Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
MCP server for Proxmox VE — manage virtual machines, containers, storage, networking, and clusters through AI coding tools $1 $1 $1 $1 MCP PVE MCP server for $1. Manage virtual machines, containers, storage, networking, and clusters through natural language in Cursor, Claude Code, and Claude Desktop. **Disclaimer:** Most of this code has been AI-generated and has not been fully tested yet. I created this project for my own needs and plan to continue improving its quality, but it may be buggy in the early stages. If you find a bug, feel f Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
@samik081/mcp-pve is best for proxmox, pve, mcp workflows where MCP compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB MCP, runtime-metrics, public facts pack
MCP server for Proxmox VE — manage virtual machines, containers, storage, networking, and clusters through AI coding tools $1 $1 $1 $1 MCP PVE MCP server for $1. Manage virtual machines, containers, storage, networking, and clusters through natural language in Cursor, Claude Code, and Claude Desktop. **Disclaimer:** Most of this code has been AI-generated and has not been fully tested yet. I created this project for my own needs and plan to continue improving its quality, but it may be buggy in the early stages. If you find a bug, feel f
Public facts
4
Change events
1
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
MCP
Freshness
Feb 25, 2026
Vendor
Samik081
Artifacts
0
Benchmarks
0
Last release
0.3.1
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/Samik081/mcp-pve.gitSetup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Samik081
Protocol compatibility
MCP
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
bash
PVE_BASE_URL="https://pve.example.com:8006" \ PVE_TOKEN_ID="root@pam!mcp" \ PVE_TOKEN_SECRET="xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" \ npx -y @samik081/mcp-pve
bash
docker run --rm -i \ -e PVE_BASE_URL=https://pve.example.com:8006 \ -e PVE_TOKEN_ID=root@pam!mcp \ -e PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \ -e PVE_VERIFY_SSL=false \ ghcr.io/samik081/mcp-pve
bash
docker run -d -p 3000:3000 \ -e MCP_TRANSPORT=http \ -e PVE_BASE_URL=https://pve.example.com:8006 \ -e PVE_TOKEN_ID=root@pam!mcp \ -e PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \ -e PVE_VERIFY_SSL=false \ ghcr.io/samik081/mcp-pve
bash
# Using npx claude mcp add --transport stdio pve \ --env PVE_BASE_URL=https://pve.example.com:8006 \ --env PVE_TOKEN_ID=root@pam!mcp \ --env PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \ --env PVE_VERIFY_SSL=false \ -- npx -y @samik081/mcp-pve # Using Docker claude mcp add --transport stdio pve \ --env PVE_BASE_URL=https://pve.example.com:8006 \ --env PVE_TOKEN_ID=root@pam!mcp \ --env PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \ --env PVE_VERIFY_SSL=false \ -- docker run --rm -i ghcr.io/samik081/mcp-pve # Using remote HTTP (connect to a running Docker container or HTTP server) claude mcp add --transport http pve http://localhost:3000
json
{
"mcpServers": {
"pve": {
"command": "npx",
"args": ["-y", "@samik081/mcp-pve"],
"env": {
"PVE_BASE_URL": "https://pve.example.com:8006",
"PVE_TOKEN_ID": "root@pam!mcp",
"PVE_TOKEN_SECRET": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"PVE_VERIFY_SSL": "false"
}
}
}
}json
{
"mcpServers": {
"pve": {
"command": "docker",
"args": ["run", "--rm", "-i",
"-e", "PVE_BASE_URL=https://pve.example.com:8006",
"-e", "PVE_TOKEN_ID=root@pam!mcp",
"-e", "PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"-e", "PVE_VERIFY_SSL=false",
"ghcr.io/samik081/mcp-pve"
]
}
}
}Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB MCP
Editorial quality
ready
MCP server for Proxmox VE — manage virtual machines, containers, storage, networking, and clusters through AI coding tools $1 $1 $1 $1 MCP PVE MCP server for $1. Manage virtual machines, containers, storage, networking, and clusters through natural language in Cursor, Claude Code, and Claude Desktop. **Disclaimer:** Most of this code has been AI-generated and has not been fully tested yet. I created this project for my own needs and plan to continue improving its quality, but it may be buggy in the early stages. If you find a bug, feel f
MCP server for Proxmox VE. Manage virtual machines, containers, storage, networking, and clusters through natural language in Cursor, Claude Code, and Claude Desktop.
