ALLOWED_HOSTS= " your-tunnel-id.ngrok-free.app " export BLOCKSCOUT_MCP_ALLOWED_ORIGINS= " https://your-tunnel-id.ngrok-free.app " python -m blockscout_mcp_server --http Note: These settings are primarily for development use. When these variables are not set, DNS rebinding protection is automatically determined by the server's bind host: enabled for localhost, disabled for non-localhost (e.g., 0.0.0.0 ). If your Host header includes a non-standard port, use the :* wildcard suffix (e.g., "example.com:*" ) or specify the exact host:port value. For more details on ngrok tunneling with MCP servers, see the OpenAI Apps SDK Examples documentation . HTTP Mode with REST API: To enable the versioned REST API alongside the MCP endpoint, use the --rest flag (which requires --http ). python -m blockscout_mcp_server
API & Reliability
Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.
MissingMCP Registry
API & Reliability
Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.
Machine interfaces
Contract & API
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/snapshot"
curl -s "https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/contract"
curl -s "https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/trust"
Operational fit
Reliability & Benchmarks
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Machine Appendix
Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.
MissingMCP Registry
Machine Appendix
Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": []
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "MCP_REGISTRY",
"generatedAt": "2026-04-17T06:16:21.161Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [],
"flattenedTokens": ""
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Blockscout",
"href": "https://github.com/blockscout/mcp-server",
"sourceUrl": "https://github.com/blockscout/mcp-server",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T02:47:37.924Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/crawl-04019812e0f2efad-380c573d80da/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]