Analyzes tokens on Binance Smart Chain (BSC) to detect honeypot tokens, offering insights on buy/sell restrictions, tax rates, and overall risk assessment.
Analyzes tokens on the Ethereum blockchain to determine if they are potential honeypots, providing details on risk level, taxes, and contract code status.
Returns analysis results in Markdown format, including structured information about token details, honeypot status, and risk metrics.
Honeypot Detector MCP
An MCP server that detects potential honeypot tokens on Ethereum, BNB Smart Chain (BSC), and Base.
Honeypot is a type of fraudulent smart contract that allows users to buy tokens but prevents them from selling or makes selling extremely difficult.
Features
Honeypot Analysis: Check if a token address is a honeypot using the honeypot.is API.
Supported Chains: Analyzes tokens on Ethereum, Binance Smart Chain and Base.
Markdown Output: Returns detailed analysis in Markdown, including:
Token name
Address
Honeypot status
Risk level
Buy, sell, and transfer taxes
Contract code open-source status
Related MCP server: crypto-indicators-mcp
Installation
Prerequisites
Python 3.10 or higher
uv (recommended package manager)
Steps
Clone the Repository:
git clone https://github.com/kukapay/honeypot-detector-mcp.git cd honeypot-detector-mcpInstall Dependencies:
uv syncInstalling to Claude Desktop:
Install the server as a Claude Desktop application:
uv run mcp install main.py --name "Honeypot Detector"Configuration file as a reference:
{ "mcpServers": { "Honeypot Detector": { "command": "uv", "args": [ "--directory", "/path/to/honeypot-detector-mcp", "run", "main.py" ] } } }Replace
/path/to/honeypot-detector-mcpwith your actual installation path.
Tool
The check_honeypot tool takes a token address as input parameter.
Example Usage
Input Prompt:
Output Markdown:
License
This project is licensed under the MIT License. See the LICENSE file for details.