Disclaimer: Most of this code has been AI-generated and has not been fully tested yet. I created this project for my own needs and plan to continue improving its quality, but it may be buggy in the early stages. If you find a bug, feel free to open an issue -- I'll try to work on it in my spare time.
read-only, read-execute, full) for granular controlPVE_CATEGORIES to expose only the tools you needfetch (Node 18+)PVE_VERIFY_SSL=falselinux/amd64 and linux/arm64 on GHCRMCP_TRANSPORT=http) using the Streamable HTTP protocolRun the server directly with npx:
PVE_BASE_URL="https://pve.example.com:8006" \
PVE_TOKEN_ID="root@pam!mcp" \
PVE_TOKEN_SECRET="xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" \
npx -y @samik081/mcp-pve
The server validates your PVE connection on startup and fails immediately with a clear error if credentials are missing or invalid.
Run with Docker (stdio transport, same as npx):
docker run --rm -i \
-e PVE_BASE_URL=https://pve.example.com:8006 \
-e PVE_TOKEN_ID=root@pam!mcp \
-e PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \
-e PVE_VERIFY_SSL=false \
ghcr.io/samik081/mcp-pve
To run as a remote MCP server with HTTP transport:
docker run -d -p 3000:3000 \
-e MCP_TRANSPORT=http \
-e PVE_BASE_URL=https://pve.example.com:8006 \
-e PVE_TOKEN_ID=root@pam!mcp \
-e PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \
-e PVE_VERIFY_SSL=false \
ghcr.io/samik081/mcp-pve
The MCP endpoint is available at http://localhost:3000 and a health check at http://localhost:3000/health.
Claude Code CLI (recommended):
# Using npx
claude mcp add --transport stdio pve \
--env PVE_BASE_URL=https://pve.example.com:8006 \
--env PVE_TOKEN_ID=root@pam!mcp \
--env PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \
--env PVE_VERIFY_SSL=false \
-- npx -y @samik081/mcp-pve
# Using Docker
claude mcp add --transport stdio pve \
--env PVE_BASE_URL=https://pve.example.com:8006 \
--env PVE_TOKEN_ID=root@pam!mcp \
--env PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \
--env PVE_VERIFY_SSL=false \
-- docker run --rm -i ghcr.io/samik081/mcp-pve
# Using remote HTTP (connect to a running Docker container or HTTP server)
claude mcp add --transport http pve http://localhost:3000
JSON config (works with Claude Code .mcp.json, Claude Desktop claude_desktop_config.json, Cursor .cursor/mcp.json):
{
"mcpServers": {
"pve": {
"command": "npx",
"args": ["-y", "@samik081/mcp-pve"],
"env": {
"PVE_BASE_URL": "https://pve.example.com:8006",
"PVE_TOKEN_ID": "root@pam!mcp",
"PVE_TOKEN_SECRET": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"PVE_VERIFY_SSL": "false"
}
}
}
}
Docker (stdio):
{
"mcpServers": {
"pve": {
"command": "docker",
"args": ["run", "--rm", "-i",
"-e", "PVE_BASE_URL=https://pve.example.com:8006",
"-e", "PVE_TOKEN_ID=root@pam!mcp",
"-e", "PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"-e", "PVE_VERIFY_SSL=false",
"ghcr.io/samik081/mcp-pve"
]
}
}
}
Remote MCP (connect to a running Docker container or HTTP server):
{
"mcpServers": {
"pve": {
"type": "streamable-http",
"url": "http://localhost:3000"
}
}
}
Control which tools are available using the PVE_ACCESS_TIER environment variable:
| Tier | Tools | Description |
|------|-------|-------------|
| full (default) | 105 | Read, execute, and write -- full control |
| read-execute | 68 | Read and execute -- no resource creation/deletion |
| read-only | 51 | Read only -- safe for exploration, no state changes |
Tier details:
Tools that are not available in your tier are not registered with the MCP server. They will not appear in your AI tool's tool list, keeping the context clean.
