Onesource MCP
@one-source/mcp
Unified MCP server for OneSource — 24 tools for blockchain data and live chain queries in a single server.
What is MCP? The Model Context Protocol lets AI assistants call tools and access data sources. This server exposes both the OneSource blockchain API and its documentation as tools.
Quick Start
Claude Code
claude mcp add onesource -- npx -y @one-source/mcp@latestClaude Desktop / Cursor
Add to your MCP config:
{
"mcpServers": {
"onesource": {
"command": "npx",
"args": ["-y", "@one-source/mcp@latest"]
}
}
}Any MCP Client (stdio)
npx -y @one-source/mcp@latestHTTP Server (self-hosted)
npx -y @one-source/mcp@latest --http
npx -y @one-source/mcp@latest --http --port=8080Then connect your MCP client to http://localhost:3000/.
Health check: GET http://localhost:3000/health
Tools (24)
Blockchain API — Live Chain (12 tools)
Tool | Description |
| ERC20 allowance check |
| Contract type detection via ERC165 |
| ERC1155 balance via RPC |
| ERC20 balance via balanceOf |
| ERC20 Transfer logs via eth_getLogs |
| ERC721 token enumeration |
| Event logs via eth_getLogs |
| ETH + multiple ERC20 balances |
| NFT metadata via tokenURI |
| NFT owner via ownerOf |
| Token total supply |
| Transaction + receipt via RPC |
Blockchain API — Chain Utilities (10 tools)
RPC only.
Tool | Description |
| Contract bytecode |
| ENS name/address resolution |
| Gas estimation |
| Chain ID, block number, gas price |
| Transaction count |
| Pending block from mempool |
| Proxy contract detection |
| Simulate eth_call |
| Read storage slot |
| Transaction receipt |
Setup & Ops (2 tools)
No authentication required.
Tool | Purpose | When to use |
| Server health, version, auth status, setup instructions | First thing to call — checks if everything is configured |
| Report bugs to Slack (or GitHub Issues fallback) | When a tool errors or user wants to report an issue |
Networks
All blockchain API tools accept an optional network parameter:
Network | Description |
| Ethereum mainnet (default) |
| Ethereum Sepolia testnet |
| Avalanche C-Chain |
Authentication
Blockchain API tools require authentication. Two options are available — if both are set, API key takes priority.
Method | Variable | Description |
API key |
| Unlimited calls, no per-call cost |
x402 micropayments |
| Pay-per-call via USDC on Base, no account required |
Option 1: API Key
Go to app.onesource.io and create an account.
Subscribe to a developer plan (Stripe checkout).
Navigate to API Keys and generate a key.
Copy the key — it starts with
sk_.
Claude Code
claude mcp add onesource -e ONESOURCE_API_KEY=<key> -- npx -y @one-source/mcp@latestClaude Desktop / Cursor
Add the env block to your MCP config:
{
"mcpServers": {
"onesource": {
"command": "npx",
"args": ["-y", "@one-source/mcp@latest"],
"env": {
"ONESOURCE_API_KEY": "<key>"
}
}
}
}Any MCP Client (stdio)
ONESOURCE_API_KEY=<key> npx -y @one-source/mcp@latestAfter adding, reload the MCP server and call 1s_setup_check — it should show Status: Configured (API key).
Option 2: x402 Micropayments
Blockchain API endpoints are priced in USDC on Base via x402. When you set X402_PRIVATE_KEY, the server automatically handles payments — tool calls are paid and retried transparently without any extra work from the agent.
Get an EVM private key — export one from MetaMask, Coinbase Wallet, or any EVM wallet, or generate a fresh one. The key is a 64-character hex string. The
0xprefix is optional — both formats are accepted.Pass the key to the server using one of the methods below.
Reload and find your wallet address — reload the MCP server, then call
1s_setup_check. It will show the wallet address derived from your key under "Wallet address".Fund that address with USDC on Base — send USDC to the address shown in
1s_setup_check, on the Base network. A few dollars ($1–5 USDC) is enough for hundreds of calls. If your USDC is on Ethereum mainnet, bridge it using the Base Bridge.Verify — call
1s_network_infofor ethereum. If it returns chain data (block number, gas price), x402 payments are working end-to-end.
Claude Code
claude mcp add onesource -e X402_PRIVATE_KEY=<key> -- npx -y @one-source/mcp@latestClaude Desktop / Cursor
Add the env block to your MCP config:
{
"mcpServers": {
"onesource": {
"command": "npx",
"args": ["-y", "@one-source/mcp@latest"],
"env": {
"X402_PRIVATE_KEY": "<key>"
}
}
}
}Any MCP Client (stdio)
X402_PRIVATE_KEY=<key> npx -y @one-source/mcp@latestConfig File Locations
If you prefer editing the config file directly instead of using CLI commands:
Client | Config file path |
Claude Code | Run |
Claude Desktop (macOS) |
|
Claude Desktop (Windows) |
|
Cursor (macOS) |
|
Cursor (Windows) |
|
Add the onesource entry inside "mcpServers" using the JSON block shown above.
Alternative: Set as an Environment Variable
Instead of the env config block, you can set either variable as a shell or system environment variable: export ONESOURCE_API_KEY=<key> (bash/zsh) or $env:ONESOURCE_API_KEY = "<key>" (PowerShell). Set it at the OS level for persistence across sessions.