| Variable | Required | Default | Description |
|----------|----------|---------|-------------|
| PVE_BASE_URL | Yes | — | URL of your PVE instance (e.g. https://pve:8006) |
| PVE_TOKEN_ID | Yes | — | API token ID (user@realm!tokenname) |
| PVE_TOKEN_SECRET | Yes | — | API token UUID secret |
| PVE_ACCESS_TIER | No | full | read-only, read-execute, or full |
| PVE_CATEGORIES | No | all | Comma-separated category allowlist |
| PVE_VERIFY_SSL | No | true | Set false for self-signed certs |
| DEBUG | No | — | Set to any value to enable debug logging to stderr |
| MCP_TRANSPORT | No | stdio | Transport mode: stdio (default) or http |
| MCP_PORT | No | 3000 | HTTP server port (only used when MCP_TRANSPORT=http) |
| MCP_HOST | No | 0.0.0.0 | HTTP server bind address (only used when MCP_TRANSPORT=http) |
Create API tokens in the PVE UI under Datacenter > Permissions > API Tokens. Make sure to uncheck "Privilege Separation" if you want the token to inherit the user's full permissions.
nodes, qemu, lxc, storage, cluster, access, pools, network, firewall, backup, tasks, ha
mcp-pve provides 105 tools organized by category. Each tool's Access column shows the minimum tier required: read-only (available in all tiers), read-execute (requires read-execute or full), or full (requires full tier only).
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_nodes | List all nodes in the cluster | read-only |
| pve_get_node_status | Get detailed node status (CPU, memory, uptime, load) | read-only |
| pve_get_node_version | Get PVE version info for a node | read-only |
| pve_get_node_dns | Get DNS settings for a node | read-only |
| pve_get_node_time | Get time and timezone info for a node | read-only |
| pve_get_node_syslog | Get system log entries from a node | read-only |
| pve_list_node_services | List all system services on a node | read-only |
| pve_manage_node_service | Start, stop, restart, or reload a node service | read-execute |
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_qemu_vms | List all QEMU VMs on a node | read-only |
| pve_get_qemu_status | Get current VM status (CPU, memory, disk, network) | read-only |
| pve_get_qemu_config | Get VM configuration | read-only |
| pve_get_qemu_rrddata | Get RRD statistics over a time period | read-only |
| pve_list_qemu_snapshots | List all VM snapshots | read-only |
| pve_start_qemu_vm | Start a VM | read-execute |
| pve_stop_qemu_vm | Stop a VM (immediate) | read-execute |
| pve_shutdown_qemu_vm | Gracefully shut down a VM | read-execute |
| pve_reboot_qemu_vm | Reboot a VM | read-execute |
| pve_suspend_qemu_vm | Suspend a VM | read-execute |
| pve_resume_qemu_vm | Resume a suspended VM | read-execute |
| pve_reset_qemu_vm | Reset a VM (hard) | read-execute |
| pve_migrate_qemu_vm | Migrate a VM to another node | read-execute |
| pve_create_qemu_vm | Create a new VM | full |
| pve_delete_qemu_vm | Delete a VM and all its data | full |
| pve_update_qemu_config | Update VM configuration | full |
| pve_clone_qemu_vm | Clone a VM | full |
| pve_create_qemu_snapshot | Create a VM snapshot | full |
| pve_delete_qemu_snapshot | Delete a VM snapshot | full |
| pve_rollback_qemu_snapshot | Rollback a VM to a snapshot | full |
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_lxc_containers | List all LXC containers on a node | read-only |
| pve_get_lxc_status | Get current container status | read-only |
| pve_get_lxc_config | Get container configuration | read-only |
| pve_get_lxc_rrddata | Get RRD statistics over a time period | read-only |
| pve_list_lxc_snapshots | List all container snapshots | read-only |
| pve_start_lxc_container | Start a container | read-execute |
| pve_stop_lxc_container | Stop a container (immediate) | read-execute |
| pve_shutdown_lxc_container | Gracefully shut down a container | read-execute |
| pve_reboot_lxc_container | Reboot a container | read-execute |
| pve_suspend_lxc_container | Suspend (freeze) a container | read-execute |
| pve_resume_lxc_container | Resume (unfreeze) a container | read-execute |
| pve_create_lxc_container | Create a new container | full |
| pve_delete_lxc_container | Delete a container and all its data | full |
| pve_update_lxc_config | Update container configuration | full |
| pve_clone_lxc_container | Clone a container | full |
| pve_create_lxc_snapshot | Create a container snapshot | full |
| pve_delete_lxc_snapshot | Delete a container snapshot | full |
| pve_rollback_lxc_snapshot | Rollback a container to a snapshot | full |
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_storage | List all configured storage backends | read-only |
| pve_get_storage_config | Get storage backend configuration | read-only |
| pve_list_node_storage | List available storage on a node with usage info | read-only |
| pve_get_storage_status | Get storage status and usage on a node | read-only |
| pve_list_storage_content | List storage content (images, ISOs, backups) | read-only |
| pve_create_storage | Create a new storage backend | full |
| pve_update_storage | Update storage configuration | full |
| pve_delete_storage | Delete a storage backend | full |
| Tool | Description | Access |
|------|-------------|--------|
| pve_get_cluster_status | Get cluster status (membership, quorum) | read-only |
| pve_list_cluster_resources | List all cluster resources with optional type filter | read-only |
| pve_get_next_vmid | Get the next available VMID | read-only |
| pve_get_cluster_log | Get recent cluster log entries | read-only |
| pve_get_cluster_options | Get datacenter options | read-only |
| pve_list_cluster_backup_info | List guests not covered by backup jobs | read-only |
| pve_get_cluster_ha_status | Get HA manager status | read-only |
| pve_list_cluster_replication | List all replication jobs | read-only |
| pve_update_cluster_options | Update datacenter options | full |
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_users | List all users | read-only |
| pve_get_user | Get user details | read-only |
| pve_list_roles | List all roles and privileges | read-only |
| pve_list_groups | List all user groups | read-only |
| pve_list_acls | List all ACL entries | read-only |
| pve_list_domains | List authentication domains/realms | read-only |
| pve_create_user | Create a new user | full |
| pve_update_user | Update user properties | full |
| pve_delete_user | Delete a user | full |
| pve_update_acl | Grant or revoke ACL permissions | full |
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_pools | List all resource pools | read-only |
| pve_get_pool | Get pool details and members | read-only |
| pve_create_pool | Create a resource pool | full |
| pve_update_pool | Update pool members and settings | full |
| pve_delete_pool | Delete a resource pool | full |
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_networks | List all network interfaces on a node | read-only |
| pve_get_network | Get network interface configuration | read-only |
| pve_create_network | Create a network interface | full |
| pve_update_network | Update network interface configuration | full |
| pve_delete_network | Delete a network interface | full |
| Tool | Description | Access |
|------|-------------|--------|
| pve_get_firewall_options | Get cluster firewall options | read-only |
| pve_list_firewall_rules | List cluster firewall rules | read-only |
| pve_list_firewall_aliases | List firewall aliases | read-only |
| pve_list_firewall_ipsets | List firewall IP sets | read-only |
| pve_update_firewall_options | Update cluster firewall options | full |
| pve_create_firewall_rule | Create a firewall rule | full |
| pve_update_firewall_rule | Update a firewall rule | full |
| pve_delete_firewall_rule | Delete a firewall rule | full |
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_backup_jobs | List all scheduled backup jobs | read-only |
| pve_get_backup_job | Get backup job configuration | read-only |
| pve_run_backup | Run an immediate backup (vzdump) | read-execute |
| pve_create_backup_job | Create a scheduled backup job | full |
| pve_delete_backup_job | Delete a scheduled backup job | full |
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_tasks | List recent tasks on a node | read-only |
| pve_get_task_status | Get task status by UPID | read-only |
| pve_get_task_log | Get task log output by UPID | read-only |
| pve_stop_task | Stop a running task | read-execute |
| Tool | Description | Access |
|------|-------------|--------|
| pve_list_ha_resources | List all HA-managed resources | read-only |
| pve_get_ha_resource | Get HA configuration for a resource | read-only |
| pve_create_ha_resource | Add a VM/container to HA management | full |
| pve_update_ha_resource | Update HA resource configuration | full |
| pve_delete_ha_resource | Remove a resource from HA management | full |
After configuring your MCP client, ask your AI assistant:
"What nodes are in my Proxmox cluster?"