Security
Never commit keys to source control. Use environment variables, a .env file (excluded from git), or a secrets manager.
After any config change: Run
/reload-pluginsin Claude Code, or restart Claude Desktop / Cursor. The MCP server must be reloaded to pick up new environment variables.
Environment Variables
Variable | Default | Description |
| — | OneSource API key for Bearer token auth. Takes priority over x402. |
| — | EVM private key (64-char hex, |
|
| API base URL |
| — | Set to |
| — | Dashboard endpoint for analytics |
| — | API key for dashboard analytics |
Troubleshooting
1s_setup_check shows "Not configured"
Set either ONESOURCE_API_KEY or X402_PRIVATE_KEY. Reload the MCP server after setting either variable (see note above). If the key still isn't reaching the server, set it as a shell environment variable directly.
Getting 403 / wrong key active despite correct setup
A key set in your shell profile (e.g. ~/.zshrc, ~/.bash_profile) is picked up by the MCP server process even if it isn't in your Claude MCP config. Run echo $ONESOURCE_API_KEY in your terminal to check. If it prints a value you didn't intend, unset it (unset ONESOURCE_API_KEY) or explicitly clear it when adding the server: claude mcp add onesource -e ONESOURCE_API_KEY= -e X402_PRIVATE_KEY=<key> -- npx -y @one-source/mcp@latest. 1s_setup_check shows the first 6 characters of whichever key is active so you can confirm which one the server is using.
Instructions show wrong auth method after reinstall
/reload-plugins in Claude Code reconnects tools but may not refresh the system prompt the LLM sees. If you switch auth method (e.g. API key → x402), do a full Claude Code restart to ensure the instructions reflect the new auth.
"MCP server onesource already exists" error
Run claude mcp remove onesource first, then re-add with your updated config.
Windows: npx requires cmd /c wrapper
Claude Code's /doctor command may warn about this. Update your MCP config to use "command": "cmd" with "args": ["/c", "npx", "-y", "@one-source/mcp@latest"].
npx hangs with no output
That's normal — stdio mode waits for JSON-RPC input on stdin. Use --http if you want an HTTP server you can curl.
Port already in use
Specify a different port: npx -y @one-source/mcp@latest --http --port=8080
Registry Publishing
This package is listed on the official MCP Registry under the verified namespace io.onesource/mcp and on Glama. When releasing a new version, update both registries.
MCP Registry
First-Time Setup
1. Install Go
Download the installer for your platform from go.dev/dl and run it. Verify:
go version2. Install mcp-publisher
go install github.com/modelcontextprotocol/registry/cmd/mcp-publisher@latestIf the Go module path has changed and the command fails, download the binary directly from the mcp-publisher GitHub releases page instead.
On Windows, add Go's bin directory to your PATH if the command isn't recognized:
$env:PATH += ";$env:USERPROFILE\go\bin"Verify:
mcp-publisher --help3. DNS Authentication (already done)
The onesource.io domain has a DNS TXT record that proves ownership of the io.onesource namespace. This is already configured — you don't need to redo it.
The record is on the root domain (onesource.io, not _mcp-registry.onesource.io):
v=MCPv1; k=ed25519; p=7D3U5rufgNXb/lH2MthTRZdDzEGeE7/Jvg8YkiArQc8=You can verify it resolves:
nslookup -type=TXT onesource.io 8.8.8.84. Get the Private Key
Authentication requires the ed25519 private key in hex format that corresponds to the public key in the DNS record. Ask the team lead for this key — it's stored in the team's password manager / vault.
If you need to regenerate the keypair (this invalidates the current DNS record and requires updating it):
Generate a new ed25519 keypair (e.g.,
openssl genpkey -algorithm Ed25519 -out key.pem)Extract the raw 32-byte private key seed and convert to hex:
openssl pkey -in key.pem -outform DER | tail -c 32 | xxd -p -c 32Extract the public key in base64 for the DNS TXT record:
openssl pkey -in key.pem -pubout -outform DER | tail -c 32 | base64Update the DNS TXT record on
onesource.iowith the new public key:v=MCPv1; k=ed25519; p=<base64-public-key>Wait for DNS propagation before attempting to log in.
Publishing a New Version
Every time you release a new npm version, update the MCP Registry:
Publish to npm (the registry validates the package exists, so this must happen first):
npm run build npm publish --access publicUpdate
server.json— set bothversionfields to match the new npm version:{ "version": "x.y.z", ... "packages": [{ "version": "x.y.z", ... }] }The
mcpNamefield inpackage.jsonmust be"io.onesource/mcp"and must match thenamefield inserver.json. This is already set — don't remove it.Authenticate (tokens expire, so do this each time):
mcp-publisher login dns --domain onesource.io --private-key <ed25519-hex-private-key>Publish to the registry:
mcp-publisher publishVerify:
curl "https://registry.modelcontextprotocol.io/v0.1/servers?search=onesource"
Glama
Glama auto-syncs from the GitHub repo daily. No manual steps needed after a release — just make sure changes are pushed to main. The glama.json file in the repo root controls ownership. Manual re-sync is available from the Glama admin panel after claiming the server.
License
Apache 2.0 — see LICENSE for details.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/blockparty-global/1s-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server