If the connection is working, the assistant will call pve_list_nodes and return your nodes with their current status.
Once configured, ask your AI tool questions in natural language:
"List all VMs on node pve1" -- calls pve_list_qemu_vms to show VMs with their status, CPU, and memory usage.
"What's the status of VM 100?" -- calls pve_get_qemu_status to show real-time resource utilization.
"Start container 200 on pve1" -- calls pve_start_lxc_container to start the container and returns the task UPID.
"Create a snapshot of VM 100 called pre-upgrade" -- calls pve_create_qemu_snapshot to create a snapshot before changes.
"Show me the cluster resources" -- calls pve_list_cluster_resources to show all VMs, containers, storage, and nodes.
"Migrate VM 100 to node pve2" -- calls pve_migrate_qemu_vm to live-migrate the VM to another node.
Connection refused / ECONNREFUSED
Check that PVE_BASE_URL is correct and includes the port (default: 8006). Ensure the PVE host is reachable from where the MCP server is running.
SSL certificate errors
If your PVE instance uses a self-signed certificate, set PVE_VERIFY_SSL=false. This disables TLS verification for all requests.
Invalid credentials / 401 Unauthorized
Verify your API token ID and secret are correct. The token ID format is user@realm!tokenname (e.g. root@pam!mcp). Check that "Privilege Separation" is unchecked if you need full user permissions.
Tools not showing up in your AI tool
Check your access tier setting. In read-only mode, only 51 tools are registered. In read-execute mode, 68 tools are registered. Use full (or omit PVE_ACCESS_TIER) for all 105 tools. Check PVE_CATEGORIES -- only tools in listed categories are registered. Also verify the server started without errors by checking stderr output.
Node.js version errors
mcp-pve requires Node.js >= 18.0.0. Check your version with node --version.
Parse errors or "invalid JSON" in MCP client This typically means something is writing to stdout besides the MCP server. Ensure no other tools, shell profiles, or startup scripts print to stdout when launching the server. The MCP protocol uses stdout for JSON-RPC communication. All mcp-pve logging goes to stderr.
# Install dependencies
npm install
# Build the project
npm run build
# Run in development mode (auto-reload)
npm run dev
# Open the MCP Inspector for interactive testing
npm run inspect
MIT
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/snapshot"
curl -s "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/contract"
curl -s "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
80
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
74
Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Rank
72
An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_MCP",
"generatedAt": "2026-04-17T02:16:56.513Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "proxmox",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "pve",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "mcp",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "model-context-protocol",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "virtualization",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "ai",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "llm",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "claude",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "cli",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:MCP|unknown|profile capability:proxmox|supported|profile capability:pve|supported|profile capability:mcp|supported|profile capability:model-context-protocol|supported|profile capability:virtualization|supported|profile capability:ai|supported|profile capability:llm|supported|profile capability:claude|supported|profile capability:cli|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Samik081",
"href": "https://github.com/Samik081/mcp-pve#readme",
"sourceUrl": "https://github.com/Samik081/mcp-pve#readme",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T03:09:40.218Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP",
"href": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T03:09:40.218Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-pve/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to @samik081/mcp-pve and adjacent AI workflows.